Sample records for largely hidden problem

  1. The use of neutrons for the detection of explosives in Civil Security Applications

    NASA Astrophysics Data System (ADS)

    Pesente, S.; Fabris, D.; Lunardon, M.; Moretto, S.; Nebbia, G.; Viesti, G.

    2007-02-01

    The search for hidden explosives has been simulated in laboratory conditions by using our Tagged Neutron Inspection System (TNIS). Applications of the TNIS concept to Civil Security problems are discussed in the light of our projects for cargo container inspections. Moreover, neutron attenuation and scattering can be used to search in real time for large quantity of explosive hidden in vehicles.

  2. Scalable learning method for feedforward neural networks using minimal-enclosing-ball approximation.

    PubMed

    Wang, Jun; Deng, Zhaohong; Luo, Xiaoqing; Jiang, Yizhang; Wang, Shitong

    2016-06-01

    Training feedforward neural networks (FNNs) is one of the most critical issues in FNNs studies. However, most FNNs training methods cannot be directly applied for very large datasets because they have high computational and space complexity. In order to tackle this problem, the CCMEB (Center-Constrained Minimum Enclosing Ball) problem in hidden feature space of FNN is discussed and a novel learning algorithm called HFSR-GCVM (hidden-feature-space regression using generalized core vector machine) is developed accordingly. In HFSR-GCVM, a novel learning criterion using L2-norm penalty-based ε-insensitive function is formulated and the parameters in the hidden nodes are generated randomly independent of the training sets. Moreover, the learning of parameters in its output layer is proved equivalent to a special CCMEB problem in FNN hidden feature space. As most CCMEB approximation based machine learning algorithms, the proposed HFSR-GCVM training algorithm has the following merits: The maximal training time of the HFSR-GCVM training is linear with the size of training datasets and the maximal space consumption is independent of the size of training datasets. The experiments on regression tasks confirm the above conclusions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Bell's theorem and the problem of decidability between the views of Einstein and Bohr.

    PubMed

    Hess, K; Philipp, W

    2001-12-04

    Einstein, Podolsky, and Rosen (EPR) have designed a gedanken experiment that suggested a theory that was more complete than quantum mechanics. The EPR design was later realized in various forms, with experimental results close to the quantum mechanical prediction. The experimental results by themselves have no bearing on the EPR claim that quantum mechanics must be incomplete nor on the existence of hidden parameters. However, the well known inequalities of Bell are based on the assumption that local hidden parameters exist and, when combined with conflicting experimental results, do appear to prove that local hidden parameters cannot exist. This fact leaves only instantaneous actions at a distance (called "spooky" by Einstein) to explain the experiments. The Bell inequalities are based on a mathematical model of the EPR experiments. They have no experimental confirmation, because they contradict the results of all EPR experiments. In addition to the assumption that hidden parameters exist, Bell tacitly makes a variety of other assumptions; for instance, he assumes that the hidden parameters are governed by a single probability measure independent of the analyzer settings. We argue that the mathematical model of Bell excludes a large set of local hidden variables and a large variety of probability densities. Our set of local hidden variables includes time-like correlated parameters and a generalized probability density. We prove that our extended space of local hidden variables does permit derivation of the quantum result and is consistent with all known experiments.

  4. The Hidden Health Toll: A Cost of Work to the American Woman

    ERIC Educational Resources Information Center

    Stellman, Jeanne M.

    1977-01-01

    Large numbers of women work at jobs that present serious health hazards, although most people associate workplace hazards with traditionally "male" jobs. Physical dangers, stress, and fatigue lead to manifold health problems among working women. These problems should be investigated and conditions improved for workers of both sexes. (Author/GC)

  5. Hidden Attractors in Dynamical Systems. From Hidden Oscillations in Hilbert-Kolmogorov Aizerman, and Kalman Problems to Hidden Chaotic Attractor in Chua Circuits

    NASA Astrophysics Data System (ADS)

    Leonov, G. A.; Kuznetsov, N. V.

    From a computational point of view, in nonlinear dynamical systems, attractors can be regarded as self-excited and hidden attractors. Self-excited attractors can be localized numerically by a standard computational procedure, in which after a transient process a trajectory, starting from a point of unstable manifold in a neighborhood of equilibrium, reaches a state of oscillation, therefore one can easily identify it. In contrast, for a hidden attractor, a basin of attraction does not intersect with small neighborhoods of equilibria. While classical attractors are self-excited, attractors can therefore be obtained numerically by the standard computational procedure. For localization of hidden attractors it is necessary to develop special procedures, since there are no similar transient processes leading to such attractors. At first, the problem of investigating hidden oscillations arose in the second part of Hilbert's 16th problem (1900). The first nontrivial results were obtained in Bautin's works, which were devoted to constructing nested limit cycles in quadratic systems, that showed the necessity of studying hidden oscillations for solving this problem. Later, the problem of analyzing hidden oscillations arose from engineering problems in automatic control. In the 50-60s of the last century, the investigations of widely known Markus-Yamabe's, Aizerman's, and Kalman's conjectures on absolute stability have led to the finding of hidden oscillations in automatic control systems with a unique stable stationary point. In 1961, Gubar revealed a gap in Kapranov's work on phase locked-loops (PLL) and showed the possibility of the existence of hidden oscillations in PLL. At the end of the last century, the difficulties in analyzing hidden oscillations arose in simulations of drilling systems and aircraft's control systems (anti-windup) which caused crashes. Further investigations on hidden oscillations were greatly encouraged by the present authors' discovery, in 2010 (for the first time), of chaotic hidden attractor in Chua's circuit. This survey is dedicated to efficient analytical-numerical methods for the study of hidden oscillations. Here, an attempt is made to reflect the current trends in the synthesis of analytical and numerical methods.

  6. ARPA surveillance technology for detection of targets hidden in foliage

    NASA Astrophysics Data System (ADS)

    Hoff, Lawrence E.; Stotts, Larry B.

    1994-02-01

    The processing of large quantities of synthetic aperture radar data in real time is a complex problem. Even the image formation process taxes today's most advanced computers. The use of complex algorithms with multiple channels adds another dimension to the computational problem. Advanced Research Projects Agency (ARPA) is currently planning on using the Paragon parallel processor for this task. The Paragon is small enough to allow its use in a sensor aircraft. Candidate algorithms will be implemented on the Paragon for evaluation for real time processing. In this paper ARPA technology developments for detecting targets hidden in foliage are reviewed and examples of signal processing techniques on field collected data are presented.

  7. Learning to classify in large committee machines

    NASA Astrophysics Data System (ADS)

    O'kane, Dominic; Winther, Ole

    1994-10-01

    The ability of a two-layer neural network to learn a specific non-linearly-separable classification task, the proximity problem, is investigated using a statistical mechanics approach. Both the tree and fully connected architectures are investigated in the limit where the number K of hidden units is large, but still much smaller than the number N of inputs. Both have continuous weights. Within the replica symmetric ansatz, we find that for zero temperature training, the tree architecture exhibits a strong overtraining effect. For nonzero temperature the asymptotic error is lowered, but it is still higher than the corresponding value for the simple perceptron. The fully connected architecture is considered for two regimes. First, for a finite number of examples we find a symmetry among the hidden units as each performs equally well. The asymptotic generalization error is finite, and minimal for T-->∞ where it goes to the same value as for the simple perceptron. For a large number of examples we find a continuous transition to a phase with broken hidden-unit symmetry, which has an asymptotic generalization error equal to zero.

  8. Quasifixed points from scalar sequestering and the little hierarchy problem in supersymmetry

    NASA Astrophysics Data System (ADS)

    Martin, Stephen P.

    2018-02-01

    In supersymmetric models with scalar sequestering, superconformal strong dynamics in the hidden sector suppresses the low-energy couplings of mass dimension 2, compared to the squares of the dimension-1 parameters. Taking into account restrictions on the anomalous dimensions in superconformal theories, I point out that the interplay between the hidden and visible sector renormalizations gives rise to quasifixed point running for the supersymmetric Standard Model squared mass parameters, rather than driving them to 0. The extent to which this dynamics can ameliorate the little hierarchy problem in supersymmetry is studied. Models of this type in which the gaugino masses do not unify are arguably more natural, and are certainly more likely to be accessible, eventually, to the Large Hadron Collider.

  9. Automatic Hidden-Web Table Interpretation by Sibling Page Comparison

    NASA Astrophysics Data System (ADS)

    Tao, Cui; Embley, David W.

    The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conversion, but would also be an aid in solving related problems such as information extraction and semi-structured data management. In this paper, we offer a conceptual modeling solution for the common special case in which so-called sibling pages are available. The sibling pages we consider are pages on the hidden web, commonly generated from underlying databases. We compare them to identify and connect nonvarying components (category labels) and varying components (data values). We tested our solution using more than 2,000 tables in source pages from three different domains—car advertisements, molecular biology, and geopolitical information. Experimental results show that the system can successfully identify sibling tables, generate structure patterns, interpret tables using the generated patterns, and automatically adjust the structure patterns, if necessary, as it processes a sequence of hidden-web pages. For these activities, the system was able to achieve an overall F-measure of 94.5%.

  10. Software environment for implementing engineering applications on MIMD computers

    NASA Technical Reports Server (NTRS)

    Lopez, L. A.; Valimohamed, K. A.; Schiff, S.

    1990-01-01

    In this paper the concept for a software environment for developing engineering application systems for multiprocessor hardware (MIMD) is presented. The philosophy employed is to solve the largest problems possible in a reasonable amount of time, rather than solve existing problems faster. In the proposed environment most of the problems concerning parallel computation and handling of large distributed data spaces are hidden from the application program developer, thereby facilitating the development of large-scale software applications. Applications developed under the environment can be executed on a variety of MIMD hardware; it protects the application software from the effects of a rapidly changing MIMD hardware technology.

  11. Monitoring the Future: National Survey Results on Drug Use, 1975-2008. Volume I, Secondary School Students. NIH Publication No. 09-7402

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2009-01-01

    The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…

  12. Monitoring the Future: National Survey Results on Drug Use, 1975-2007. Volume I, Secondary School Students. NIH Publication No. 08-6418A

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2008-01-01

    The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…

  13. Monitoring the Future: National Survey Results on Drug Use, 1975-2006. Volume I: Secondary School Students. NIH Publication No. 07-6205

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2007-01-01

    The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…

  14. Naturalness of Electroweak Symmetry Breaking

    NASA Astrophysics Data System (ADS)

    Espinosa, J. R.

    2007-02-01

    After revisiting the hierarchy problem of the Standard Model and its implications for the scale of New Physics, I consider the fine tuning problem of electroweak symmetry breaking in two main scenarios beyond the Standard Model: SUSY and Little Higgs models. The main conclusions are that New Physics should appear on the reach of the LHC; that some SUSY models can solve the hierarchy problem with acceptable residual fine tuning and, finally, that Little Higgs models generically suffer from large tunings, many times hidden.

  15. Sniffing out the Secret Poison: Selection Bias in Educational Research

    ERIC Educational Resources Information Center

    Showalter, Daniel A.; Mullet, Luke B.

    2017-01-01

    Selection bias is a persistent, and often hidden, problem in educational research. It is the primary obstacle standing in between increasingly available large education datasets and the ability to make valid causal inferences to inform policymaking, research, and practice (Stuart, 2010). This article provides an accessible discussion on the…

  16. A Regularized Linear Dynamical System Framework for Multivariate Time Series Analysis.

    PubMed

    Liu, Zitao; Hauskrecht, Milos

    2015-01-01

    Linear Dynamical System (LDS) is an elegant mathematical framework for modeling and learning Multivariate Time Series (MTS). However, in general, it is difficult to set the dimension of an LDS's hidden state space. A small number of hidden states may not be able to model the complexities of a MTS, while a large number of hidden states can lead to overfitting. In this paper, we study learning methods that impose various regularization penalties on the transition matrix of the LDS model and propose a regularized LDS learning framework (rLDS) which aims to (1) automatically shut down LDSs' spurious and unnecessary dimensions, and consequently, address the problem of choosing the optimal number of hidden states; (2) prevent the overfitting problem given a small amount of MTS data; and (3) support accurate MTS forecasting. To learn the regularized LDS from data we incorporate a second order cone program and a generalized gradient descent method into the Maximum a Posteriori framework and use Expectation Maximization to obtain a low-rank transition matrix of the LDS model. We propose two priors for modeling the matrix which lead to two instances of our rLDS. We show that our rLDS is able to recover well the intrinsic dimensionality of the time series dynamics and it improves the predictive performance when compared to baselines on both synthetic and real-world MTS datasets.

  17. A Self-Organizing Incremental Spatiotemporal Associative Memory Networks Model for Problems with Hidden State

    PubMed Central

    2016-01-01

    Identifying the hidden state is important for solving problems with hidden state. We prove any deterministic partially observable Markov decision processes (POMDP) can be represented by a minimal, looping hidden state transition model and propose a heuristic state transition model constructing algorithm. A new spatiotemporal associative memory network (STAMN) is proposed to realize the minimal, looping hidden state transition model. STAMN utilizes the neuroactivity decay to realize the short-term memory, connection weights between different nodes to represent long-term memory, presynaptic potentials, and synchronized activation mechanism to complete identifying and recalling simultaneously. Finally, we give the empirical illustrations of the STAMN and compare the performance of the STAMN model with that of other methods. PMID:27891146

  18. Mean-field theory of baryonic matter for QCD in the large Nc and heavy quark mass limits

    NASA Astrophysics Data System (ADS)

    Adhikari, Prabal; Cohen, Thomas D.

    2013-11-01

    We discuss theoretical issues pertaining to baryonic matter in the combined heavy-quark and large Nc limits of QCD. Witten's classic argument that baryons and interacting systems of baryons can be described in a mean-field approximation with each of the quarks moving in an average potential due to the remaining quarks is heuristic. It is important to justify this heuristic description for the case of baryonic matter since systems of interacting baryons are intrinsically more complicated than single baryons due to the possibility of hidden color states—states in which the subsystems making up the entire baryon crystal are not color-singlet nucleons but rather colorful states coupled together to make a color-singlet state. In this work, we provide a formal justification of this heuristic prescription. In order to do this, we start by taking the heavy quark limit, thus effectively reducing the problem to a many-body quantum mechanical system. This problem can be formulated in terms of integrals over coherent states, which for this problem are simple Slater determinants. We show that for the many-body problem, the support region for these integrals becomes narrow at large Nc, yielding an energy which is well approximated by a single coherent state—that is a mean-field description. Corrections to the energy are of relative order 1/Nc. While hidden color states are present in the exact state of the heavy quark system, they only influence the interaction energy below leading order in 1/Nc.

  19. Naturalness of Electroweak Symmetry Breaking while Waiting for the LHC

    NASA Astrophysics Data System (ADS)

    Espinosa, J. R.

    2007-06-01

    After revisiting the hierarchy problem of the Standard Model and its implications for the scale of New Physics, I consider the finetuning problem of electroweak symmetry breaking in several scenarios beyond the Standard Model: SUSY, Little Higgs and "improved naturalness" models. The main conclusions are that: New Physics should appear on the reach of the LHC; some SUSY models can solve the hierarchy problem with acceptable residual tuning; Little Higgs models generically suffer from large tunings, many times hidden; and, finally, that "improved naturalness" models do not generically improve the naturalness of the SM.

  20. SPEECH TO FACULTY OF HARVARD-BOSTON SUMMER PROGRAM AT PREPLANNING MEETINGS.

    ERIC Educational Resources Information Center

    HAIZLIP, HAROLD

    THE AREA TO WHICH THIS GROUP OF TEACHERS WILL BE SENT IS CHARACTERIZED BY ITS LARGE INFLUX OF POOR NEGRO FAMILIES WITH POOR CULTURAL BACKGROUNDS. SOME OF THE PROBLEMS OF THIS AREA WILL REQUIRE A BROAD-SCALE, CAREFULLY ANALYZED, AND PLANNED ATTACK WITHIN AND BY PUBLIC SCHOOLS. EVERY SCHOOL HAS A HIDDEN OR SUBLIMINAL CURRICULUM WHICH TEACHES, IN…

  1. Monitoring the Future National Survey Results on Drug Use, 1975-2010. Volume I, Secondary School Students

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2011-01-01

    The Monitoring the Future (MTF) study involves an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third…

  2. Quantum mechanics and hidden superconformal symmetry

    NASA Astrophysics Data System (ADS)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  3. Hidden symmetry in the confined hydrogen atom problem

    NASA Astrophysics Data System (ADS)

    Pupyshev, Vladimir I.; Scherbinin, Andrei V.

    2002-07-01

    The classical counterpart of the well-known quantum mechanical model of a spherically confined hydrogen atom is examined in terms of the Lenz vector, a dynamic variable featuring the conventional Kepler problem. It is shown that a conditional conservation law associated with the Lenz vector is true, in fair agreement with the corresponding quantum problem previously found to exhibit a hidden symmetry as well.

  4. Monitoring the Future: National Survey Results on Drug Use, 1975-2005. Volume I. Secondary School Students

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2006-01-01

    In 2005, the Monitoring the Future study marked its 31st year of conducting national surveys of substance use among American young people. Beginning with the first survey of high school seniors in 1975, the study has provided the nation with a window through which to view the important, but largely hidden, problem behaviors of illicit drug use,…

  5. Hidden algebra method (quasi-exact-solvability in quantum mechanics)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turbiner, Alexander; Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apartado, Postal 70-543, 04510 Mexico, D. F.

    1996-02-20

    A general introduction to quasi-exactly-solvable problems of quantum mechanics is presented. Main attention is given to multidimensional quasi-exactly-solvable and exactly-solvable Schroedinger operators. Exact-solvability of the Calogero and Sutherland N-body problems ass ociated with an existence of the hidden algebra slN is discussed extensively.

  6. Hidden momentum of electrons, nuclei, atoms, and molecules

    NASA Astrophysics Data System (ADS)

    Cameron, Robert P.; Cotter, J. P.

    2018-04-01

    We consider the positions and velocities of electrons and spinning nuclei and demonstrate that these particles harbour hidden momentum when located in an electromagnetic field. This hidden momentum is present in all atoms and molecules, however it is ultimately canceled by the momentum of the electromagnetic field. We point out that an electron vortex in an electric field might harbour a comparatively large hidden momentum and recognize the phenomenon of hidden hidden momentum.

  7. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    ERIC Educational Resources Information Center

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  8. Identifying influential user communities on the social network

    NASA Astrophysics Data System (ADS)

    Hu, Weishu; Gong, Zhiguo; Hou U, Leong; Guo, Jingzhi

    2015-10-01

    Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4-11.8% accuracy improvement over the state-of-the-art method.

  9. Tracking Problem Solving by Multivariate Pattern Analysis and Hidden Markov Model Algorithms

    ERIC Educational Resources Information Center

    Anderson, John R.

    2012-01-01

    Multivariate pattern analysis can be combined with Hidden Markov Model algorithms to track the second-by-second thinking as people solve complex problems. Two applications of this methodology are illustrated with a data set taken from children as they interacted with an intelligent tutoring system for algebra. The first "mind reading" application…

  10. Monitoring the Future: National Survey Results on Drug Use, 1975-2009. Volume I: Secondary School Students. NIH Publication No. 10-7584

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2010-01-01

    The Monitoring the Future (MTF) study is an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third of…

  11. Monitoring the Future: National Survey Results on Drug Use, 1975-2004. Volume I: Secondary School Students, 2004

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2005-01-01

    In 2004 the Monitoring the Future study marked its 30th year of conducting national surveys of substance use among American young people. Beginning with the first survey of high school seniors in 1975, the study has provided the nation with a window through which to view the important, but largely hidden, problem behaviors of illicit drug use,…

  12. Monitoring the Future. National Survey Results on Drug Use, 1975-2009. Volume I, Secondary School Students. NIH Publication Number 10-7584

    ERIC Educational Resources Information Center

    Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.

    2010-01-01

    The Monitoring the Future (MTF) study is an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third of a…

  13. Hidden Markov random field model and Broyden-Fletcher-Goldfarb-Shanno algorithm for brain image segmentation

    NASA Astrophysics Data System (ADS)

    Guerrout, EL-Hachemi; Ait-Aoudia, Samy; Michelucci, Dominique; Mahiou, Ramdane

    2018-05-01

    Many routine medical examinations produce images of patients suffering from various pathologies. With the huge number of medical images, the manual analysis and interpretation became a tedious task. Thus, automatic image segmentation became essential for diagnosis assistance. Segmentation consists in dividing the image into homogeneous and significant regions. We focus on hidden Markov random fields referred to as HMRF to model the problem of segmentation. This modelisation leads to a classical function minimisation problem. Broyden-Fletcher-Goldfarb-Shanno algorithm referred to as BFGS is one of the most powerful methods to solve unconstrained optimisation problem. In this paper, we investigate the combination of HMRF and BFGS algorithm to perform the segmentation operation. The proposed method shows very good segmentation results comparing with well-known approaches. The tests are conducted on brain magnetic resonance image databases (BrainWeb and IBSR) largely used to objectively confront the results obtained. The well-known Dice coefficient (DC) was used as similarity metric. The experimental results show that, in many cases, our proposed method approaches the perfect segmentation with a Dice Coefficient above .9. Moreover, it generally outperforms other methods in the tests conducted.

  14. Inference for dynamics of continuous variables: the extended Plefka expansion with hidden nodes

    NASA Astrophysics Data System (ADS)

    Bravi, B.; Sollich, P.

    2017-06-01

    We consider the problem of a subnetwork of observed nodes embedded into a larger bulk of unknown (i.e. hidden) nodes, where the aim is to infer these hidden states given information about the subnetwork dynamics. The biochemical networks underlying many cellular and metabolic processes are important realizations of such a scenario as typically one is interested in reconstructing the time evolution of unobserved chemical concentrations starting from the experimentally more accessible ones. We present an application to this problem of a novel dynamical mean field approximation, the extended Plefka expansion, which is based on a path integral description of the stochastic dynamics. As a paradigmatic model we study the stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings. The resulting joint distribution is known to be Gaussian and this allows us to fully characterize the posterior statistics of the hidden nodes. In particular the equal-time hidden-to-hidden variance—conditioned on observations—gives the expected error at each node when the hidden time courses are predicted based on the observations. We assess the accuracy of the extended Plefka expansion in predicting these single node variances as well as error correlations over time, focussing on the role of the system size and the number of observed nodes.

  15. Hidden algebra method (quasi-exact-solvability in quantum mechanics)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turbiner, A.

    1996-02-01

    A general introduction to quasi-exactly-solvable problems of quantum mechanics is presented. Main attention is given to multidimensional quasi-exactly-solvable and exactly-solvable Schroedinger operators. Exact-solvability of the Calogero and Sutherland {ital N}-body problems ass ociated with an existence of the hidden algebra {ital sl}{sub {ital N}} is discussed extensively. {copyright} {ital 1996 American Institute of Physics.}

  16. Hidden Markov models for character recognition.

    PubMed

    Vlontzos, J A; Kung, S Y

    1992-01-01

    A hierarchical system for character recognition with hidden Markov model knowledge sources which solve both the context sensitivity problem and the character instantiation problem is presented. The system achieves 97-99% accuracy using a two-level architecture and has been implemented using a systolic array, thus permitting real-time (1 ms per character) multifont and multisize printed character recognition as well as handwriting recognition.

  17. A Finite Element Analysis of a Class of Problems in Elasto-Plasticity with Hidden Variables.

    DTIC Science & Technology

    1985-09-01

    RD-R761 642 A FINITE ELEMENT ANALYSIS OF A CLASS OF PROBLEMS IN 1/2 ELASTO-PLASTICITY MIlT (U) TEXAS INST FOR COMPUTATIONAL MECHANICS AUSTIN J T ODEN...end Subtitle) S. TYPE OF REPORT & PERIOD COVERED A FINITE ELEMENT ANALYSIS OF A CLASS OF PROBLEMS Final Report IN ELASTO-PLASTICITY WITH HIDDEN...aieeoc ede It neceeeary nd Identify by block number) ;"Elastoplasticity, finite deformations; non-convex analysis ; finite element methods, metal forming

  18. Lessons Learned from Managing a Petabyte

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Becla, J

    2005-01-20

    The amount of data collected and stored by the average business doubles each year. Many commercial databases are already approaching hundreds of terabytes, and at this rate, will soon be managing petabytes. More data enables new functionality and capability, but the larger scale reveals new problems and issues hidden in ''smaller'' terascale environments. This paper presents some of these new problems along with implemented solutions in the framework of a petabyte dataset for a large High Energy Physics experiment. Through experience with two persistence technologies, a commercial database and a file-based approach, we expose format-independent concepts and issues prevalent atmore » this new scale of computing.« less

  19. Nonparametric model validations for hidden Markov models with applications in financial econometrics.

    PubMed

    Zhao, Zhibiao

    2011-06-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.

  20. Graviweak Unification, Invisible Universe and Dark Energy

    NASA Astrophysics Data System (ADS)

    Das, C. R.; Laperashvili, L. V.; Tureanu, A.

    2013-07-01

    We consider a graviweak unification model with the assumption of the existence of a hidden (invisible) sector of our Universe, parallel to the visible world. This Hidden World (HW) is assumed to be a Mirror World (MW) with broken mirror parity. We start with a diffeomorphism invariant theory of a gauge field valued in a Lie algebra g, which is broken spontaneously to the direct sum of the space-time Lorentz algebra and the Yang-Mills algebra: ˜ {g} = {{su}}(2) (grav)L ⊕ {{su}}(2)L — in the ordinary world, and ˜ {g}' = {{su}}(2){' (grav)}R ⊕ {{su}}(2)'R — in the hidden world. Using an extension of the Plebanski action for general relativity, we recover the actions for gravity, SU(2) Yang-Mills and Higgs fields in both (visible and invisible) sectors of the Universe, and also the total action. After symmetry breaking, all physical constants, including the Newton's constants, cosmological constants, Yang-Mills couplings, and other parameters, are determined by a single parameter g present in the initial action, and by the Higgs VEVs. The dark energy problem of this model predicts a too large supersymmetric breaking scale (MSUSY 1010GeV), which is not within the reach of the LHC experiments.

  1. A Hidden Markov Model for Single Particle Tracks Quantifies Dynamic Interactions between LFA-1 and the Actin Cytoskeleton

    PubMed Central

    Das, Raibatak; Cairo, Christopher W.; Coombs, Daniel

    2009-01-01

    The extraction of hidden information from complex trajectories is a continuing problem in single-particle and single-molecule experiments. Particle trajectories are the result of multiple phenomena, and new methods for revealing changes in molecular processes are needed. We have developed a practical technique that is capable of identifying multiple states of diffusion within experimental trajectories. We model single particle tracks for a membrane-associated protein interacting with a homogeneously distributed binding partner and show that, with certain simplifying assumptions, particle trajectories can be regarded as the outcome of a two-state hidden Markov model. Using simulated trajectories, we demonstrate that this model can be used to identify the key biophysical parameters for such a system, namely the diffusion coefficients of the underlying states, and the rates of transition between them. We use a stochastic optimization scheme to compute maximum likelihood estimates of these parameters. We have applied this analysis to single-particle trajectories of the integrin receptor lymphocyte function-associated antigen-1 (LFA-1) on live T cells. Our analysis reveals that the diffusion of LFA-1 is indeed approximately two-state, and is characterized by large changes in cytoskeletal interactions upon cellular activation. PMID:19893741

  2. A new optimized GA-RBF neural network algorithm.

    PubMed

    Jia, Weikuan; Zhao, Dean; Shen, Tian; Su, Chunyang; Hu, Chanli; Zhao, Yuyan

    2014-01-01

    When confronting the complex problems, radial basis function (RBF) neural network has the advantages of adaptive and self-learning ability, but it is difficult to determine the number of hidden layer neurons, and the weights learning ability from hidden layer to the output layer is low; these deficiencies easily lead to decreasing learning ability and recognition precision. Aiming at this problem, we propose a new optimized RBF neural network algorithm based on genetic algorithm (GA-RBF algorithm), which uses genetic algorithm to optimize the weights and structure of RBF neural network; it chooses new ways of hybrid encoding and optimizing simultaneously. Using the binary encoding encodes the number of the hidden layer's neurons and using real encoding encodes the connection weights. Hidden layer neurons number and connection weights are optimized simultaneously in the new algorithm. However, the connection weights optimization is not complete; we need to use least mean square (LMS) algorithm for further leaning, and finally get a new algorithm model. Using two UCI standard data sets to test the new algorithm, the results show that the new algorithm improves the operating efficiency in dealing with complex problems and also improves the recognition precision, which proves that the new algorithm is valid.

  3. ECG signal analysis through hidden Markov models.

    PubMed

    Andreão, Rodrigo V; Dorizzi, Bernadette; Boudy, Jérôme

    2006-08-01

    This paper presents an original hidden Markov model (HMM) approach for online beat segmentation and classification of electrocardiograms. The HMM framework has been visited because of its ability of beat detection, segmentation and classification, highly suitable to the electrocardiogram (ECG) problem. Our approach addresses a large panel of topics some of them never studied before in other HMM related works: waveforms modeling, multichannel beat segmentation and classification, and unsupervised adaptation to the patient's ECG. The performance was evaluated on the two-channel QT database in terms of waveform segmentation precision, beat detection and classification. Our waveform segmentation results compare favorably to other systems in the literature. We also obtained high beat detection performance with sensitivity of 99.79% and a positive predictivity of 99.96%, using a test set of 59 recordings. Moreover, premature ventricular contraction beats were detected using an original classification strategy. The results obtained validate our approach for real world application.

  4. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance

    PubMed Central

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-01-01

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results. PMID:26861352

  5. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    PubMed

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  6. Body size affects the evolution of hidden colour signals in moths.

    PubMed

    Kang, Changku; Zahiri, Reza; Sherratt, Thomas N

    2017-08-30

    Many cryptic prey have also evolved hidden contrasting colour signals which are displayed to would-be predators. Given that these hidden contrasting signals may confer additional survival benefits to the prey by startling/intimidating predators, it is unclear why they have evolved in some species, but not in others. Here, we have conducted a comparative phylogenetic analysis of the evolution of colour traits in the family Erebidae (Lepidoptera), and found that the hidden contrasting colour signals are more likely to be found in larger species. To understand why this relationship occurs, we present a general mathematical model, demonstrating that selection for a secondary defence such as deimatic display will be stronger in large species when (i) the primary defence (crypsis) is likely to fail as its body size increases and/or (ii) the secondary defence is more effective in large prey. To test the model assumptions, we conducted behavioural experiments using a robotic moth which revealed that survivorship advantages were higher against wild birds when the moth has contrasting hindwings and large size. Collectively, our results suggest that the evolutionary association between large size and hidden contrasting signals has been driven by a combination of the need for a back-up defence and its efficacy. © 2017 The Author(s).

  7. Detecting targets hidden in random forests

    NASA Astrophysics Data System (ADS)

    Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao

    2009-05-01

    Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.

  8. Hidden physics models: Machine learning of nonlinear partial differential equations

    NASA Astrophysics Data System (ADS)

    Raissi, Maziar; Karniadakis, George Em

    2018-03-01

    While there is currently a lot of enthusiasm about "big data", useful data is usually "small" and expensive to acquire. In this paper, we present a new paradigm of learning partial differential equations from small data. In particular, we introduce hidden physics models, which are essentially data-efficient learning machines capable of leveraging the underlying laws of physics, expressed by time dependent and nonlinear partial differential equations, to extract patterns from high-dimensional data generated from experiments. The proposed methodology may be applied to the problem of learning, system identification, or data-driven discovery of partial differential equations. Our framework relies on Gaussian processes, a powerful tool for probabilistic inference over functions, that enables us to strike a balance between model complexity and data fitting. The effectiveness of the proposed approach is demonstrated through a variety of canonical problems, spanning a number of scientific domains, including the Navier-Stokes, Schrödinger, Kuramoto-Sivashinsky, and time dependent linear fractional equations. The methodology provides a promising new direction for harnessing the long-standing developments of classical methods in applied mathematics and mathematical physics to design learning machines with the ability to operate in complex domains without requiring large quantities of data.

  9. Nonparametric model validations for hidden Markov models with applications in financial econometrics

    PubMed Central

    Zhao, Zhibiao

    2011-01-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise. PMID:21750601

  10. A Discretization Algorithm for Meteorological Data and its Parallelization Based on Hadoop

    NASA Astrophysics Data System (ADS)

    Liu, Chao; Jin, Wen; Yu, Yuting; Qiu, Taorong; Bai, Xiaoming; Zou, Shuilong

    2017-10-01

    In view of the large amount of meteorological observation data, the property is more and the attribute values are continuous values, the correlation between the elements is the need for the application of meteorological data, this paper is devoted to solving the problem of how to better discretize large meteorological data to more effectively dig out the hidden knowledge in meteorological data and research on the improvement of discretization algorithm for large scale data, in order to achieve data in the large meteorological data discretization for the follow-up to better provide knowledge to provide protection, a discretization algorithm based on information entropy and inconsistency of meteorological attributes is proposed and the algorithm is parallelized under Hadoop platform. Finally, the comparison test validates the effectiveness of the proposed algorithm for discretization in the area of meteorological large data.

  11. An alternative approach for neural network evolution with a genetic algorithm: crossover by combinatorial optimization.

    PubMed

    García-Pedrajas, Nicolás; Ortiz-Boyer, Domingo; Hervás-Martínez, César

    2006-05-01

    In this work we present a new approach to crossover operator in the genetic evolution of neural networks. The most widely used evolutionary computation paradigm for neural network evolution is evolutionary programming. This paradigm is usually preferred due to the problems caused by the application of crossover to neural network evolution. However, crossover is the most innovative operator within the field of evolutionary computation. One of the most notorious problems with the application of crossover to neural networks is known as the permutation problem. This problem occurs due to the fact that the same network can be represented in a genetic coding by many different codifications. Our approach modifies the standard crossover operator taking into account the special features of the individuals to be mated. We present a new model for mating individuals that considers the structure of the hidden layer and redefines the crossover operator. As each hidden node represents a non-linear projection of the input variables, we approach the crossover as a problem on combinatorial optimization. We can formulate the problem as the extraction of a subset of near-optimal projections to create the hidden layer of the new network. This new approach is compared to a classical crossover in 25 real-world problems with an excellent performance. Moreover, the networks obtained are much smaller than those obtained with classical crossover operator.

  12. Measurement problem and local hidden variables with entangled photons

    NASA Astrophysics Data System (ADS)

    Muchowski, Eugen

    2017-12-01

    It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell's Theorem.

  13. Hidden Markov models and other machine learning approaches in computational molecular biology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldi, P.

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In thismore » tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.« less

  14. The Hidden Diversity of Flagellated Protists in Soil.

    PubMed

    Venter, Paul Christiaan; Nitsche, Frank; Arndt, Hartmut

    2018-07-01

    Protists are among the most diverse and abundant eukaryotes in soil. However, gaps between described and sequenced protist morphospecies still present a pending problem when surveying environmental samples for known species using molecular methods. The number of sequences in the molecular PR 2 database (∼130,000) is limited compared to the species richness expected (>1 million protist species) - limiting the recovery rate. This is important, since high throughput sequencing (HTS) methods are used to find associative patterns between functional traits, taxa and environmental parameters. We performed HTS to survey soil flagellates in 150 grasslands of central Europe, and tested the recovery rate of ten previously isolated and cultivated cercomonad species, among locally found diversity. We recovered sequences for reference soil flagellate species, but also a great number of their phylogenetically evaluated genetic variants, among rare and dominant taxa with presumably own biogeography. This was recorded among dominant (cercozoans, Sandona), rare (apusozoans) and a large hidden diversity of predominantly aquatic protists in soil (choanoflagellates, bicosoecids) often forming novel clades associated with uncultured environmental sequences. Evaluating the reads, instead of the OTUs that individual reads are usually clustered into, we discovered that much of this hidden diversity may be lost due to clustering. Copyright © 2018 Elsevier GmbH. All rights reserved.

  15. Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks

    NASA Astrophysics Data System (ADS)

    Zhu, Shijia; Wang, Yadong

    2015-12-01

    Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is ‘stationarity’, and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.

  16. Noninvasive Fetal ECG: the PhysioNet/Computing in Cardiology Challenge 2013.

    PubMed

    Silva, Ikaro; Behar, Joachim; Sameni, Reza; Zhu, Tingting; Oster, Julien; Clifford, Gari D; Moody, George B

    2013-03-01

    The PhysioNet/CinC 2013 Challenge aimed to stimulate rapid development and improvement of software for estimating fetal heart rate (FHR), fetal interbeat intervals (FRR), and fetal QT intervals (FQT), from multichannel recordings made using electrodes placed on the mother's abdomen. For the challenge, five data collections from a variety of sources were used to compile a large standardized database, which was divided into training, open test, and hidden test subsets. Gold-standard fetal QRS and QT interval annotations were developed using a novel crowd-sourcing framework. The challenge organizers used the hidden test subset to evaluate 91 open-source software entries submitted by 53 international teams of participants in three challenge events, estimating FHR, FRR, and FQT using the hidden test subset, which was not available for study by participants. Two additional events required only user-submitted QRS annotations to evaluate FHR and FRR estimation accuracy using the open test subset available to participants. The challenge yielded a total of 91 open-source software entries. The best of these achieved average estimation errors of 187bpm 2 for FHR, 20.9 ms for FRR, and 152.7 ms for FQT. The open data sets, scoring software, and open-source entries are available at PhysioNet for researchers interested on working on these problems.

  17. Image segmentation using hidden Markov Gauss mixture models.

    PubMed

    Pyun, Kyungsuk; Lim, Johan; Won, Chee Sun; Gray, Robert M

    2007-07-01

    Image segmentation is an important tool in image processing and can serve as an efficient front end to sophisticated algorithms and thereby simplify subsequent processing. We develop a multiclass image segmentation method using hidden Markov Gauss mixture models (HMGMMs) and provide examples of segmentation of aerial images and textures. HMGMMs incorporate supervised learning, fitting the observation probability distribution given each class by a Gauss mixture estimated using vector quantization with a minimum discrimination information (MDI) distortion. We formulate the image segmentation problem using a maximum a posteriori criteria and find the hidden states that maximize the posterior density given the observation. We estimate both the hidden Markov parameter and hidden states using a stochastic expectation-maximization algorithm. Our results demonstrate that HMGMM provides better classification in terms of Bayes risk and spatial homogeneity of the classified objects than do several popular methods, including classification and regression trees, learning vector quantization, causal hidden Markov models (HMMs), and multiresolution HMMs. The computational load of HMGMM is similar to that of the causal HMM.

  18. Infinite hidden conditional random fields for human behavior analysis.

    PubMed

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  19. Enhanced axion-photon coupling in GUT with hidden photon

    NASA Astrophysics Data System (ADS)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  20. Tracking problem solving by multivariate pattern analysis and Hidden Markov Model algorithms.

    PubMed

    Anderson, John R

    2012-03-01

    Multivariate pattern analysis can be combined with Hidden Markov Model algorithms to track the second-by-second thinking as people solve complex problems. Two applications of this methodology are illustrated with a data set taken from children as they interacted with an intelligent tutoring system for algebra. The first "mind reading" application involves using fMRI activity to track what students are doing as they solve a sequence of algebra problems. The methodology achieves considerable accuracy at determining both what problem-solving step the students are taking and whether they are performing that step correctly. The second "model discovery" application involves using statistical model evaluation to determine how many substates are involved in performing a step of algebraic problem solving. This research indicates that different steps involve different numbers of substates and these substates are associated with different fluency in algebra problem solving. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. Fast, Simple and Accurate Handwritten Digit Classification by Training Shallow Neural Network Classifiers with the ‘Extreme Learning Machine’ Algorithm

    PubMed Central

    McDonnell, Mark D.; Tissera, Migel D.; Vladusich, Tony; van Schaik, André; Tapson, Jonathan

    2015-01-01

    Recent advances in training deep (multi-layer) architectures have inspired a renaissance in neural network use. For example, deep convolutional networks are becoming the default option for difficult tasks on large datasets, such as image and speech recognition. However, here we show that error rates below 1% on the MNIST handwritten digit benchmark can be replicated with shallow non-convolutional neural networks. This is achieved by training such networks using the ‘Extreme Learning Machine’ (ELM) approach, which also enables a very rapid training time (∼ 10 minutes). Adding distortions, as is common practise for MNIST, reduces error rates even further. Our methods are also shown to be capable of achieving less than 5.5% error rates on the NORB image database. To achieve these results, we introduce several enhancements to the standard ELM algorithm, which individually and in combination can significantly improve performance. The main innovation is to ensure each hidden-unit operates only on a randomly sized and positioned patch of each image. This form of random ‘receptive field’ sampling of the input ensures the input weight matrix is sparse, with about 90% of weights equal to zero. Furthermore, combining our methods with a small number of iterations of a single-batch backpropagation method can significantly reduce the number of hidden-units required to achieve a particular performance. Our close to state-of-the-art results for MNIST and NORB suggest that the ease of use and accuracy of the ELM algorithm for designing a single-hidden-layer neural network classifier should cause it to be given greater consideration either as a standalone method for simpler problems, or as the final classification stage in deep neural networks applied to more difficult problems. PMID:26262687

  2. Probabilistic hazard assessment for skin sensitization potency by dose–response modeling using feature elimination instead of quantitative structure–activity relationships

    PubMed Central

    McKim, James M.; Hartung, Thomas; Kleensang, Andre; Sá-Rocha, Vanessa

    2016-01-01

    Supervised learning methods promise to improve integrated testing strategies (ITS), but must be adjusted to handle high dimensionality and dose–response data. ITS approaches are currently fueled by the increasing mechanistic understanding of adverse outcome pathways (AOP) and the development of tests reflecting these mechanisms. Simple approaches to combine skin sensitization data sets, such as weight of evidence, fail due to problems in information redundancy and high dimension-ality. The problem is further amplified when potency information (dose/response) of hazards would be estimated. Skin sensitization currently serves as the foster child for AOP and ITS development, as legislative pressures combined with a very good mechanistic understanding of contact dermatitis have led to test development and relatively large high-quality data sets. We curated such a data set and combined a recursive variable selection algorithm to evaluate the information available through in silico, in chemico and in vitro assays. Chemical similarity alone could not cluster chemicals’ potency, and in vitro models consistently ranked high in recursive feature elimination. This allows reducing the number of tests included in an ITS. Next, we analyzed with a hidden Markov model that takes advantage of an intrinsic inter-relationship among the local lymph node assay classes, i.e. the monotonous connection between local lymph node assay and dose. The dose-informed random forest/hidden Markov model was superior to the dose-naive random forest model on all data sets. Although balanced accuracy improvement may seem small, this obscures the actual improvement in misclassifications as the dose-informed hidden Markov model strongly reduced "false-negatives" (i.e. extreme sensitizers as non-sensitizer) on all data sets. PMID:26046447

  3. Probabilistic hazard assessment for skin sensitization potency by dose-response modeling using feature elimination instead of quantitative structure-activity relationships.

    PubMed

    Luechtefeld, Thomas; Maertens, Alexandra; McKim, James M; Hartung, Thomas; Kleensang, Andre; Sá-Rocha, Vanessa

    2015-11-01

    Supervised learning methods promise to improve integrated testing strategies (ITS), but must be adjusted to handle high dimensionality and dose-response data. ITS approaches are currently fueled by the increasing mechanistic understanding of adverse outcome pathways (AOP) and the development of tests reflecting these mechanisms. Simple approaches to combine skin sensitization data sets, such as weight of evidence, fail due to problems in information redundancy and high dimensionality. The problem is further amplified when potency information (dose/response) of hazards would be estimated. Skin sensitization currently serves as the foster child for AOP and ITS development, as legislative pressures combined with a very good mechanistic understanding of contact dermatitis have led to test development and relatively large high-quality data sets. We curated such a data set and combined a recursive variable selection algorithm to evaluate the information available through in silico, in chemico and in vitro assays. Chemical similarity alone could not cluster chemicals' potency, and in vitro models consistently ranked high in recursive feature elimination. This allows reducing the number of tests included in an ITS. Next, we analyzed with a hidden Markov model that takes advantage of an intrinsic inter-relationship among the local lymph node assay classes, i.e. the monotonous connection between local lymph node assay and dose. The dose-informed random forest/hidden Markov model was superior to the dose-naive random forest model on all data sets. Although balanced accuracy improvement may seem small, this obscures the actual improvement in misclassifications as the dose-informed hidden Markov model strongly reduced " false-negatives" (i.e. extreme sensitizers as non-sensitizer) on all data sets. Copyright © 2015 John Wiley & Sons, Ltd.

  4. Mrs. Miniver's Girls: Plucky Girls in "Hidden Figures," "The Zookeeper's Wife," "Their Finest," and "Colossal"

    ERIC Educational Resources Information Center

    Beck, Bernard

    2017-01-01

    Four recent movies, "Hidden Figures," "The Zookeeper's Wife," "Their Finest," and "Colossal" exemplify a new cultural version of the movie heroine. This version combines feminism with commitment to solving an overwhelming problem. These heroines, thus, display the character virtues of Wonder Woman and Mrs.…

  5. Early Prediction of Students' Grade Point Averages at Graduation: A Data Mining Approach

    ERIC Educational Resources Information Center

    Tekin, Ahmet

    2014-01-01

    Problem Statement: There has recently been interest in educational databases containing a variety of valuable but sometimes hidden data that can be used to help less successful students to improve their academic performance. The extraction of hidden information from these databases often implements aspects of the educational data mining (EDM)…

  6. Dramatising the Hidden Hurt: Acting against Covert Bullying by Adolescent Girls

    ERIC Educational Resources Information Center

    Burton, Bruce

    2010-01-01

    This paper, delivered at the International Drama in Education Research Institute (IDIERI) conference in Sydney in July 2009, explores the outcomes of a project designed to apply the applied theatre techniques developed for the Acting Against Bullying programme to the specific problem of covert or hidden bullying by adolescent girls. Conducted in a…

  7. Dynamic extreme learning machine and its approximation capability.

    PubMed

    Zhang, Rui; Lan, Yuan; Huang, Guang-Bin; Xu, Zong-Ben; Soh, Yeng Chai

    2013-12-01

    Extreme learning machines (ELMs) have been proposed for generalized single-hidden-layer feedforward networks which need not be neuron alike and perform well in both regression and classification applications. The problem of determining the suitable network architectures is recognized to be crucial in the successful application of ELMs. This paper first proposes a dynamic ELM (D-ELM) where the hidden nodes can be recruited or deleted dynamically according to their significance to network performance, so that not only the parameters can be adjusted but also the architecture can be self-adapted simultaneously. Then, this paper proves in theory that such D-ELM using Lebesgue p-integrable hidden activation functions can approximate any Lebesgue p-integrable function on a compact input set. Simulation results obtained over various test problems demonstrate and verify that the proposed D-ELM does a good job reducing the network size while preserving good generalization performance.

  8. Identification of related gene/protein names based on an HMM of name variations.

    PubMed

    Yeganova, L; Smith, L; Wilbur, W J

    2004-04-01

    Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important problems in natural language processing. First, can one locate the names of genes or proteins in free text, and second, can one determine when two names denote the same gene or protein? The first of these problems is a special case of the problem of named entity recognition, while the second is a special case of the problem of automatic term recognition (ATR). We study the second problem, that of gene or protein name variation. Here we describe a system which, given a query gene or protein name, identifies related gene or protein names in a large list. The system is based on a dynamic programming algorithm for sequence alignment in which the mutation matrix is allowed to vary under the control of a fully trainable hidden Markov model.

  9. Reputation and Competition in a Hidden Action Model

    PubMed Central

    Fedele, Alessandro; Tedeschi, Piero

    2014-01-01

    The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium. PMID:25329387

  10. Reputation and competition in a hidden action model.

    PubMed

    Fedele, Alessandro; Tedeschi, Piero

    2014-01-01

    The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium.

  11. The role of community nursing in providing integrated care for older people with alcohol misuse.

    PubMed

    Rao, Tony

    2014-02-01

    Alcohol misuse in older people is a growing problem for health and social care providers, but remains largely hidden from public view and therefore largely overlooked by commissioners. Many older people with alcohol misuse have a 'dual diagnosis' (alcohol misuse accompanying other mental disorders) rather than alcohol misuse alone, which requires specialist nursing expertise. Over the past 10 years, assessment of and interventions for the detection of alcohol misuse in older people have been developed within one London borough. This article details the background, strategy and outcomes of this service, which provides integrated care in a multi-disciplinary community mental health team covering an inner-city area with a high prevalence of alcohol misuse and dual diagnosis in older people.

  12. Rare Z boson decays to a hidden sector

    DOE PAGES

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-18

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  13. Rare Z boson decays to a hidden sector

    DOE PAGES

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  14. Rare Z boson decays to a hidden sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  15. A comparative analysis of support vector machines and extreme learning machines.

    PubMed

    Liu, Xueyi; Gao, Chuanhou; Li, Ping

    2012-09-01

    The theory of extreme learning machines (ELMs) has recently become increasingly popular. As a new learning algorithm for single-hidden-layer feed-forward neural networks, an ELM offers the advantages of low computational cost, good generalization ability, and ease of implementation. Hence the comparison and model selection between ELMs and other kinds of state-of-the-art machine learning approaches has become significant and has attracted many research efforts. This paper performs a comparative analysis of the basic ELMs and support vector machines (SVMs) from two viewpoints that are different from previous works: one is the Vapnik-Chervonenkis (VC) dimension, and the other is their performance under different training sample sizes. It is shown that the VC dimension of an ELM is equal to the number of hidden nodes of the ELM with probability one. Additionally, their generalization ability and computational complexity are exhibited with changing training sample size. ELMs have weaker generalization ability than SVMs for small sample but can generalize as well as SVMs for large sample. Remarkably, great superiority in computational speed especially for large-scale sample problems is found in ELMs. The results obtained can provide insight into the essential relationship between them, and can also serve as complementary knowledge for their past experimental and theoretical comparisons. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    PubMed

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  17. The house economist and the eating paradox.

    PubMed

    Woods, Stephen C

    2002-04-01

    An important observation of the experiments of George Collier is that animals normally prefer to maintain their body weight by eating a large number of small meals each day. However, as the effort to obtain access to food increases, the animals adapt by changing to a schedule of eating a small number of large meals each day. A strong implication of this is that there is a hidden cost to eating large meals, and this is the basis of the eating paradox that states that although food is a necessary commodity, the act of ingesting it poses certain metabolic problems for animals. Experiments on cephalic insulin secretion, conditioned insulin secretion and meal feeding are discussed to make the point that the economy demonstrated by rats in Collier's paradigm is dictated in part by predictions of the eating paradox. Copyright 2002 Elsevier Science Ltd.

  18. Momentum-resolved hidden-order gap reveals symmetry breaking and origin of entropy loss in URu2Si2

    NASA Astrophysics Data System (ADS)

    Bareille, C.; Boariu, F. L.; Schwab, H.; Lejay, P.; Reinert, F.; Santander-Syro, A. F.

    2014-07-01

    Spontaneous symmetry breaking in physical systems leads to salient phenomena at all scales, from the Higgs mechanism and the emergence of the mass of the elementary particles, to superconductivity and magnetism in solids. The hidden-order state arising below 17.5 K in URu2Si2 is a puzzling example of one of such phase transitions: its associated broken symmetry and gap structure have remained longstanding riddles. Here we directly image how, across the hidden-order transition, the electronic structure of URu2Si2 abruptly reconstructs. We observe an energy gap of 7 meV opening over 70% of a large diamond-like heavy-fermion Fermi surface, resulting in the formation of four small Fermi petals, and a change in the electronic periodicity from body-centred tetragonal to simple tetragonal. Our results explain the large entropy loss in the hidden-order phase, and the similarity between this phase and the high-pressure antiferromagnetic phase found in quantum-oscillation experiments.

  19. Hidden SU ( N ) glueball dark matter

    DOE PAGES

    Soni, Amarjit; Zhang, Yue

    2016-06-21

    Here we investigate the possibility that the dark matter candidate is from a pure non-abelian gauge theory of the hidden sector, motivated in large part by its elegance and simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose-Einstein condensation leading to massive dark stars possibly millions of times heavier than our sun giving rise to gravitationalmore » lensing effects, and indirect detections through higher dimensional operators as well as interesting collider signatures.« less

  20. Symbolic Insight and Inhibitory Control: Two Problems Facing Young Children on Symbolic Retrieval Tasks

    ERIC Educational Resources Information Center

    Kuhlmeier, Valerie

    2005-01-01

    Many recent studies have explored young children's ability to use information from physical representations of space to guide search within the real world. In one commonly used procedure, children are asked to find a hidden toy in a room after observing a smaller toy being hidden in the analogous location in a scale model of the room.…

  1. Passing from Mesoscopy to Macroscopy. The Mesoscopic Parameter \\bar k

    NASA Astrophysics Data System (ADS)

    Maslov, V. P.

    2018-01-01

    In previous papers of the author it was shown that, depending on the hidden parameter, purely quantum problems behave like classical ones. In the present paper, it is shown that the Bose-Einstein and the Fermi-Dirac distributions, which until now were regarded as dealing with quantum particles, describe, for the appropriate values of the hidden parameter, the macroscopic thermodynamics of classical molecules.

  2. Harnessing the Hidden Curriculum: A Four-Step Approach to Developing and Reinforcing Reflective Competencies in Medical Clinical Clerkship

    ERIC Educational Resources Information Center

    Holmes, Cheryl L.; Harris, Ilene B.; Schwartz, Alan J.; Regehr, Glenn

    2015-01-01

    Changing the culture of medicine through the education of medical students has been proposed as a solution to the intractable problems of our profession. Yet few have explored the issues associated with making students partners in this change. There is a powerful hidden curriculum that perpetuates not only desired attitudes and behaviors but also…

  3. Generalization and capacity of extensively large two-layered perceptrons.

    PubMed

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2002-09-01

    The generalization ability and storage capacity of a treelike two-layered neural network with a number of hidden units scaling as the input dimension is examined. The mapping from the input to the hidden layer is via Boolean functions; the mapping from the hidden layer to the output is done by a perceptron. The analysis is within the replica framework where an order parameter characterizing the overlap between two networks in the combined space of Boolean functions and hidden-to-output couplings is introduced. The maximal capacity of such networks is found to scale linearly with the logarithm of the number of Boolean functions per hidden unit. The generalization process exhibits a first-order phase transition from poor to perfect learning for the case of discrete hidden-to-output couplings. The critical number of examples per input dimension, alpha(c), at which the transition occurs, again scales linearly with the logarithm of the number of Boolean functions. In the case of continuous hidden-to-output couplings, the generalization error decreases according to the same power law as for the perceptron, with the prefactor being different.

  4. Efficient Learning of Continuous-Time Hidden Markov Models for Disease Progression

    PubMed Central

    Liu, Yu-Ying; Li, Shuang; Li, Fuxin; Song, Le; Rehg, James M.

    2016-01-01

    The Continuous-Time Hidden Markov Model (CT-HMM) is an attractive approach to modeling disease progression due to its ability to describe noisy observations arriving irregularly in time. However, the lack of an efficient parameter learning algorithm for CT-HMM restricts its use to very small models or requires unrealistic constraints on the state transitions. In this paper, we present the first complete characterization of efficient EM-based learning methods for CT-HMM models. We demonstrate that the learning problem consists of two challenges: the estimation of posterior state probabilities and the computation of end-state conditioned statistics. We solve the first challenge by reformulating the estimation problem in terms of an equivalent discrete time-inhomogeneous hidden Markov model. The second challenge is addressed by adapting three approaches from the continuous time Markov chain literature to the CT-HMM domain. We demonstrate the use of CT-HMMs with more than 100 states to visualize and predict disease progression using a glaucoma dataset and an Alzheimer’s disease dataset. PMID:27019571

  5. Hidden Item Variance in Multiple Mini-Interview Scores

    ERIC Educational Resources Information Center

    Zaidi, Nikki L.; Swoboda, Christopher M.; Kelcey, Benjamin M.; Manuel, R. Stephen

    2017-01-01

    The extant literature has largely ignored a potentially significant source of variance in multiple mini-interview (MMI) scores by "hiding" the variance attributable to the sample of attributes used on an evaluation form. This potential source of hidden variance can be defined as rating items, which typically comprise an MMI evaluation…

  6. Intelligent classifier for dynamic fault patterns based on hidden Markov model

    NASA Astrophysics Data System (ADS)

    Xu, Bo; Feng, Yuguang; Yu, Jinsong

    2006-11-01

    It's difficult to build precise mathematical models for complex engineering systems because of the complexity of the structure and dynamics characteristics. Intelligent fault diagnosis introduces artificial intelligence and works in a different way without building the analytical mathematical model of a diagnostic object, so it's a practical approach to solve diagnostic problems of complex systems. This paper presents an intelligent fault diagnosis method, an integrated fault-pattern classifier based on Hidden Markov Model (HMM). This classifier consists of dynamic time warping (DTW) algorithm, self-organizing feature mapping (SOFM) network and Hidden Markov Model. First, after dynamic observation vector in measuring space is processed by DTW, the error vector including the fault feature of being tested system is obtained. Then a SOFM network is used as a feature extractor and vector quantization processor. Finally, fault diagnosis is realized by fault patterns classifying with the Hidden Markov Model classifier. The importing of dynamic time warping solves the problem of feature extracting from dynamic process vectors of complex system such as aeroengine, and makes it come true to diagnose complex system by utilizing dynamic process information. Simulating experiments show that the diagnosis model is easy to extend, and the fault pattern classifier is efficient and is convenient to the detecting and diagnosing of new faults.

  7. Phenomenology of pure-gauge hidden valleys at hadron colliders

    NASA Astrophysics Data System (ADS)

    Juknevich, Jose E.

    Expectations for new physics at the LHC have been greatly influenced by the Hierarchy problem of electroweak symmetry breaking. However, there are reasons to believe that the LHC may still discover new physics, but not directly related to the resolution of the Hierarchy problem. To ensure that such a physics does not go undiscovered requires precise understanding of how new phenomena will reveal themselves in the current and future generation of particle-physics experiments. Given this fact it seems sensible to explore other approaches to this problem; we study three alternatives here. In this thesis I argue for the plausibility that the standard model is coupled, through new massive charged or colored particles, to a hidden sector whose low energy dynamics is controlled by a pure Yang-Mills theory, with no light matter. Such a sector would have numerous metastable "hidden glueballs" built from the hidden gluons. These states would decay to particles of the standard model. I consider the phenomenology of this scenario, and find formulas for the lifetimes and branching ratios of the most important of these states. The dominant decays are to two standard model gauge bosons or to fermion-antifermion pairs, or by radiative decays with photon or Higgs emission, leading to jet- and photon-rich signals, and some occasional leptons. The presence of effective operators of different mass dimensions, often competing with each other, together with a great diversity of states, leads to a great variability in the lifetimes and decay modes of the hidden glueballs. I find that most of the operators considered in this work are not heavily constrained by precision electroweak physics, therefore leaving plenty of room in the parameter space to be explored by the future experiments at the LHC. Finally, I discuss several issues on the phenomenology of the new massive particles as well as an outlook for experimental searches.

  8. Variance Estimation, Design Effects, and Sample Size Calculations for Respondent-Driven Sampling

    PubMed Central

    2006-01-01

    Hidden populations, such as injection drug users and sex workers, are central to a number of public health problems. However, because of the nature of these groups, it is difficult to collect accurate information about them, and this difficulty complicates disease prevention efforts. A recently developed statistical approach called respondent-driven sampling improves our ability to study hidden populations by allowing researchers to make unbiased estimates of the prevalence of certain traits in these populations. Yet, not enough is known about the sample-to-sample variability of these prevalence estimates. In this paper, we present a bootstrap method for constructing confidence intervals around respondent-driven sampling estimates and demonstrate in simulations that it outperforms the naive method currently in use. We also use simulations and real data to estimate the design effects for respondent-driven sampling in a number of situations. We conclude with practical advice about the power calculations that are needed to determine the appropriate sample size for a study using respondent-driven sampling. In general, we recommend a sample size twice as large as would be needed under simple random sampling. PMID:16937083

  9. Cosmological abundance of the QCD axion coupled to hidden photons

    NASA Astrophysics Data System (ADS)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  10. The Future of Warfare and Impact of Space Operations

    DTIC Science & Technology

    2011-01-01

    cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend

  11. Uncovering hidden nodes in complex networks in the presence of noise

    PubMed Central

    Su, Ri-Qi; Lai, Ying-Cheng; Wang, Xiao; Do, Younghae

    2014-01-01

    Ascertaining the existence of hidden objects in a complex system, objects that cannot be observed from the external world, not only is curiosity-driven but also has significant practical applications. Generally, uncovering a hidden node in a complex network requires successful identification of its neighboring nodes, but a challenge is to differentiate its effects from those of noise. We develop a completely data-driven, compressive-sensing based method to address this issue by utilizing complex weighted networks with continuous-time oscillatory or discrete-time evolutionary-game dynamics. For any node, compressive sensing enables accurate reconstruction of the dynamical equations and coupling functions, provided that time series from this node and all its neighbors are available. For a neighboring node of the hidden node, this condition cannot be met, resulting in abnormally large prediction errors that, counterintuitively, can be used to infer the existence of the hidden node. Based on the principle of differential signal, we demonstrate that, when strong noise is present, insofar as at least two neighboring nodes of the hidden node are subject to weak background noise only, unequivocal identification of the hidden node can be achieved. PMID:24487720

  12. Synchronization behaviors of coupled systems composed of hidden attractors

    NASA Astrophysics Data System (ADS)

    Zhang, Ge; Wu, Fuqiang; Wang, Chunni; Ma, Jun

    2017-10-01

    Based on a class of chaotic system composed of hidden attractors, in which the equilibrium points are described by a circular function, complete synchronization between two identical systems, pattern formation and synchronization of network is investigated, respectively. A statistical factor of synchronization is defined and calculated by using the mean field theory, the dependence of synchronization on bifurcation parameters discussed in numerical way. By setting a chain network, which local kinetic is described by hidden attractors, synchronization approach is investigated. It is found that the synchronization and pattern formation are dependent on the coupling intensity and also the selection of coupling variables. In the end, open problems are proposed for readers’ extensive guidance and investigation.

  13. StegoWall: blind statistical detection of hidden data

    NASA Astrophysics Data System (ADS)

    Voloshynovskiy, Sviatoslav V.; Herrigel, Alexander; Rytsar, Yuri B.; Pun, Thierry

    2002-04-01

    Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly interests. The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection. This paper advocates the need for detecting hidden data in digital and analog media as well as in electronic transmissions, and for attempting to identify the underlying hidden data. Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange. The proposed architecture is called StegoWall; its key aspects are the solid investigation, the deep understanding, and the prediction of possible tendencies in the development of advanced data hiding technologies. The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and internet/network security.

  14. Hidden Hazards of Radon: Scanning the Country for Problem Locations.

    ERIC Educational Resources Information Center

    Gundersen, Linda C. S.

    1992-01-01

    Describes the geology of the radon problem in the United States and suggests how homeowners can cope with the radio active gas. Vignettes illustrate how and where radon is produced beneath the earth's surface, testing sites and procedures for radon in houses, and locations for potential radon problems across the United States. (MCO)

  15. A theory of cerebellar cortex and adaptive motor control based on two types of universal function approximation capability.

    PubMed

    Fujita, Masahiko

    2016-03-01

    Lesions of the cerebellum result in large errors in movements. The cerebellum adaptively controls the strength and timing of motor command signals depending on the internal and external environments of movements. The present theory describes how the cerebellar cortex can control signals for accurate and timed movements. A model network of the cerebellar Golgi and granule cells is shown to be equivalent to a multiple-input (from mossy fibers) hierarchical neural network with a single hidden layer of threshold units (granule cells) that receive a common recurrent inhibition (from a Golgi cell). The weighted sum of the hidden unit signals (Purkinje cell output) is theoretically analyzed regarding the capability of the network to perform two types of universal function approximation. The hidden units begin firing as the excitatory inputs exceed the recurrent inhibition. This simple threshold feature leads to the first approximation theory, and the network final output can be any continuous function of the multiple inputs. When the input is constant, this output becomes stationary. However, when the recurrent unit activity is triggered to decrease or the recurrent inhibition is triggered to increase through a certain mechanism (metabotropic modulation or extrasynaptic spillover), the network can generate any continuous signals for a prolonged period of change in the activity of recurrent signals, as the second approximation theory shows. By incorporating the cerebellar capability of two such types of approximations to a motor system, in which learning proceeds through repeated movement trials with accompanying corrections, accurate and timed responses for reaching the target can be adaptively acquired. Simple models of motor control can solve the motor error vs. sensory error problem, as well as the structural aspects of credit (or error) assignment problem. Two physiological experiments are proposed for examining the delay and trace conditioning of eyelid responses, as well as saccade adaptation, to investigate this novel idea of cerebellar processing. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Optical character recognition of handwritten Arabic using hidden Markov models

    NASA Astrophysics Data System (ADS)

    Aulama, Mohannad M.; Natsheh, Asem M.; Abandah, Gheith A.; Olama, Mohammed M.

    2011-04-01

    The problem of optical character recognition (OCR) of handwritten Arabic has not received a satisfactory solution yet. In this paper, an Arabic OCR algorithm is developed based on Hidden Markov Models (HMMs) combined with the Viterbi algorithm, which results in an improved and more robust recognition of characters at the sub-word level. Integrating the HMMs represents another step of the overall OCR trends being currently researched in the literature. The proposed approach exploits the structure of characters in the Arabic language in addition to their extracted features to achieve improved recognition rates. Useful statistical information of the Arabic language is initially extracted and then used to estimate the probabilistic parameters of the mathematical HMM. A new custom implementation of the HMM is developed in this study, where the transition matrix is built based on the collected large corpus, and the emission matrix is built based on the results obtained via the extracted character features. The recognition process is triggered using the Viterbi algorithm which employs the most probable sequence of sub-words. The model was implemented to recognize the sub-word unit of Arabic text raising the recognition rate from being linked to the worst recognition rate for any character to the overall structure of the Arabic language. Numerical results show that there is a potentially large recognition improvement by using the proposed algorithms.

  17. Optical character recognition of handwritten Arabic using hidden Markov models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aulama, Mohannad M.; Natsheh, Asem M.; Abandah, Gheith A.

    2011-01-01

    The problem of optical character recognition (OCR) of handwritten Arabic has not received a satisfactory solution yet. In this paper, an Arabic OCR algorithm is developed based on Hidden Markov Models (HMMs) combined with the Viterbi algorithm, which results in an improved and more robust recognition of characters at the sub-word level. Integrating the HMMs represents another step of the overall OCR trends being currently researched in the literature. The proposed approach exploits the structure of characters in the Arabic language in addition to their extracted features to achieve improved recognition rates. Useful statistical information of the Arabic language ismore » initially extracted and then used to estimate the probabilistic parameters of the mathematical HMM. A new custom implementation of the HMM is developed in this study, where the transition matrix is built based on the collected large corpus, and the emission matrix is built based on the results obtained via the extracted character features. The recognition process is triggered using the Viterbi algorithm which employs the most probable sequence of sub-words. The model was implemented to recognize the sub-word unit of Arabic text raising the recognition rate from being linked to the worst recognition rate for any character to the overall structure of the Arabic language. Numerical results show that there is a potentially large recognition improvement by using the proposed algorithms.« less

  18. Hidden simplicity of gauge theory amplitudes

    NASA Astrophysics Data System (ADS)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  19. Optimal matching for prostate brachytherapy seed localization with dimension reduction.

    PubMed

    Lee, Junghoon; Labat, Christian; Jain, Ameet K; Song, Danny Y; Burdette, Everette C; Fichtinger, Gabor; Prince, Jerry L

    2009-01-01

    In prostate brachytherapy, x-ray fluoroscopy has been used for intra-operative dosimetry to provide qualitative assessment of implant quality. More recent developments have made possible 3D localization of the implanted radioactive seeds. This is usually modeled as an assignment problem and solved by resolving the correspondence of seeds. It is, however, NP-hard, and the problem is even harder in practice due to the significant number of hidden seeds. In this paper, we propose an algorithm that can find an optimal solution from multiple projection images with hidden seeds. It solves an equivalent problem with reduced dimensional complexity, thus allowing us to find an optimal solution in polynomial time. Simulation results show the robustness of the algorithm. It was validated on 5 phantom and 18 patient datasets, successfully localizing the seeds with detection rate of > or = 97.6% and reconstruction error of < or = 1.2 mm. This is considered to be clinically excellent performance.

  20. Uncovering Heavily Obscured AGN with WISE and NuSTAR

    NASA Astrophysics Data System (ADS)

    Hickox, Ryan C.; Carroll, Christopher M.; Yan, Wei; DiPompeo, Michael A.; Hainline, Kevin N.; NuSTAR Obscured AGN Team

    2018-01-01

    Supermassive black holes gain their mass through accretion as active galactic nuclei (AGN), but it is now clear that a large fraction of this growth is "hidden" behind large columns of gas and dust. Of particular interest are Compton-thick (CT) AGN, with columns NH > 1024 cm-2, that have been difficult to identify using optical or soft X-ray surveys. We will present two studies of heavily obscured AGN that aim to uncover more of the full population of "hidden" growing black holes: (1) Analysis of the spectral energy distributions of millions of galaxies with photometry from WISE (mid-IR), UKIDSS (near-IR), and SDSS (optical), that uncovers large populations of weak or heavily buried AGN, and (2) NuSTAR observations of a sample of candidate highly obscured AGN, selected from WISE and SDSS photometry,and confirmed using SALT and Keck spectroscopy. The NuSTAR data reveal the existence of powerful CT quasars with extremely large columns NH > 1025 cm-2, which may represent a significant fraction of previously hidden black hole growth. This work is supported by NASA grant numbers NNX16AN48G and NNX15AP24G, and the NSF through grant numbers 1515364 and 1554584.

  1. Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look

    DOE PAGES

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-11-24

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. Here, we also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less

  2. Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-09-20

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less

  3. Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look

    NASA Astrophysics Data System (ADS)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-11-01

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  4. Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. Here, we also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less

  5. Object permanence in domestic dogs (Canis lupus familiaris) and gray wolves (Canis lupus).

    PubMed

    Fiset, Sylvain; Plourde, Vickie

    2013-05-01

    Recent evidence suggests that phylogenetic constraints exerted on dogs by the process of domestication have altered the ability of dogs to represent the physical world and the displacement of objects. In this study, invisible (Experiment 1) and visible (Experiment 2) displacement problems were administered to determine whether domestic dogs' and gray wolves' cognitive capacities to infer the position of a hidden object differ. The results revealed that adult dogs and wolves performed similarly in searching for disappearing objects: Both species succeeded the visible displacement tasks but failed the invisible displacement problems. We conclude that physical cognition for finding hidden objects in domestic dogs and gray wolves is alike and unrelated to the process of domestication.

  6. Parametric inference for biological sequence analysis.

    PubMed

    Pachter, Lior; Sturmfels, Bernd

    2004-11-16

    One of the major successes in computational biology has been the unification, by using the graphical model formalism, of a multitude of algorithms for annotating and comparing biological sequences. Graphical models that have been applied to these problems include hidden Markov models for annotation, tree models for phylogenetics, and pair hidden Markov models for alignment. A single algorithm, the sum-product algorithm, solves many of the inference problems that are associated with different statistical models. This article introduces the polytope propagation algorithm for computing the Newton polytope of an observation from a graphical model. This algorithm is a geometric version of the sum-product algorithm and is used to analyze the parametric behavior of maximum a posteriori inference calculations for graphical models.

  7. Discovering Hidden Connections among Diseases, Genes and Drugs Based on Microarray Expression Profiles with Negative-Term Filtering

    PubMed Central

    2014-01-01

    Microarrays based on gene expression profiles (GEPs) can be tailored specifically for a variety of topics to provide a precise and efficient means with which to discover hidden information. This study proposes a novel means of employing existing GEPs to reveal hidden relationships among diseases, genes, and drugs within a rich biomedical database, PubMed. Unlike the co-occurrence method, which considers only the appearance of keywords, the proposed method also takes into account negative relationships and non-relationships among keywords, the importance of which has been demonstrated in previous studies. Three scenarios were conducted to verify the efficacy of the proposed method. In Scenario 1, disease and drug GEPs (disease: lymphoma cancer, lymph node cancer, and drug: cyclophosphamide) were used to obtain lists of disease- and drug-related genes. Fifteen hidden connections were identified between the diseases and the drug. In Scenario 2, we adopted different diseases and drug GEPs (disease: AML-ALL dataset and drug: Gefitinib) to obtain lists of important diseases and drug-related genes. In this case, ten hidden connections were identified. In Scenario 3, we obtained a list of disease-related genes from the disease-related GEP (liver cancer) and the drug (Capecitabine) on the PharmGKB website, resulting in twenty-two hidden connections. Experimental results demonstrate the efficacy of the proposed method in uncovering hidden connections among diseases, genes, and drugs. Following implementation of the weight function in the proposed method, a large number of the documents obtained in each of the scenarios were judged to be related: 834 of 4028 documents, 789 of 1216 documents, and 1928 of 3791 documents in Scenarios 1, 2, and 3, respectively. The negative-term filtering scheme also uncovered a large number of negative relationships as well as non-relationships among these connections: 97 of 834, 38 of 789, and 202 of 1928 in Scenarios 1, 2, and 3, respectively. PMID:24915461

  8. XM25 Schedule Delays, Cost Increases, and Performance Problems Continue, and Procurement Quantity Not Justified (REDACTED)

    DTIC Science & Technology

    2016-08-29

    ammunition. (FOUO) Figure 1. XM25 Weapon System and Air Bursting Ammunition 3 Hidden refers to the enemy seeking cover in trenches; behind walls, rocks ...system that fires 25mm high-explosive, air- bursting ammunition to allow soldiers to fire at hidden enemy targets. Findings Army officials could...XM25 Weapon System The XM25 is a semiautomatic, shoulder-fired weapon system that fires 25mm high-explosive, air- bursting ammunition to allow soldiers

  9. Solving the "Hidden Line" Problem

    NASA Technical Reports Server (NTRS)

    1984-01-01

    David Hedgley Jr., a mathematician at Dryden Flight Research Center, has developed an accurate computer program that considers whether a line in a graphic model of a three dimensional object should or should not be visible. The Hidden Line Computer Code, program automatically removes superfluous lines and permits the computer to display an object from specific viewpoints, just as the human eye would see it. Users include Rowland Institute for Science in Cambridge, MA, several departments of Lockheed Georgia Co., and Nebraska Public Power District (NPPD).

  10. A Hidden Curriculum in Language Textbooks: Are Beginning Learners of French at U.S. Universities Taught about Canada?

    ERIC Educational Resources Information Center

    Chapelle, Carol A.

    2009-01-01

    This study investigated a hidden curriculum in published language teaching materials by tabulating the number of instances that Canada was mentioned in 9 French textbooks and their accompanying workbooks and CD-ROMs. The materials were used at large public universities in the northern United States. For the present study, 2 raters, a Quebecois…

  11. Reconfiguring the Shipping News: Maritime's Hidden Histories and the Politics of Gender Display

    ERIC Educational Resources Information Center

    Meecham, Pam

    2008-01-01

    This paper discusses the book "Hello Sailor! The Hidden History of Gay Life at Sea" published in 2003 by Paul Baker and Jo Stanley, re-interpreted as a landmark temporary exhibition "Hello Sailor! Gay Life on the Ocean Wave" at the Merseyside Maritime Museum, Liverpool from where it travelled in 2007 to other maritime museums. Based largely on…

  12. Extracting hidden messages in steganographic images

    DOE PAGES

    Quach, Tu-Thach

    2014-07-17

    The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less

  13. Hidden vorticity in binary Bose-Einstein condensates

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brtka, Marijana; Gammal, Arnaldo; Malomed, Boris A.

    We consider a binary Bose-Einstein condensate (BEC) described by a system of two-dimensional (2D) Gross-Pitaevskii equations with the harmonic-oscillator trapping potential. The intraspecies interactions are attractive, while the interaction between the species may have either sign. The same model applies to the copropagation of bimodal beams in photonic-crystal fibers. We consider a family of trapped hidden-vorticity (HV) modes in the form of bound states of two components with opposite vorticities S{sub 1,2}={+-}1, the total angular momentum being zero. A challenging problem is the stability of the HV modes. By means of a linear-stability analysis and direct simulations, stability domains aremore » identified in a relevant parameter plane. In direct simulations, stable HV modes feature robustness against large perturbations, while unstable ones split into fragments whose number is identical to the azimuthal index of the fastest growing perturbation eigenmode. Conditions allowing for the creation of the HV modes in the experiment are discussed too. For comparison, a similar but simpler problem is studied in an analytical form, viz., the modulational instability of an HV state in a one-dimensional (1D) system with periodic boundary conditions (this system models a counterflow in a binary BEC mixture loaded into a toroidal trap or a bimodal optical beam coupled into a cylindrical shell). We demonstrate that the stabilization of the 1D HV modes is impossible, which stresses the significance of the stabilization of the HV modes in the 2D setting.« less

  14. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    PubMed

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Biased Dropout and Crossmap Dropout: Learning towards effective Dropout regularization in convolutional neural network.

    PubMed

    Poernomo, Alvin; Kang, Dae-Ki

    2018-08-01

    Training a deep neural network with a large number of parameters often leads to overfitting problem. Recently, Dropout has been introduced as a simple, yet effective regularization approach to combat overfitting in such models. Although Dropout has shown remarkable results on many deep neural network cases, its actual effect on CNN has not been thoroughly explored. Moreover, training a Dropout model will significantly increase the training time as it takes longer time to converge than a non-Dropout model with the same architecture. To deal with these issues, we address Biased Dropout and Crossmap Dropout, two novel approaches of Dropout extension based on the behavior of hidden units in CNN model. Biased Dropout divides the hidden units in a certain layer into two groups based on their magnitude and applies different Dropout rate to each group appropriately. Hidden units with higher activation value, which give more contributions to the network final performance, will be retained by a lower Dropout rate, while units with lower activation value will be exposed to a higher Dropout rate to compensate the previous part. The second approach is Crossmap Dropout, which is an extension of the regular Dropout in convolution layer. Each feature map in a convolution layer has a strong correlation between each other, particularly in every identical pixel location in each feature map. Crossmap Dropout tries to maintain this important correlation yet at the same time break the correlation between each adjacent pixel with respect to all feature maps by applying the same Dropout mask to all feature maps, so that all pixels or units in equivalent positions in each feature map will be either dropped or active during training. Our experiment with various benchmark datasets shows that our approaches provide better generalization than the regular Dropout. Moreover, our Biased Dropout takes faster time to converge during training phase, suggesting that assigning noise appropriately in hidden units can lead to an effective regularization. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. A Hidden Markov Model Approach to the Problem of Heuristic Selection in Hyper-Heuristics with a Case Study in High School Timetabling Problems.

    PubMed

    Kheiri, Ahmed; Keedwell, Ed

    2017-01-01

    Operations research is a well-established field that uses computational systems to support decisions in business and public life. Good solutions to operations research problems can make a large difference to the efficient running of businesses and organisations and so the field often searches for new methods to improve these solutions. The high school timetabling problem is an example of an operations research problem and is a challenging task which requires assigning events and resources to time slots subject to a set of constraints. In this article, a new sequence-based selection hyper-heuristic is presented that produces excellent results on a suite of high school timetabling problems. In this study, we present an easy-to-implement, easy-to-maintain, and effective sequence-based selection hyper-heuristic to solve high school timetabling problems using a benchmark of unified real-world instances collected from different countries. We show that with sequence-based methods, it is possible to discover new best known solutions for a number of the problems in the timetabling domain. Through this investigation, the usefulness of sequence-based selection hyper-heuristics has been demonstrated and the capability of these methods has been shown to exceed the state of the art.

  17. Using Grid Cells for Navigation

    PubMed Central

    Bush, Daniel; Barry, Caswell; Manson, Daniel; Burgess, Neil

    2015-01-01

    Summary Mammals are able to navigate to hidden goal locations by direct routes that may traverse previously unvisited terrain. Empirical evidence suggests that this “vector navigation” relies on an internal representation of space provided by the hippocampal formation. The periodic spatial firing patterns of grid cells in the hippocampal formation offer a compact combinatorial code for location within large-scale space. Here, we consider the computational problem of how to determine the vector between start and goal locations encoded by the firing of grid cells when this vector may be much longer than the largest grid scale. First, we present an algorithmic solution to the problem, inspired by the Fourier shift theorem. Second, we describe several potential neural network implementations of this solution that combine efficiency of search and biological plausibility. Finally, we discuss the empirical predictions of these implementations and their relationship to the anatomy and electrophysiology of the hippocampal formation. PMID:26247860

  18. Automation and adaptation: Nurses' problem-solving behavior following the implementation of bar coded medication administration technology.

    PubMed

    Holden, Richard J; Rivera-Rodriguez, A Joy; Faye, Héléne; Scanlon, Matthew C; Karsh, Ben-Tzion

    2013-08-01

    The most common change facing nurses today is new technology, particularly bar coded medication administration technology (BCMA). However, there is a dearth of knowledge on how BCMA alters nursing work. This study investigated how BCMA technology affected nursing work, particularly nurses' operational problem-solving behavior. Cognitive systems engineering observations and interviews were conducted after the implementation of BCMA in three nursing units of a freestanding pediatric hospital. Problem-solving behavior, associated problems, and goals, were specifically defined and extracted from observed episodes of care. Three broad themes regarding BCMA's impact on problem solving were identified. First, BCMA allowed nurses to invent new problem-solving behavior to deal with pre-existing problems. Second, BCMA made it difficult or impossible to apply some problem-solving behaviors that were commonly used pre-BCMA, often requiring nurses to use potentially risky workarounds to achieve their goals. Third, BCMA created new problems that nurses were either able to solve using familiar or novel problem-solving behaviors, or unable to solve effectively. Results from this study shed light on hidden hazards and suggest three critical design needs: (1) ecologically valid design; (2) anticipatory control; and (3) basic usability. Principled studies of the actual nature of clinicians' work, including problem solving, are necessary to uncover hidden hazards and to inform health information technology design and redesign.

  19. Automation and adaptation: Nurses’ problem-solving behavior following the implementation of bar coded medication administration technology

    PubMed Central

    Holden, Richard J.; Rivera-Rodriguez, A. Joy; Faye, Héléne; Scanlon, Matthew C.; Karsh, Ben-Tzion

    2012-01-01

    The most common change facing nurses today is new technology, particularly bar coded medication administration technology (BCMA). However, there is a dearth of knowledge on how BCMA alters nursing work. This study investigated how BCMA technology affected nursing work, particularly nurses’ operational problem-solving behavior. Cognitive systems engineering observations and interviews were conducted after the implementation of BCMA in three nursing units of a freestanding pediatric hospital. Problem-solving behavior, associated problems, and goals, were specifically defined and extracted from observed episodes of care. Three broad themes regarding BCMA’s impact on problem solving were identified. First, BCMA allowed nurses to invent new problem-solving behavior to deal with pre-existing problems. Second, BCMA made it difficult or impossible to apply some problem-solving behaviors that were commonly used pre-BCMA, often requiring nurses to use potentially risky workarounds to achieve their goals. Third, BCMA created new problems that nurses were either able to solve using familiar or novel problem-solving behaviors, or unable to solve effectively. Results from this study shed light on hidden hazards and suggest three critical design needs: (1) ecologically valid design; (2) anticipatory control; and (3) basic usability. Principled studies of the actual nature of clinicians’ work, including problem solving, are necessary to uncover hidden hazards and to inform health information technology design and redesign. PMID:24443642

  20. Using Educational Data Mining Methods to Assess Field-Dependent and Field-Independent Learners' Complex Problem Solving

    ERIC Educational Resources Information Center

    Angeli, Charoula; Valanides, Nicos

    2013-01-01

    The present study investigated the problem-solving performance of 101 university students and their interactions with a computer modeling tool in order to solve a complex problem. Based on their performance on the hidden figures test, students were assigned to three groups of field-dependent (FD), field-mixed (FM), and field-independent (FI)…

  1. Implications of two-component dark matter induced by forbidden channels and thermal freeze-out

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aoki, Mayumi; Toma, Takashi, E-mail: mayumi@hep.s.kanazawa-u.ac.jp, E-mail: takashi.toma@tum.de

    2017-01-01

    We consider a model of two-component dark matter based on a hidden U(1) {sub D} symmetry, in which relic densities of the dark matter are determined by forbidden channels and thermal freeze-out. The hidden U(1) {sub D} symmetry is spontaneously broken to a residual Z{sub 4} symmetry, and the lightest Z{sub 4} charged particle can be a dark matter candidate. Moreover, depending on the mass hierarchy in the dark sector, we have two-component dark matter. We show that the relic density of the lighter dark matter component can be determined by forbidden annihilation channels which require larger couplings compared tomore » the normal freeze-out mechanism. As a result, a large self-interaction of the lighter dark matter component can be induced, which may solve small scale problems of ΛCDM model. On the other hand, the heavier dark matter component is produced by normal freeze-out mechanism. We find that interesting implications emerge between the two dark matter components in this framework. We explore detectabilities of these dark matter particles and show some parameter space can be tested by the SHiP experiment.« less

  2. Simultaneous escaping of explicit and hidden free energy barriers: application of the orthogonal space random walk strategy in generalized ensemble based conformational sampling.

    PubMed

    Zheng, Lianqing; Chen, Mengen; Yang, Wei

    2009-06-21

    To overcome the pseudoergodicity problem, conformational sampling can be accelerated via generalized ensemble methods, e.g., through the realization of random walks along prechosen collective variables, such as spatial order parameters, energy scaling parameters, or even system temperatures or pressures, etc. As usually observed, in generalized ensemble simulations, hidden barriers are likely to exist in the space perpendicular to the collective variable direction and these residual free energy barriers could greatly abolish the sampling efficiency. This sampling issue is particularly severe when the collective variable is defined in a low-dimension subset of the target system; then the "Hamiltonian lagging" problem, which reveals the fact that necessary structural relaxation falls behind the move of the collective variable, may be likely to occur. To overcome this problem in equilibrium conformational sampling, we adopted the orthogonal space random walk (OSRW) strategy, which was originally developed in the context of free energy simulation [L. Zheng, M. Chen, and W. Yang, Proc. Natl. Acad. Sci. U.S.A. 105, 20227 (2008)]. Thereby, generalized ensemble simulations can simultaneously escape both the explicit barriers along the collective variable direction and the hidden barriers that are strongly coupled with the collective variable move. As demonstrated in our model studies, the present OSRW based generalized ensemble treatments show improved sampling capability over the corresponding classical generalized ensemble treatments.

  3. Cosmological signatures of a UV-conformal standard model.

    PubMed

    Dorsch, Glauber C; Huber, Stephan J; No, Jose Miguel

    2014-09-19

    Quantum scale invariance in the UV has been recently advocated as an attractive way of solving the gauge hierarchy problem arising in the standard model. We explore the cosmological signatures at the electroweak scale when the breaking of scale invariance originates from a hidden sector and is mediated to the standard model by gauge interactions (gauge mediation). These scenarios, while being hard to distinguish from the standard model at LHC, can give rise to a strong electroweak phase transition leading to the generation of a large stochastic gravitational wave signal in possible reach of future space-based detectors such as eLISA and BBO. This relic would be the cosmological imprint of the breaking of scale invariance in nature.

  4. Sparse Zero-Sum Games as Stable Functional Feature Selection

    PubMed Central

    Sokolovska, Nataliya; Teytaud, Olivier; Rizkalla, Salwa; Clément, Karine; Zucker, Jean-Daniel

    2015-01-01

    In large-scale systems biology applications, features are structured in hidden functional categories whose predictive power is identical. Feature selection, therefore, can lead not only to a problem with a reduced dimensionality, but also reveal some knowledge on functional classes of variables. In this contribution, we propose a framework based on a sparse zero-sum game which performs a stable functional feature selection. In particular, the approach is based on feature subsets ranking by a thresholding stochastic bandit. We provide a theoretical analysis of the introduced algorithm. We illustrate by experiments on both synthetic and real complex data that the proposed method is competitive from the predictive and stability viewpoints. PMID:26325268

  5. Conference Summary

    NASA Technical Reports Server (NTRS)

    Begelman, Mitchell C.

    1997-01-01

    At the end of three days' spirited discussion of the type 2 Seyfert galaxy NGC 1068, what do we think we understand about this object? New observations, particularly in the infrared and radio are helping to resolve old problems, while drawing attention to new ones. It appears that NGC 1068 is a relatively normal spiral galaxy in which large-scale gravitational disturbances are funneling matter into the nucleus. A collimated outflow disturbs the interstellar medium out to kiloparsec scales, but the nucleus itself is hidden behind an opaque screen. Radio observations have now pierced the screen, and suggest that at the center of it all, a 10-20 million solar mass black hole is accreting at close to its Eddington limit.

  6. An Intelligent Ensemble Neural Network Model for Wind Speed Prediction in Renewable Energy Systems.

    PubMed

    Ranganayaki, V; Deepa, S N

    2016-01-01

    Various criteria are proposed to select the number of hidden neurons in artificial neural network (ANN) models and based on the criterion evolved an intelligent ensemble neural network model is proposed to predict wind speed in renewable energy applications. The intelligent ensemble neural model based wind speed forecasting is designed by averaging the forecasted values from multiple neural network models which includes multilayer perceptron (MLP), multilayer adaptive linear neuron (Madaline), back propagation neural network (BPN), and probabilistic neural network (PNN) so as to obtain better accuracy in wind speed prediction with minimum error. The random selection of hidden neurons numbers in artificial neural network results in overfitting or underfitting problem. This paper aims to avoid the occurrence of overfitting and underfitting problems. The selection of number of hidden neurons is done in this paper employing 102 criteria; these evolved criteria are verified by the computed various error values. The proposed criteria for fixing hidden neurons are validated employing the convergence theorem. The proposed intelligent ensemble neural model is applied for wind speed prediction application considering the real time wind data collected from the nearby locations. The obtained simulation results substantiate that the proposed ensemble model reduces the error value to minimum and enhances the accuracy. The computed results prove the effectiveness of the proposed ensemble neural network (ENN) model with respect to the considered error factors in comparison with that of the earlier models available in the literature.

  7. May Stakeholders be Involved in Design Without Informed Consent? The Case of Hidden Design.

    PubMed

    Pols, A J K

    2017-06-01

    Stakeholder involvement in design is desirable from both a practical and an ethical point of view. It is difficult to do well, however, and some problems recur again and again, both of a practical nature, e.g. stakeholders acting strategically rather than openly, and of an ethical nature, e.g. power imbalances unduly affecting the outcome of the process. Hidden Design has been proposed as a method to deal with the practical problems of stakeholder involvement. It aims to do so by taking the observation of stakeholder actions, rather than the outcomes of a deliberative process, as its input. Furthermore, it hides from stakeholders the fact that a design process is taking place so that they will not behave differently than they otherwise would. Both aspects of Hidden Design have raised ethical worries. In this paper I make an ethical analysis of what it means for a design process to leave participants uninformed or deceived rather than acquiring their informed consent beforehand, and to use observation of actions rather than deliberation as input for design, using Hidden Design as a case study. This analysis is based on two sets of normative guidelines: the ethical guidelines for psychological research involving deception or uninformed participants from two professional psychological organisations, and Habermasian norms for a fair and just (deliberative) process. It supports the conclusion that stakeholder involvement in design organised in this way can be ethically acceptable, though under a number of conditions and constraints.

  8. An Intelligent Ensemble Neural Network Model for Wind Speed Prediction in Renewable Energy Systems

    PubMed Central

    Ranganayaki, V.; Deepa, S. N.

    2016-01-01

    Various criteria are proposed to select the number of hidden neurons in artificial neural network (ANN) models and based on the criterion evolved an intelligent ensemble neural network model is proposed to predict wind speed in renewable energy applications. The intelligent ensemble neural model based wind speed forecasting is designed by averaging the forecasted values from multiple neural network models which includes multilayer perceptron (MLP), multilayer adaptive linear neuron (Madaline), back propagation neural network (BPN), and probabilistic neural network (PNN) so as to obtain better accuracy in wind speed prediction with minimum error. The random selection of hidden neurons numbers in artificial neural network results in overfitting or underfitting problem. This paper aims to avoid the occurrence of overfitting and underfitting problems. The selection of number of hidden neurons is done in this paper employing 102 criteria; these evolved criteria are verified by the computed various error values. The proposed criteria for fixing hidden neurons are validated employing the convergence theorem. The proposed intelligent ensemble neural model is applied for wind speed prediction application considering the real time wind data collected from the nearby locations. The obtained simulation results substantiate that the proposed ensemble model reduces the error value to minimum and enhances the accuracy. The computed results prove the effectiveness of the proposed ensemble neural network (ENN) model with respect to the considered error factors in comparison with that of the earlier models available in the literature. PMID:27034973

  9. Phylogenetic analysis at deep timescales: unreliable gene trees, bypassed hidden support, and the coalescence/concatalescence conundrum.

    PubMed

    Gatesy, John; Springer, Mark S

    2014-11-01

    Large datasets are required to solve difficult phylogenetic problems that are deep in the Tree of Life. Currently, two divergent systematic methods are commonly applied to such datasets: the traditional supermatrix approach (= concatenation) and "shortcut" coalescence (= coalescence methods wherein gene trees and the species tree are not co-estimated). When applied to ancient clades, these contrasting frameworks often produce congruent results, but in recent phylogenetic analyses of Placentalia (placental mammals), this is not the case. A recent series of papers has alternatively disputed and defended the utility of shortcut coalescence methods at deep phylogenetic scales. Here, we examine this exchange in the context of published phylogenomic data from Mammalia; in particular we explore two critical issues - the delimitation of data partitions ("genes") in coalescence analysis and hidden support that emerges with the combination of such partitions in phylogenetic studies. Hidden support - increased support for a clade in combined analysis of all data partitions relative to the support evident in separate analyses of the various data partitions, is a hallmark of the supermatrix approach and a primary rationale for concatenating all characters into a single matrix. In the most extreme cases of hidden support, relationships that are contradicted by all gene trees are supported when all of the genes are analyzed together. A valid fear is that shortcut coalescence methods might bypass or distort character support that is hidden in individual loci because small gene fragments are analyzed in isolation. Given the extensive systematic database for Mammalia, the assumptions and applicability of shortcut coalescence methods can be assessed with rigor to complement a small but growing body of simulation work that has directly compared these methods to concatenation. We document several remarkable cases of hidden support in both supermatrix and coalescence paradigms and argue that in most instances, the emergent support in the shortcut coalescence analyses is an artifact. By referencing rigorous molecular clock studies of Mammalia, we suggest that inaccurate gene trees that imply unrealistically deep coalescences debilitate shortcut coalescence analyses of the placental dataset. We document contradictory coalescence results for Placentalia, and outline a critical conundrum that challenges the general utility of shortcut coalescence methods at deep phylogenetic scales. In particular, the basic unit of analysis in coalescence analysis, the coalescence-gene, is expected to shrink in size as more taxa are analyzed, but as the amount of data for reconstruction of a gene tree ratchets downward, the number of nodes in the gene tree that need to be resolved ratchets upward. Some advocates of shortcut coalescence methods have attempted to address problems with inaccurate gene trees by concatenating multiple coalescence-genes to yield "gene trees" that better match the species tree. However, this hybrid concatenation/coalescence approach, "concatalescence," contradicts the most basic biological rationale for performing a coalescence analysis in the first place. We discuss this reality in the context of recent simulation work that also suggests inaccurate reconstruction of gene trees is more problematic for shortcut coalescence methods than deep coalescence of independently segregating loci is for concatenation methods. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. Reservoir computing on the hypersphere

    NASA Astrophysics Data System (ADS)

    Andrecut, M.

    Reservoir Computing (RC) refers to a Recurrent Neural Network (RNNs) framework, frequently used for sequence learning and time series prediction. The RC system consists of a random fixed-weight RNN (the input-hidden reservoir layer) and a classifier (the hidden-output readout layer). Here, we focus on the sequence learning problem, and we explore a different approach to RC. More specifically, we remove the nonlinear neural activation function, and we consider an orthogonal reservoir acting on normalized states on the unit hypersphere. Surprisingly, our numerical results show that the system’s memory capacity exceeds the dimensionality of the reservoir, which is the upper bound for the typical RC approach based on Echo State Networks (ESNs). We also show how the proposed system can be applied to symmetric cryptography problems, and we include a numerical implementation.

  11. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    PubMed Central

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  12. Central Compact Objects in Kes 79 and RCW 103 as `Hidden' Magnetars with Crustal Activity

    NASA Astrophysics Data System (ADS)

    Popov, S. B.; Kaurov, A. A.; Kaminker, A. D.

    2015-05-01

    We propose that observations of `hidden' magnetars in central compact objects can be used to probe crustal activity of neutron stars with large internal magnetic fields. Estimates based on calculations by Perna & Pons, Pons & Rea and Kaminker et al. suggest that central compact objects, which are proposed to be `hidden' magnetars, must demonstrate flux variations on the time scale of months-years. However, the most prominent candidate for the `hidden' magnetars - CXO J1852.6+0040 in Kes 79 - shows constant (within error bars) flux. This can be interpreted by lower variable crustal activity than in typical magnetars. Alternatively, CXO J1852.6+0040 can be in a high state of variable activity during the whole period of observations. Then we consider the source 1E161348 - 5055 in RCW103 as another candidate. Employing a simple 2D-modelling we argue that properties of the source can be explained by the crustal activity of the magnetar type. Thus, this object may be supplemented for the three known candidates for the `hidden' magnetars among central compact objects discussed in literature.

  13. Taking the Shot

    ERIC Educational Resources Information Center

    Grayson, Jennifer

    2011-01-01

    In today's high-pressure IT world, almost every opportunity comes hidden inside a problem. And when it comes to "greening" a data center, the problems can be especially daunting, given institutional inertia, budgetary concerns, politics, and more. For CIOs looking to notch up a win with a leaner, greener data center, the key to success often lies…

  14. Reverse engineering a social agent-based hidden markov model--visage.

    PubMed

    Chen, Hung-Ching Justin; Goldberg, Mark; Magdon-Ismail, Malik; Wallace, William A

    2008-12-01

    We present a machine learning approach to discover the agent dynamics that drives the evolution of the social groups in a community. We set up the problem by introducing an agent-based hidden Markov model for the agent dynamics: an agent's actions are determined by micro-laws. Nonetheless, We learn the agent dynamics from the observed communications without knowing state transitions. Our approach is to identify the appropriate micro-laws corresponding to an identification of the appropriate parameters in the model. The model identification problem is then formulated as a mixed optimization problem. To solve the problem, we develop a multistage learning process for determining the group structure, the group evolution, and the micro-laws of a community based on the observed set of communications among actors, without knowing the semantic contents. Finally, to test the quality of our approximations and the feasibility of the approach, we present the results of extensive experiments on synthetic data as well as the results on real communities, such as Enron email and Movie newsgroups. Insight into agent dynamics helps us understand the driving forces behind social evolution.

  15. Modeling read counts for CNV detection in exome sequencing data.

    PubMed

    Love, Michael I; Myšičková, Alena; Sun, Ruping; Kalscheuer, Vera; Vingron, Martin; Haas, Stefan A

    2011-11-08

    Varying depth of high-throughput sequencing reads along a chromosome makes it possible to observe copy number variants (CNVs) in a sample relative to a reference. In exome and other targeted sequencing projects, technical factors increase variation in read depth while reducing the number of observed locations, adding difficulty to the problem of identifying CNVs. We present a hidden Markov model for detecting CNVs from raw read count data, using background read depth from a control set as well as other positional covariates such as GC-content. The model, exomeCopy, is applied to a large chromosome X exome sequencing project identifying a list of large unique CNVs. CNVs predicted by the model and experimentally validated are then recovered using a cross-platform control set from publicly available exome sequencing data. Simulations show high sensitivity for detecting heterozygous and homozygous CNVs, outperforming normalization and state-of-the-art segmentation methods.

  16. Bounds on the number of hidden neurons in three-layer binary neural networks.

    PubMed

    Zhang, Zhaozhi; Ma, Xiaomin; Yang, Yixian

    2003-09-01

    This paper investigates an important problem concerning the complexity of three-layer binary neural networks (BNNs) with one hidden layer. The neuron in the studied BNNs employs a hard limiter activation function with only integer weights and an integer threshold. The studies are focused on implementations of arbitrary Boolean functions which map from [0, 1]n into [0, 1]. A deterministic algorithm called set covering algorithm (SCA) is proposed for the construction of a three-layer BNN to implement an arbitrary Boolean function. The SCA is based on a unit sphere covering (USC) of the Hamming space (HS) which is chosen in advance. It is proved that for the implementation of an arbitrary Boolean function of n-variables (n > or = 3) by using SCA, [3L/2] hidden neurons are necessary and sufficient, where L is the number of unit spheres contained in the chosen USC of the n-dimensional HS. It is shown that by using SCA, the number of hidden neurons required is much less than that by using a two-parallel hyperplane method. In order to indicate the potential ability of three-layer BNNs, a lower bound on the required number of hidden neurons which is derived by using the method of estimating the Vapnik-Chervonenkis (VC) dimension is also given.

  17. A method of hidden Markov model optimization for use with geophysical data sets

    NASA Technical Reports Server (NTRS)

    Granat, R. A.

    2003-01-01

    Geophysics research has been faced with a growing need for automated techniques with which to process large quantities of data. A successful tool must meet a number of requirements: it should be consistent, require minimal parameter tuning, and produce scientifically meaningful results in reasonable time. We introduce a hidden Markov model (HMM)-based method for analysis of geophysical data sets that attempts to address these issues.

  18. Gapped excitations in the high-pressure antiferromagnetic phase of URu 2 Si 2

    DOE PAGES

    Williams, Travis J.; Oak Ridge National Lab.; Barath, Harini; ...

    2017-05-31

    Here, we report a neutron scattering study of the magnetic excitation spectrum in each of the three temperature and pressure driven phases of URu 2Si 2. We also found qualitatively similar excitations throughout the (H0L) scattering plane in the hidden order and large moment phases, with no changes in the hbar-omega-widths of the excitations at the Sigma = (1.407,0,0) and Z = (1,0,0) points, within our experimental resolution. There is, however, an increase in the gap at the Sigma point and an increase in the first moment of both excitations. At 8 meV where the Q-dependence of magnetic scattering inmore » the hidden order phase is extended in Q-space, the excitations in the large moment phase are sharper. Furthermore, the expanded Q-hbar-omega coverage of this study suggest more complete nesting within the antiferromagnetic phase, an important property for future theoretical predictions of a hidden order parameter.« less

  19. Analysing the hidden curriculum: use of a cultural web

    PubMed Central

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-01-01

    CONTEXT Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. METHODS A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. RESULTS The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students’ professional identity development. CONCLUSIONS The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student’s development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. PMID:23323652

  20. Wikipedia mining of hidden links between political leaders

    NASA Astrophysics Data System (ADS)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  1. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth.

    PubMed

    Gera, Arwa; Zilberman, Uri

    2017-01-01

    Hidden caries is a dentinal lesion beneath the dentinoenamel junction, visible on radiographs. A single report described this lesion in primary dentition. This case report describes a case of hidden caries in a mandibular second primary molar, misdiagnosed as malignant swelling. A 3-year-old white girl was referred to the Department of Pediatric Dentistry with a chief complaint of pain and extraoral swelling on the right side of the mandible for the last 3 months. She was earlier referred to the surgical department for biopsy of the lesion. Radiographic and computed tomography scan examination showed a periapical lesion with buccal plate resorption and radiolucency beneath the enamel on the mesial part of tooth 85. The tooth was extracted, and follow-up of 2 years showed normal development of tooth 45. The main problem is early detection and treatment, since the outer surface of enamel may appear intact on tactile examination. Gera A, Zilberman U. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth. Int J Clin Pediatr Dent 2017;10(1):99-102.

  2. Mining Bug Databases for Unidentified Software Vulnerabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dumidu Wijayasekara; Milos Manic; Jason Wright

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, amore » significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.« less

  3. Humanism, the Hidden Curriculum, and Educational Reform: A Scoping Review and Thematic Analysis.

    PubMed

    Martimianakis, Maria Athina Tina; Michalec, Barret; Lam, Justin; Cartmill, Carrie; Taylor, Janelle S; Hafferty, Frederic W

    2015-11-01

    Medical educators have used the hidden curriculum concept for over three decades to make visible the effects of tacit learning, including how culture, structures, and institutions influence professional identity formation. In response to calls to see more humanistic-oriented training in medicine, the authors examined how the hidden curriculum construct has been applied in the English language medical education literature with a particular (and centering) look at its use within literature pertaining to humanism. They also explored the ends to which the hidden curriculum construct has been used in educational reform efforts (at the individual, organizational, and/or systems levels) related to nurturing and/or increasing humanism in health care. The authors conducted a scoping review and thematic analysis that draws from the tradition of critical discourse analysis. They identified 1,887 texts in the literature search, of which 200 met inclusion criteria. The analysis documents a strong preoccupation with negative effects of the hidden curriculum, particularly the moral erosion of physicians and the perceived undermining of humanistic values in health care. A conflation between professionalism and humanism was noted. Proposals for reform largely target medical students and medical school faculty, with very little consideration for how organizations, institutions, and sociopolitical relations more broadly contribute to problematic behaviors. The authors argue that there is a need to transcend conceptualizations of the hidden curriculum as antithetical to humanism and offer suggestions for future research that explores the necessity and value of humanism and the hidden curriculum in medical education and training.

  4. Experimental and Computational Studies on the Scattering of an Edge-Guided Wave by a Hidden Crack on a Racecourse Shaped Hole.

    PubMed

    Vien, Benjamin Steven; Rose, Louis Raymond Francis; Chiu, Wing Kong

    2017-07-01

    Reliable and quantitative non-destructive evaluation for small fatigue cracks, in particular those in hard-to-inspect locations, is a challenging problem. Guided waves are advantageous for structural health monitoring due to their slow geometrical decay of amplitude with propagating distance, which is ideal for rapid wide-area inspection. This paper presents a 3D laser vibrometry experimental and finite element analysis of the interaction between an edge-guided wave and a small through-thickness hidden edge crack on a racecourse shaped hole that occurs, in practice, as a fuel vent hole. A piezoelectric transducer is bonded on the straight edge of the hole to generate the incident wave. The excitation signal consists of a 5.5 cycle Hann-windowed tone burst of centre frequency 220 kHz, which is below the cut-off frequency for the first order Lamb wave modes (SH1). Two-dimensional fast Fourier transformation (2D FFT) is applied to the incident and scattered wave field along radial lines emanating from the crack mouth, so as to identify the wave modes and determine their angular variation and amplitude. It is shown experimentally and computationally that mid-plane symmetric edge waves can travel around the hole's edge to detect a hidden crack. Furthermore, the scattered wave field due to a small crack length, a , (compared to the wavelength λ of the incident wave) is shown to be equivalent to a point source consisting of a particular combination of body-force doublets. It is found that the amplitude of the scattered field increases quadratically as a function of a/λ , whereas the scattered wave pattern is independent of crack length for small cracks a < λ . This study of the forward scattering problem from a known crack size provides a useful guide for the inverse problem of hidden crack detection and sizing.

  5. On the Role of Situational Stressors in the Disruption of Global Neural Network Stability during Problem Solving.

    PubMed

    Liu, Mengting; Amey, Rachel C; Forbes, Chad E

    2017-12-01

    When individuals are placed in stressful situations, they are likely to exhibit deficits in cognitive capacity over and above situational demands. Despite this, individuals may still persevere and ultimately succeed in these situations. Little is known, however, about neural network properties that instantiate success or failure in both neutral and stressful situations, particularly with respect to regions integral for problem-solving processes that are necessary for optimal performance on more complex tasks. In this study, we outline how hidden Markov modeling based on multivoxel pattern analysis can be used to quantify unique brain states underlying complex network interactions that yield either successful or unsuccessful problem solving in more neutral or stressful situations. We provide evidence that brain network stability and states underlying synchronous interactions in regions integral for problem-solving processes are key predictors of whether individuals succeed or fail in stressful situations. Findings also suggested that individuals utilize discriminate neural patterns in successfully solving problems in stressful or neutral situations. Findings overall highlight how hidden Markov modeling can provide myriad possibilities for quantifying and better understanding the role of global network interactions in the problem-solving process and how the said interactions predict success or failure in different contexts.

  6. A constraint-based evolutionary learning approach to the expectation maximization for optimal estimation of the hidden Markov model for speech signal modeling.

    PubMed

    Huda, Shamsul; Yearwood, John; Togneri, Roberto

    2009-02-01

    This paper attempts to overcome the tendency of the expectation-maximization (EM) algorithm to locate a local rather than global maximum when applied to estimate the hidden Markov model (HMM) parameters in speech signal modeling. We propose a hybrid algorithm for estimation of the HMM in automatic speech recognition (ASR) using a constraint-based evolutionary algorithm (EA) and EM, the CEL-EM. The novelty of our hybrid algorithm (CEL-EM) is that it is applicable for estimation of the constraint-based models with many constraints and large numbers of parameters (which use EM) like HMM. Two constraint-based versions of the CEL-EM with different fusion strategies have been proposed using a constraint-based EA and the EM for better estimation of HMM in ASR. The first one uses a traditional constraint-handling mechanism of EA. The other version transforms a constrained optimization problem into an unconstrained problem using Lagrange multipliers. Fusion strategies for the CEL-EM use a staged-fusion approach where EM has been plugged with the EA periodically after the execution of EA for a specific period of time to maintain the global sampling capabilities of EA in the hybrid algorithm. A variable initialization approach (VIA) has been proposed using a variable segmentation to provide a better initialization for EA in the CEL-EM. Experimental results on the TIMIT speech corpus show that CEL-EM obtains higher recognition accuracies than the traditional EM algorithm as well as a top-standard EM (VIA-EM, constructed by applying the VIA to EM).

  7. A Hidden Surface Algorithm for Computer Generated Halftone Pictures

    DTIC Science & Technology

    converting data describing three-dimensional objects into data that can be used to generate two-dimensional halftone images. It deals with some problems that arise in black and white, and color shading.

  8. Proximal versus distal cue utilization in spatial navigation: the role of visual acuity?

    PubMed

    Carman, Heidi M; Mactutus, Charles F

    2002-09-01

    Proximal versus distal cue use in the Morris water maze is a widely accepted strategy for the dissociation of various problems affecting spatial navigation in rats such as aging, head trauma, lesions, and pharmacological or hormonal agents. Of the limited number of ontogenetic rat studies conducted, the majority have approached the problem of preweanling spatial navigation through a similar proximal-distal dissociation. An implicit assumption among all of these studies has been that the animal's visual system is sufficient to permit robust spatial navigation. We challenged this assumption and have addressed the role of visual acuity in spatial navigation in the preweanling Fischer 344-N rat by training animals to locate a visible (proximal) or hidden (distal) platform using double or null extramaze cues within the testing environment. All pups demonstrated improved performance across training, but animals presented with a visible platform, regardless of extramaze cues, simultaneously reached asymptotic performance levels; animals presented with a hidden platform, dependent upon location of extramaze cues, differentially reached asymptotic performance levels. Probe trial performance, defined by quadrant time and platform crossings, revealed that distal-double-cue pups demonstrated spatial navigational ability superior to that of the remaining groups. These results suggest that a pup's ability to spatially navigate a hidden platform is dependent on not only its response repertoire and task parameters, but also its visual acuity, as determined by the extramaze cue location within the testing environment. The standard hidden versus visible platform dissociation may not be a satisfactory strategy for the control of potential sensory deficits.

  9. Matrix Determination of Reflectance of Hidden Object via Indirect Photography

    DTIC Science & Technology

    2012-03-01

    the hidden object. This thesis provides an alternative method of processing the camera images by modeling the system as a set of transport and...Distribution Function ( BRDF ). Figure 1. Indirect photography with camera field of view dictated by point of illumination. 3 1.3 Research Focus In an...would need to be modeled using radiometric principles. A large amount of the improvement in this process was due to the use of a blind

  10. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    DTIC Science & Technology

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  11. A general solution to the hidden-line problem. [to graphically represent aerodynamic stability derivatives

    NASA Technical Reports Server (NTRS)

    Hedgley, D. R., Jr.

    1982-01-01

    The requirements for computer-generated perspective projections of three dimensional objects has escalated. A general solution was developed. The theoretical solution to this problem is presented. The method is very efficient as it minimizes the selection of points and comparison of line segments and hence avoids the devastation of square-law growth.

  12. Effectiveness of AODV Protocol under Hidden Node Environment

    NASA Astrophysics Data System (ADS)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  13. Optimized hardware framework of MLP with random hidden layers for classification applications

    NASA Astrophysics Data System (ADS)

    Zyarah, Abdullah M.; Ramesh, Abhishek; Merkel, Cory; Kudithipudi, Dhireesha

    2016-05-01

    Multilayer Perceptron Networks with random hidden layers are very efficient at automatic feature extraction and offer significant performance improvements in the training process. They essentially employ large collection of fixed, random features, and are expedient for form-factor constrained embedded platforms. In this work, a reconfigurable and scalable architecture is proposed for the MLPs with random hidden layers with a customized building block based on CORDIC algorithm. The proposed architecture also exploits fixed point operations for area efficiency. The design is validated for classification on two different datasets. An accuracy of ~ 90% for MNIST dataset and 75% for gender classification on LFW dataset was observed. The hardware has 299 speed-up over the corresponding software realization.

  14. Material content of the universe - Introductory survey

    NASA Astrophysics Data System (ADS)

    Tayler, R. J.

    1986-12-01

    Matter in the universe can be detected either by the radiation it emits or by its gravitational influence. There is a strong suggestion that the universe contains substantial hidden matter, mass without corresponding light. There are also arguments from elementary particle physics that the universe should have closure density, which would also imply hidden mass. Observations of the chemical composition of the universe interpreted in terms of the hot Big Bang cosmological theory suggest that this hidden matter cannot all be of baryonic form but must consist of weakly interacting elementary particles. A combination of observations and theoretical ideas about the origin of large-scale structure may demand that these particles are of a type which is not yet definitely known to exist.

  15. Does "hidden undercuffing" occur among obese patients? Effect of arm sizes and other predictors of the difference between wrist and upper arm blood pressures.

    PubMed

    Doshi, Hardik; Weder, Alan B; Bard, Robert L; Brook, Robert D

    2010-02-01

    Arm size can affect the accuracy of blood pressure (BP) measurement, and "undercuffing" of large upper arms is likely to be a growing problem. Therefore, the authors investigated the relationship between upper arm and wrist readings. Upper arm and wrist circumferences and BP were measured in 261 consecutive patients. Upper arm auscultation and wrist BP was measured in triplicate, rotating measurements every 30 seconds between sites. Upper arm BP was 131.9+/-20.6/71.6+/-12.6 mm Hg in an obese population (body mass index, 30.6+/-6.6 kg/m(2)) with mean upper arm size of 30.7+/-5.1 cm. Wrist BP was higher (2.6+/-9.2 mm Hg and 4.9+/-6.6 mm Hg, respectively, P<.001); however, there was moderate concordance for the Seventh Report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure (JNC 7) strata (kappa value=0.27-0.71), and the difference was >or=5 mm Hg in 72% of the patients. The authors conclude that there was poor concordance between arm and wrist BP measurement and found no evidence that "hidden undercuffing" was associated with obesity; therefore, they do not support routine use of wrist BP measurements.

  16. Inferring hidden causal relations between pathway members using reduced Google matrix of directed biological networks

    PubMed Central

    2018-01-01

    Signaling pathways represent parts of the global biological molecular network which connects them into a seamless whole through complex direct and indirect (hidden) crosstalk whose structure can change during development or in pathological conditions. We suggest a novel methodology, called Googlomics, for the structural analysis of directed biological networks using spectral analysis of their Google matrices, using parallels with quantum scattering theory, developed for nuclear and mesoscopic physics and quantum chaos. We introduce analytical “reduced Google matrix” method for the analysis of biological network structure. The method allows inferring hidden causal relations between the members of a signaling pathway or a functionally related group of genes. We investigate how the structure of hidden causal relations can be reprogrammed as a result of changes in the transcriptional network layer during cancerogenesis. The suggested Googlomics approach rigorously characterizes complex systemic changes in the wiring of large causal biological networks in a computationally efficient way. PMID:29370181

  17. High Energy Colliders and Hidden Sectors

    NASA Astrophysics Data System (ADS)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an out-of-equilibrium decay into the Standard Model.

  18. Problems of Indicator Weights and Multicolinearity in World University Rankings: Comparisons of Three Systems

    ERIC Educational Resources Information Center

    Soh, Kaycheng

    2014-01-01

    World university rankings (WUR) use the weight-and-sum approach to arrive at an overall measure which is then used to rank the participating universities of the world. Although the weight-and-sum procedure seems straightforward and accords with common sense, it has hidden methodological or statistical problems which render the meaning of the…

  19. Disconnected Youth in the Research Triangle Region: An Ominous Problem Hidden in Plain Sight

    ERIC Educational Resources Information Center

    Dodson, David; Guillory, Ferrel; Lipsitz, Joan; Raper, Noah; Rausch, Christina

    2008-01-01

    In September 2006, the North Carolina GlaxoSmithKline Foundation commissioned MDC, Inc. of Chapel Hill to analyze the problem of "disconnected youth" in the Research Triangle region, determine the current state of the region's responses to the challenge, and recommend steps to deepen and accelerate action on the issue. The research process was…

  20. Technology Development, Implementation and Assessment: K-16 Pre-Service, In-Service and Distance Learning Initiatives

    NASA Technical Reports Server (NTRS)

    Williams, William B., Jr.

    1999-01-01

    The technologies associated with distance learning are evolving rapidly, giving to educators a potential tool for enhancing the educational experiences of large numbers of students simultaneously. This enhancement, in order to be effective, must take into account the various agendas of teachers, administrators, state systems, and of course students. It must also make use of the latest research on effective pedagogy. This combination, effective pedagogy and robust information technology, is a powerful vehicle for communicating, to a large audience of school children the excitement of mathematics and science--an excitement that for the most part is now well-hidden. This project,"Technology Development, Implementation and Assessment," proposed to bring to bear on the education of learners in grades 3 - 8 in science and mathematics both advances in information technology and in effective pedagogy. Specifically, the project developed components NASA CONNECT video series--problem-based learning modules that focus on the scientific method and that incorporate problem-based learning scenarios tied to national mathematics and science standards. These videos serve two purposes; they engage students in the excitement of hands-on learning and they model for the teachers of these students the problem-based learning practices that are proving to be excellent ways to teach science and mathematics to school students. Another component of NASA CONNECT is the accompanying web-site.

  1. GPU acceleration of Dock6's Amber scoring computation.

    PubMed

    Yang, Hailong; Zhou, Qiongqiong; Li, Bo; Wang, Yongjian; Luan, Zhongzhi; Qian, Depei; Li, Hanlu

    2010-01-01

    Dressing the problem of virtual screening is a long-term goal in the drug discovery field, which if properly solved, can significantly shorten new drugs' R&D cycle. The scoring functionality that evaluates the fitness of the docking result is one of the major challenges in virtual screening. In general, scoring functionality in docking requires a large amount of floating-point calculations, which usually takes several weeks or even months to be finished. This time-consuming procedure is unacceptable, especially when highly fatal and infectious virus arises such as SARS and H1N1, which forces the scoring task to be done in a limited time. This paper presents how to leverage the computational power of GPU to accelerate Dock6's (http://dock.compbio.ucsf.edu/DOCK_6/) Amber (J. Comput. Chem. 25: 1157-1174, 2004) scoring with NVIDIA CUDA (NVIDIA Corporation Technical Staff, Compute Unified Device Architecture - Programming Guide, NVIDIA Corporation, 2008) (Compute Unified Device Architecture) platform. We also discuss many factors that will greatly influence the performance after porting the Amber scoring to GPU, including thread management, data transfer, and divergence hidden. Our experiments show that the GPU-accelerated Amber scoring achieves a 6.5× speedup with respect to the original version running on AMD dual-core CPU for the same problem size. This acceleration makes the Amber scoring more competitive and efficient for large-scale virtual screening problems.

  2. A Short-Term Population Model of the Suicide Risk: The Case of Spain.

    PubMed

    De la Poza, Elena; Jódar, Lucas

    2018-06-14

    A relevant proportion of deaths by suicide have been attributed to other causes that produce the number of suicides remains hidden. The existence of a hidden number of cases is explained by the nature of the problem. Problems like this involve violence, and produce fear and social shame in victims' families. The existence of violence, fear and social shame experienced by victims favours a considerable number of suicides, identified as accidents or natural deaths. This paper proposes a short time discrete compartmental mathematical model to measure the suicidal risk for the case of Spain. The compartment model classifies and quantifies the amount of the Spanish population within the age intervals (16, 78) by their degree of suicide risk and their changes over time. Intercompartmental transits are due to the combination of quantitative and qualitative factors. Results are computed and simulations are performed to analyze the sensitivity of the model under uncertain coefficients.

  3. Using Grid Cells for Navigation.

    PubMed

    Bush, Daniel; Barry, Caswell; Manson, Daniel; Burgess, Neil

    2015-08-05

    Mammals are able to navigate to hidden goal locations by direct routes that may traverse previously unvisited terrain. Empirical evidence suggests that this "vector navigation" relies on an internal representation of space provided by the hippocampal formation. The periodic spatial firing patterns of grid cells in the hippocampal formation offer a compact combinatorial code for location within large-scale space. Here, we consider the computational problem of how to determine the vector between start and goal locations encoded by the firing of grid cells when this vector may be much longer than the largest grid scale. First, we present an algorithmic solution to the problem, inspired by the Fourier shift theorem. Second, we describe several potential neural network implementations of this solution that combine efficiency of search and biological plausibility. Finally, we discuss the empirical predictions of these implementations and their relationship to the anatomy and electrophysiology of the hippocampal formation. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  4. A dynamic programming-based particle swarm optimization algorithm for an inventory management problem under uncertainty

    NASA Astrophysics Data System (ADS)

    Xu, Jiuping; Zeng, Ziqiang; Han, Bernard; Lei, Xiao

    2013-07-01

    This article presents a dynamic programming-based particle swarm optimization (DP-based PSO) algorithm for solving an inventory management problem for large-scale construction projects under a fuzzy random environment. By taking into account the purchasing behaviour and strategy under rules of international bidding, a multi-objective fuzzy random dynamic programming model is constructed. To deal with the uncertainties, a hybrid crisp approach is used to transform fuzzy random parameters into fuzzy variables that are subsequently defuzzified by using an expected value operator with optimistic-pessimistic index. The iterative nature of the authors' model motivates them to develop a DP-based PSO algorithm. More specifically, their approach treats the state variables as hidden parameters. This in turn eliminates many redundant feasibility checks during initialization and particle updates at each iteration. Results and sensitivity analysis are presented to highlight the performance of the authors' optimization method, which is very effective as compared to the standard PSO algorithm.

  5. Asymmetric author-topic model for knowledge discovering of big data in toxicogenomics.

    PubMed

    Chung, Ming-Hua; Wang, Yuping; Tang, Hailin; Zou, Wen; Basinger, John; Xu, Xiaowei; Tong, Weida

    2015-01-01

    The advancement of high-throughput screening technologies facilitates the generation of massive amount of biological data, a big data phenomena in biomedical science. Yet, researchers still heavily rely on keyword search and/or literature review to navigate the databases and analyses are often done in rather small-scale. As a result, the rich information of a database has not been fully utilized, particularly for the information embedded in the interactive nature between data points that are largely ignored and buried. For the past 10 years, probabilistic topic modeling has been recognized as an effective machine learning algorithm to annotate the hidden thematic structure of massive collection of documents. The analogy between text corpus and large-scale genomic data enables the application of text mining tools, like probabilistic topic models, to explore hidden patterns of genomic data and to the extension of altered biological functions. In this paper, we developed a generalized probabilistic topic model to analyze a toxicogenomics dataset that consists of a large number of gene expression data from the rat livers treated with drugs in multiple dose and time-points. We discovered the hidden patterns in gene expression associated with the effect of doses and time-points of treatment. Finally, we illustrated the ability of our model to identify the evidence of potential reduction of animal use.

  6. Caregiver burden in Alzheimer's disease patients in Spain.

    PubMed

    Peña-Longobardo, Luz María; Oliva-Moreno, Juan

    2015-01-01

    Alzheimer's disease constitutes one of the leading causes of burden of disease, and it is the third leading disease in terms of economic and social costs. To analyze the burden and problems borne by informal caregivers of patients who suffer from Alzheimer's disease in Spain. We used the Survey on Disabilities, Autonomy and Dependency to obtain information on the characteristics of disabled people with Alzheimer's disease and the individuals who provide them with personal care. Additionally, statistical multivariate analyses using probit models were performed to analyze the burden placed on caregivers in terms of health, professional, and leisure/social aspects. 46% of informal caregivers suffered from health-related problems as a result of providing care, 90% had leisure-related problems, and 75% of caregivers under 65 years old admitted to suffering from problems related to their professional lives. The probability of a problem arising for an informal caregiver was positively associated with the degree of dependency of the person cared for. In the case of caring for a greatly dependent person, the probability of suffering from health-related problems was 22% higher, the probability of professional problems was 18% higher, and there was a 10% greater probability of suffering from leisure-related problems compared to non-dependents. The results show a part of the large hidden cost for society in terms of problems related to the burden lessened by the caregivers. This information should be a useful tool for designing policies focused toward supporting caregivers and improving their welfare.

  7. Probabilistic and Statistical Modeling of Complex Systems Exhibiting Long Range Dependence and Heavy Tails

    DTIC Science & Technology

    2010-07-01

    cluster input can look like a Fractional Brownian motion even in the slow growth regime’’. Advances in Applied Probability, 41(2), 393-427. Yeghiazarian, L... Brownian motion ? Ann. Appl. Probab., 12(1):23–68, 2002. [10] A. Mitra and S.I. Resnick. Hidden domain of attraction: extension of hidden regular variation...variance? A paradox and an explanation’’. Quantitative Finance , 1, 11 pages. Hult, H. and Samorodnitsky, G. (2010) ``Large deviations for point

  8. Hypovigilance Detection for UCAV Operators Based on a Hidden Markov Model

    PubMed Central

    Kwon, Namyeon; Shin, Yongwook; Ryo, Chuh Yeop; Park, Jonghun

    2014-01-01

    With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs) has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based on EEG signal to minimize the number of occurrences of hypovigilance. To enable detection, we have applied hidden Markov models (HMMs), two of which are used to indicate the operators' dual states, normal vigilance and hypovigilance, and, for each operator, the HMMs are trained as a detection model. To evaluate the efficacy and effectiveness of the proposed models, we conducted two experiments on the real-world data obtained by using EEG-signal acquisition devices, and they yielded satisfactory results. By utilizing the proposed detection models, the problem of hypovigilance of UCAV operators and the problem of high accident rate of UCAVs can be addressed. PMID:24963338

  9. Multistability and hidden attractors in a relay system with hysteresis

    NASA Astrophysics Data System (ADS)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.; Nabokov, Roman A.

    2015-06-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the neighborhood of that cycle. We show how the equilibrium point of a relay system disappears in a boundary-equilibrium bifurcation as the system enters the region of autonomous switching dynamics and demonstrate experimentally how a relay system can exhibit large amplitude chaotic oscillations at high values of the supply voltage. By investigating a four-dimensional model of the experimental relay system we finally show how a variety of hidden periodic, quasiperiodic and chaotic attractors arise, transform and disappear through different bifurcations.

  10. Adult-acquired hidden penis in obese patients: a critical survey of the literature.

    PubMed

    Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L

    2015-03-01

    Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize the collective wisdom of surgeons who have investigated this problem and emphasize the need for rigorous evaluative studies. © 2015 The American Osteopathic Association.

  11. Complex Sequencing Rules of Birdsong Can be Explained by Simple Hidden Markov Processes

    PubMed Central

    Katahira, Kentaro; Suzuki, Kenta; Okanoya, Kazuo; Okada, Masato

    2011-01-01

    Complex sequencing rules observed in birdsongs provide an opportunity to investigate the neural mechanism for generating complex sequential behaviors. To relate the findings from studying birdsongs to other sequential behaviors such as human speech and musical performance, it is crucial to characterize the statistical properties of the sequencing rules in birdsongs. However, the properties of the sequencing rules in birdsongs have not yet been fully addressed. In this study, we investigate the statistical properties of the complex birdsong of the Bengalese finch (Lonchura striata var. domestica). Based on manual-annotated syllable labeles, we first show that there are significant higher-order context dependencies in Bengalese finch songs, that is, which syllable appears next depends on more than one previous syllable. We then analyze acoustic features of the song and show that higher-order context dependencies can be explained using first-order hidden state transition dynamics with redundant hidden states. This model corresponds to hidden Markov models (HMMs), well known statistical models with a large range of application for time series modeling. The song annotation with these models with first-order hidden state dynamics agreed well with manual annotation, the score was comparable to that of a second-order HMM, and surpassed the zeroth-order model (the Gaussian mixture model; GMM), which does not use context information. Our results imply that the hierarchical representation with hidden state dynamics may underlie the neural implementation for generating complex behavioral sequences with higher-order dependencies. PMID:21915345

  12. Self-growing neural network architecture using crisp and fuzzy entropy

    NASA Technical Reports Server (NTRS)

    Cios, Krzysztof J.

    1992-01-01

    The paper briefly describes the self-growing neural network algorithm, CID2, which makes decision trees equivalent to hidden layers of a neural network. The algorithm generates a feedforward architecture using crisp and fuzzy entropy measures. The results of a real-life recognition problem of distinguishing defects in a glass ribbon and of a benchmark problem of differentiating two spirals are shown and discussed.

  13. Chronic Elementary Absenteeism: A Problem Hidden in Plain Sight. A Research Brief from Attendance Works and Child & Family Policy Center

    ERIC Educational Resources Information Center

    Bruner, Charles; Discher, Anne; Chang, Hedy

    2011-01-01

    Chronic absenteeism--or missing 10 percent or more of school days for any reason--is a proven early warning sign of academic risk and school dropout. Too often, though, this problem is overlooked, especially among elementary students, because of the way attendance data are tracked. This study confirms the premise that districts and schools may…

  14. Fundamental Study on Quantum Nanojets

    DTIC Science & Technology

    2004-08-01

    Pergamon Press. Bell , J. S . 1966 On the problem of hidden variables in quantum mechanics. Rev. of Modern Phys., 38, 447. Berndl, K., Daumer, M...fluid dynamics based on two quantum mechanical perspectives; Schrödinger’s wave mechanics and quantum fluid dynamics based on Hamilton-Jacoby...References 8 2). Direct Problems a). Quantum fluid dynamics formalism based on Hamilton-Jacoby equation are adapted for the numerical

  15. Synthetic consciousness: the distributed adaptive control perspective

    PubMed Central

    2016-01-01

    Understanding the nature of consciousness is one of the grand outstanding scientific challenges. The fundamental methodological problem is how phenomenal first person experience can be accounted for in a third person verifiable form, while the conceptual challenge is to both define its function and physical realization. The distributed adaptive control theory of consciousness (DACtoc) proposes answers to these three challenges. The methodological challenge is answered relative to the hard problem and DACtoc proposes that it can be addressed using a convergent synthetic methodology using the analysis of synthetic biologically grounded agents, or quale parsing. DACtoc hypothesizes that consciousness in both its primary and secondary forms serves the ability to deal with the hidden states of the world and emerged during the Cambrian period, affording stable multi-agent environments to emerge. The process of consciousness is an autonomous virtualization memory, which serializes and unifies the parallel and subconscious simulations of the hidden states of the world that are largely due to other agents and the self with the objective to extract norms. These norms are in turn projected as value onto the parallel simulation and control systems that are driving action. This functional hypothesis is mapped onto the brainstem, midbrain and the thalamo-cortical and cortico-cortical systems and analysed with respect to our understanding of deficits of consciousness. Subsequently, some of the implications and predictions of DACtoc are outlined, in particular, the prediction that normative bootstrapping of conscious agents is predicated on an intentionality prior. In the view advanced here, human consciousness constitutes the ultimate evolutionary transition by allowing agents to become autonomous with respect to their evolutionary priors leading to a post-biological Anthropocene. This article is part of the themed issue ‘The major synthetic evolutionary transitions’. PMID:27431526

  16. Synthetic consciousness: the distributed adaptive control perspective.

    PubMed

    Verschure, Paul F M J

    2016-08-19

    Understanding the nature of consciousness is one of the grand outstanding scientific challenges. The fundamental methodological problem is how phenomenal first person experience can be accounted for in a third person verifiable form, while the conceptual challenge is to both define its function and physical realization. The distributed adaptive control theory of consciousness (DACtoc) proposes answers to these three challenges. The methodological challenge is answered relative to the hard problem and DACtoc proposes that it can be addressed using a convergent synthetic methodology using the analysis of synthetic biologically grounded agents, or quale parsing. DACtoc hypothesizes that consciousness in both its primary and secondary forms serves the ability to deal with the hidden states of the world and emerged during the Cambrian period, affording stable multi-agent environments to emerge. The process of consciousness is an autonomous virtualization memory, which serializes and unifies the parallel and subconscious simulations of the hidden states of the world that are largely due to other agents and the self with the objective to extract norms. These norms are in turn projected as value onto the parallel simulation and control systems that are driving action. This functional hypothesis is mapped onto the brainstem, midbrain and the thalamo-cortical and cortico-cortical systems and analysed with respect to our understanding of deficits of consciousness. Subsequently, some of the implications and predictions of DACtoc are outlined, in particular, the prediction that normative bootstrapping of conscious agents is predicated on an intentionality prior. In the view advanced here, human consciousness constitutes the ultimate evolutionary transition by allowing agents to become autonomous with respect to their evolutionary priors leading to a post-biological Anthropocene.This article is part of the themed issue 'The major synthetic evolutionary transitions'. © 2016 The Author(s).

  17. Unsupervised Learning Through Randomized Algorithms for High-Volume High-Velocity Data (ULTRA-HV).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pinar, Ali; Kolda, Tamara G.; Carlberg, Kevin Thomas

    Through long-term investments in computing, algorithms, facilities, and instrumentation, DOE is an established leader in massive-scale, high-fidelity simulations, as well as science-leading experimentation. In both cases, DOE is generating more data than it can analyze and the problem is intensifying quickly. The need for advanced algorithms that can automatically convert the abundance of data into a wealth of useful information by discovering hidden structures is well recognized. Such efforts however, are hindered by the massive volume of the data and its high velocity. Here, the challenge is developing unsupervised learning methods to discover hidden structure in high-volume, high-velocity data.

  18. [A survey about client orientation and wayfinding in Chilean hospitals].

    PubMed

    Mora, Rodrigo; Oats, Amalia; Marziano, Pía

    2014-10-01

    Sense of orientation in hospitals can be tricky considering the large extension of buildings and the inadequate signage. To report some of the findings of a larger research project on wayfinding and patient navigation in Chilean hospitals. Five hundred nine hospital users waiting for attention in three hospitals were contacted and asked to answer a survey that lasted 10 minutes, about wayfinding and sense of orientation within the hospital. Users declared to have a good opinion of existing signage in the three hospitals analyzed as well as their architectural organization in terms of their capacity to orient people. However, the vast majority of users asked for directions to navigate within the hospital to staff and medical personnel. Patient navigation problems are imposing a great "hidden" cost to hospitals management due to missed appointments.

  19. HIPPI: highly accurate protein family classification with ensembles of HMMs.

    PubMed

    Nguyen, Nam-Phuong; Nute, Michael; Mirarab, Siavash; Warnow, Tandy

    2016-11-11

    Given a new biological sequence, detecting membership in a known family is a basic step in many bioinformatics analyses, with applications to protein structure and function prediction and metagenomic taxon identification and abundance profiling, among others. Yet family identification of sequences that are distantly related to sequences in public databases or that are fragmentary remains one of the more difficult analytical problems in bioinformatics. We present a new technique for family identification called HIPPI (Hierarchical Profile Hidden Markov Models for Protein family Identification). HIPPI uses a novel technique to represent a multiple sequence alignment for a given protein family or superfamily by an ensemble of profile hidden Markov models computed using HMMER. An evaluation of HIPPI on the Pfam database shows that HIPPI has better overall precision and recall than blastp, HMMER, and pipelines based on HHsearch, and maintains good accuracy even for fragmentary query sequences and for protein families with low average pairwise sequence identity, both conditions where other methods degrade in accuracy. HIPPI provides accurate protein family identification and is robust to difficult model conditions. Our results, combined with observations from previous studies, show that ensembles of profile Hidden Markov models can better represent multiple sequence alignments than a single profile Hidden Markov model, and thus can improve downstream analyses for various bioinformatic tasks. Further research is needed to determine the best practices for building the ensemble of profile Hidden Markov models. HIPPI is available on GitHub at https://github.com/smirarab/sepp .

  20. Nonlinear dynamical modes of climate variability: from curves to manifolds

    NASA Astrophysics Data System (ADS)

    Gavrilov, Andrey; Mukhin, Dmitry; Loskutov, Evgeny; Feigin, Alexander

    2016-04-01

    The necessity of efficient dimensionality reduction methods capturing dynamical properties of the system from observed data is evident. Recent study shows that nonlinear dynamical mode (NDM) expansion is able to solve this problem and provide adequate phase variables in climate data analysis [1]. A single NDM is logical extension of linear spatio-temporal structure (like empirical orthogonal function pattern): it is constructed as nonlinear transformation of hidden scalar time series to the space of observed variables, i. e. projection of observed dataset onto a nonlinear curve. Both the hidden time series and the parameters of the curve are learned simultaneously using Bayesian approach. The only prior information about the hidden signal is the assumption of its smoothness. The optimal nonlinearity degree and smoothness are found using Bayesian evidence technique. In this work we do further extension and look for vector hidden signals instead of scalar with the same smoothness restriction. As a result we resolve multidimensional manifolds instead of sum of curves. The dimension of the hidden manifold is optimized using also Bayesian evidence. The efficiency of the extension is demonstrated on model examples. Results of application to climate data are demonstrated and discussed. The study is supported by Government of Russian Federation (agreement #14.Z50.31.0033 with the Institute of Applied Physics of RAS). 1. Mukhin, D., Gavrilov, A., Feigin, A., Loskutov, E., & Kurths, J. (2015). Principal nonlinear dynamical modes of climate variability. Scientific Reports, 5, 15510. http://doi.org/10.1038/srep15510

  1. Deep RNNs for video denoising

    NASA Astrophysics Data System (ADS)

    Chen, Xinyuan; Song, Li; Yang, Xiaokang

    2016-09-01

    Video denoising can be described as the problem of mapping from a specific length of noisy frames to clean one. We propose a deep architecture based on Recurrent Neural Network (RNN) for video denoising. The model learns a patch-based end-to-end mapping between the clean and noisy video sequences. It takes the corrupted video sequences as the input and outputs the clean one. Our deep network, which we refer to as deep Recurrent Neural Networks (deep RNNs or DRNNs), stacks RNN layers where each layer receives the hidden state of the previous layer as input. Experiment shows (i) the recurrent architecture through temporal domain extracts motion information and does favor to video denoising, and (ii) deep architecture have large enough capacity for expressing mapping relation between corrupted videos as input and clean videos as output, furthermore, (iii) the model has generality to learned different mappings from videos corrupted by different types of noise (e.g., Poisson-Gaussian noise). By training on large video databases, we are able to compete with some existing video denoising methods.

  2. Confocal non-line-of-sight imaging based on the light-cone transform

    NASA Astrophysics Data System (ADS)

    O’Toole, Matthew; Lindell, David B.; Wetzstein, Gordon

    2018-03-01

    How to image objects that are hidden from a camera’s view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.

  3. Confocal non-line-of-sight imaging based on the light-cone transform.

    PubMed

    O'Toole, Matthew; Lindell, David B; Wetzstein, Gordon

    2018-03-15

    How to image objects that are hidden from a camera's view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.

  4. Hydrologic conditions and hazards in the Kennicott River basin, Wrangell-St. Elias National Park Preserve, Alaska

    USGS Publications Warehouse

    Rickman, R.L.; Rosenkrans, D.S.

    1997-01-01

    McCarthy, Alaska, is on the Kennicott River, about 1 mile from the terminus of Kennicott Glacier in the Wrangell-St. Elias National Park and Preserve. Most visitors to McCarthy and the park cross the West Fork Kennicott River using a hand-pulled tram and cross the East Fork Kennicott River on a temporary footbridge. Outburst floods from glacier-dammed lakes result in channel erosion, aggradation, and migration of the Kennicott River, which disrupt transportation links, destroy property, and threaten life. Hidden Creek Lake, the largest of six glacier-dammed lakes in the Kennicott River Basin, has annual outbursts that cause the largest floods on the Kennicott River. Outbursts from Hidden Creek Lake occur from early fall to mid-summer, and lake levels at the onset of the outbursts have declined between 1909 and 1995. Criteria for impending outbursts for Hidden Creek Lake include lake stage near or above 3,000 to 3,020 feet, stationary or declining lake stage, evidence of recent calving of large ice blocks from the ice margin, slush ice and small icebergs stranded on the lakeshore, and fresh fractures in the ice-margin region. The lower Kennicott Glacier has thinned and retreated since about 1860. The East and West Fork Kennicott River channels migrated in response to changes in the lower Kennicott Glacier. The largest channel changes occur during outburst floods from Hidden Creek Lake, whereas channel changes from the other glacier-dammed lake outbursts are small. Each year, the West Fork Kennicott River conveys a larger percentage of the Kennicott Glacier drainage than it did the previous year. Outburst floods on the Kennicott River cause the river stage to rise over a period of several hours. Smaller spike peaks have a very rapid stage rise. Potential flood magnitude was estimated by combining known maximum discharges from Hidden Creek Lake and Lake Erie outburst floods with a theoretical large regional flood. Flood hazard areas at the transportation corridor were delineated, and possible future geomorphological changes were hypothesized. McCarthy, Alaska, is on the Kennicott River, about 1 mile from the terminus of Kennicott Glacier in the Wrangell-St. Elias National Park and Preserve. Most visitors to McCarthy and the park cross the West Fork Kennicott River using a hand-pulled tram and cross the East Fork Kennicott River on a temporary footbridge. Outburst floods from glacier-dammed lakes result in channel erosion, aggradation, and migration of the Kennicott River, which disrupt transportation links, destroy property, and threaten life. Hidden Creek Lake, the largest of six glacier-dammed lakes in the Kennicott River Basin, has annual outbursts that cause the largest floods on the Kennicott River. Outbursts from Hidden Creek Lake occur from early fall to mid-summer, and lake levels at the onset of the outbursts have declined between 1909 and 1995. Criteria for impending outbursts for Hidden Creek Lake include lake stage near or above 3,000 to 3,020 feet, stationary or declining lake stage, evidence of recent calving of large ice blocks from the ice margin, slush ice and small icebergs stranded on the lakeshore, and fresh fractures in the ice-margin region. The lower Kennicott Glacier has thinned and retreated since about 1860. The East and West Fork Kennicott River channels migrated in response to changes in the lower Kennicott Glacier. The largest channel changes occur during outburst floods from Hidden Creek Lake, whereas channel changes from the other glacier-dammed lake outbursts are small. Each year, the West Fork Kennicott River conveys a larger percentage of the Kennicott Glacier drainage than it did the previous year. Outburst floods on the Kennicott River cause the river stage to rise over a period of several hours. Smaller spike peaks have a very rapid stage rise. Potential flood magnitude was estimated by combining known maximum discharges from Hidden Creek Lake and Lake Erie outburst floods with

  5. Phasic Triplet Markov Chains.

    PubMed

    El Yazid Boudaren, Mohamed; Monfrini, Emmanuel; Pieczynski, Wojciech; Aïssani, Amar

    2014-11-01

    Hidden Markov chains have been shown to be inadequate for data modeling under some complex conditions. In this work, we address the problem of statistical modeling of phenomena involving two heterogeneous system states. Such phenomena may arise in biology or communications, among other fields. Namely, we consider that a sequence of meaningful words is to be searched within a whole observation that also contains arbitrary one-by-one symbols. Moreover, a word may be interrupted at some site to be carried on later. Applying plain hidden Markov chains to such data, while ignoring their specificity, yields unsatisfactory results. The Phasic triplet Markov chain, proposed in this paper, overcomes this difficulty by means of an auxiliary underlying process in accordance with the triplet Markov chains theory. Related Bayesian restoration techniques and parameters estimation procedures according to the new model are then described. Finally, to assess the performance of the proposed model against the conventional hidden Markov chain model, experiments are conducted on synthetic and real data.

  6. Usability Flaws in Medication Alerting Systems: Impact on Usage and Work System.

    PubMed

    Marcilly, R; Ammenwerth, E; Roehrer, E; Pelayo, S; Vasseur, F; Beuscart-Zéphir, M-C

    2015-08-13

    Previous research has shown that medication alerting systems face usability issues. There has been no previous attempt to systematically explore the consequences of usability flaws in such systems on users (i.e. usage problems) and work systems (i.e. negative outcomes). This paper aims at exploring and synthesizing the consequences of usability flaws in terms of usage problems and negative outcomes on the work system. A secondary analysis of 26 papers included in a prior systematic review of the usability flaws in medication alerting was performed. Usage problems and negative outcomes were extracted and sorted. Links between usability flaws, usage problems, and negative outcomes were also analyzed. Poor usability generates a large variety of consequences. It impacts the user from a cognitive, behavioral, emotional, and attitudinal perspective. Ultimately, usability flaws have negative consequences on the workflow, the effectiveness of the technology, the medication management process, and, more importantly, patient safety. Only few complete pathways leading from usability flaws to negative outcomes were identified. Usability flaws in medication alerting systems impede users, and ultimately their work system, and negatively impact patient safety. Therefore, the usability dimension may act as a hidden explanatory variable that could explain, at least partly, the (absence of) intended outcomes of new technology.

  7. Usability Flaws in Medication Alerting Systems: Impact on Usage and Work System

    PubMed Central

    Ammenwerth, E.; Roehrer, E.; Pelayo, S.; Vasseur, F.; Beuscart-Zéphir, M.-C.

    2015-01-01

    Summary Objectives Previous research has shown that medication alerting systems face usability issues. There has been no previous attempt to systematically explore the consequences of usability flaws in such systems on users (i.e. usage problems) and work systems (i.e. negative outcomes). This paper aims at exploring and synthesizing the consequences of usability flaws in terms of usage problems and negative outcomes on the work system. Methods A secondary analysis of 26 papers included in a prior systematic review of the usability flaws in medication alerting was performed. Usage problems and negative outcomes were extracted and sorted. Links between usability flaws, usage problems, and negative outcomes were also analyzed. Results Poor usability generates a large variety of consequences. It impacts the user from a cognitive, behavioral, emotional, and attitudinal perspective. Ultimately, usability flaws have negative consequences on the workflow, the effectiveness of the technology, the medication management process, and, more importantly, patient safety. Only few complete pathways leading from usability flaws to negative outcomes were identified. Conclusion Usability flaws in medication alerting systems impede users, and ultimately their work system, and negatively impact patient safety. Therefore, the usability dimension may act as a hidden explanatory variable that could explain, at least partly, the (absence of) intended outcomes of new technology. PMID:26123906

  8. Nondestructive detection of infested chestnuts based on NIR spectroscopy

    USDA-ARS?s Scientific Manuscript database

    Insect feeding is a significant postharvest problem for processors of Chestnuts (Castanea sativa, Miller). In most cases, damage from insects is 'hidden', i.e. not visually detectable on the fruit surface. Consequently, traditional sorting techniques, including manual sorting, are generally inadequa...

  9. A First Course in Intercultural Communication.

    ERIC Educational Resources Information Center

    Goodyear, F. H.; Williams, Patrick L.

    The Texas Christian University course description, outline, and supporting bibliography deal with the problems of intercultural, interracial communication. The course plan begins with the thesis that racism is institutionalized and that the eradication of racism requires changes in individuals' awareness of their own hidden discriminatory…

  10. Normal Science Education and Its Dangers: The Case of School Chemistry.

    ERIC Educational Resources Information Center

    Van Berkel, Berry; De Vos, Wobbe; Verdonk, Adri H.; Pilot, Albert

    2000-01-01

    Attempts to solve the problem of hidden structure in school chemistry. Argues that normal chemistry education is isolated from common sense, everyday life and society, the history and philosophy of science, technology, school physics, and chemical research. (Author/CCM)

  11. National Security Policy and Security Challenges of Maldives

    DTIC Science & Technology

    2014-06-13

    creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a

  12. Computational study of peptide permeation through membrane: searching for hidden slow variables

    NASA Astrophysics Data System (ADS)

    Cardenas, Alfredo E.; Elber, Ron

    2013-12-01

    Atomically detailed molecular dynamics trajectories in conjunction with Milestoning are used to analyse the different contributions of coarse variables to the permeation process of a small peptide (N-acetyl-l-tryptophanamide, NATA) through a 1,2-dioleoyl-sn-glycero-3-phosphocholine membrane. The peptide reverses its overall orientation as it permeates through the biological bilayer. The large change in orientation is investigated explicitly but is shown to impact the free energy landscape and permeation time only moderately. Nevertheless, a significant difference in permeation properties of the two halves of the membrane suggests the presence of other hidden slow variables. We speculate, based on calculation of the potential of mean force, that a conformational transition of NATA makes significant contribution to these differences. Other candidates for hidden slow variables may include water permeation and collective motions of phospholipids.

  13. Market impact and trading profile of hidden orders in stock markets.

    PubMed

    Moro, Esteban; Vicente, Javier; Moyano, Luis G; Gerig, Austin; Farmer, J Doyne; Vaglica, Gabriella; Lillo, Fabrizio; Mantegna, Rosario N

    2009-12-01

    We empirically study the market impact of trading orders. We are specifically interested in large trading orders that are executed incrementally, which we call hidden orders. These are statistically reconstructed based on information about market member codes using data from the Spanish Stock Market and the London Stock Exchange. We find that market impact is strongly concave, approximately increasing as the square root of order size. Furthermore, as a given order is executed, the impact grows in time according to a power law; after the order is finished, it reverts to a level of about 0.5-0.7 of its value at its peak. We observe that hidden orders are executed at a rate that more or less matches trading in the overall market, except for small deviations at the beginning and end of the order.

  14. Market impact and trading profile of hidden orders in stock markets

    NASA Astrophysics Data System (ADS)

    Moro, Esteban; Vicente, Javier; Moyano, Luis G.; Gerig, Austin; Farmer, J. Doyne; Vaglica, Gabriella; Lillo, Fabrizio; Mantegna, Rosario N.

    2009-12-01

    We empirically study the market impact of trading orders. We are specifically interested in large trading orders that are executed incrementally, which we call hidden orders. These are statistically reconstructed based on information about market member codes using data from the Spanish Stock Market and the London Stock Exchange. We find that market impact is strongly concave, approximately increasing as the square root of order size. Furthermore, as a given order is executed, the impact grows in time according to a power law; after the order is finished, it reverts to a level of about 0.5-0.7 of its value at its peak. We observe that hidden orders are executed at a rate that more or less matches trading in the overall market, except for small deviations at the beginning and end of the order.

  15. Multispectral THz-VIS passive imaging system for hidden threats visualization

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Palka, Norbert; Szustakowski, Mieczyslaw

    2013-10-01

    Terahertz imaging, is the latest entry into the crowded field of imaging technologies. Many applications are emerging for the relatively new technology. THz radiation penetrates deep into nonpolar and nonmetallic materials such as paper, plastic, clothes, wood, and ceramics that are usually opaque at optical wavelengths. The T-rays have large potential in the field of hidden objects detection because it is not harmful to humans. The main difficulty in the THz imaging systems is low image quality thus it is justified to combine THz images with the high-resolution images from a visible camera. An imaging system is usually composed of various subsystems. Many of the imaging systems use imaging devices working in various spectral ranges. Our goal is to build a system harmless to humans for screening and detection of hidden objects using a THz and VIS cameras.

  16. Object permanence in the food-storing coal tit (Periparus ater) and the non-storing great tit (Parus major): Is the mental representation required?

    PubMed

    Marhounová, Lucie; Frynta, Daniel; Fuchs, Roman; Landová, Eva

    2017-05-01

    Object permanence is a cognitive ability that enables animals to mentally represent the continuous existence of temporarily hidden objects. Generally, it develops gradually through six qualitative stages, the evolution of which may be connected with some specific ecological and behavioral factors. In birds, the advanced object permanence skills were reported in several storing species of the Corvidae family. In order to test the association between food-storing and achieved performance within the stages, we compared food-storing coal tits (Periparus ater) and nonstoring great tits (Parus major) using an adapted version of Uzgiris & Hunt's Scale 1 tasks. The coal tits significantly outperformed the great tits in searching for completely hidden objects. Most of the great tits could not solve the task when the object disappeared completely. However, the upper limit for both species is likely to be Stage 4. The coal tits could solve problems with simply hidden objects, but they used alternative strategies rather than mental representation when searching for completely hidden objects, especially if choosing between two locations. Our results also suggest that neophobia did not affect the overall performance in the object permanence tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Deep generative learning of location-invariant visual word recognition.

    PubMed

    Di Bono, Maria Grazia; Zorzi, Marco

    2013-01-01

    It is widely believed that orthographic processing implies an approximate, flexible coding of letter position, as shown by relative-position and transposition priming effects in visual word recognition. These findings have inspired alternative proposals about the representation of letter position, ranging from noisy coding across the ordinal positions to relative position coding based on open bigrams. This debate can be cast within the broader problem of learning location-invariant representations of written words, that is, a coding scheme abstracting the identity and position of letters (and combinations of letters) from their eye-centered (i.e., retinal) locations. We asked whether location-invariance would emerge from deep unsupervised learning on letter strings and what type of intermediate coding would emerge in the resulting hierarchical generative model. We trained a deep network with three hidden layers on an artificial dataset of letter strings presented at five possible retinal locations. Though word-level information (i.e., word identity) was never provided to the network during training, linear decoding from the activity of the deepest hidden layer yielded near-perfect accuracy in location-invariant word recognition. Conversely, decoding from lower layers yielded a large number of transposition errors. Analyses of emergent internal representations showed that word selectivity and location invariance increased as a function of layer depth. Word-tuning and location-invariance were found at the level of single neurons, but there was no evidence for bigram coding. Finally, the distributed internal representation of words at the deepest layer showed higher similarity to the representation elicited by the two exterior letters than by other combinations of two contiguous letters, in agreement with the hypothesis that word edges have special status. These results reveal that the efficient coding of written words-which was the model's learning objective-is largely based on letter-level information.

  18. Dietary phytate, zinc and hidden zinc deficiency.

    PubMed

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  19. The paradox of intelligence: Heritability and malleability coexist in hidden gene-environment interplay.

    PubMed

    Sauce, Bruno; Matzel, Louis D

    2018-01-01

    Intelligence can have an extremely high heritability, but also be malleable; a paradox that has been the source of continuous controversy. Here we attempt to clarify the issue, and advance a frequently overlooked solution to the paradox: Intelligence is a trait with unusual properties that create a large reservoir of hidden gene-environment (GE) networks, allowing for the contribution of high genetic and environmental influences on individual differences in IQ. GE interplay is difficult to specify with current methods, and is underestimated in standard metrics of heritability (thus inflating estimates of "genetic" effects). We describe empirical evidence for GE interplay in intelligence, with malleability existing on top of heritability. The evidence covers cognitive gains consequent to adoption/immigration, changes in IQ's heritability across life span and socioeconomic status, gains in IQ over time consequent to societal development (the Flynn effect), the slowdown of age-related cognitive decline, and the gains in intelligence from early education. The GE solution has novel implications for enduring problems, including our inability to identify intelligence-related genes (also known as IQ's "missing heritability"), and the loss of initial benefits from early intervention programs (such as "Head Start"). The GE solution can be a powerful guide to future research, and may also aid policies to overcome barriers to the development of intelligence, particularly in impoverished and underprivileged populations. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  20. A robust omnifont open-vocabulary Arabic OCR system using pseudo-2D-HMM

    NASA Astrophysics Data System (ADS)

    Rashwan, Abdullah M.; Rashwan, Mohsen A.; Abdel-Hameed, Ahmed; Abdou, Sherif; Khalil, A. H.

    2012-01-01

    Recognizing old documents is highly desirable since the demand for quickly searching millions of archived documents has recently increased. Using Hidden Markov Models (HMMs) has been proven to be a good solution to tackle the main problems of recognizing typewritten Arabic characters. These attempts however achieved a remarkable success for omnifont OCR under very favorable conditions, they didn't achieve the same performance in practical conditions, i.e. noisy documents. In this paper we present an omnifont, large-vocabulary Arabic OCR system using Pseudo Two Dimensional Hidden Markov Model (P2DHMM), which is a generalization of the HMM. P2DHMM offers a more efficient way to model the Arabic characters, such model offer both minimal dependency on the font size/style (omnifont), and high level of robustness against noise. The evaluation results of this system are very promising compared to a baseline HMM system and best OCRs available in the market (Sakhr and NovoDynamics). The recognition accuracy of the P2DHMM classifier is measured against the classic HMM classifier, the average word accuracy rates for P2DHMM and HMM classifiers are 79% and 66% respectively. The overall system accuracy is measured against Sakhr and NovoDynamics OCR systems, the average word accuracy rates for P2DHMM, NovoDynamics, and Sakhr are 74%, 71%, and 61% respectively.

  1. Sequence2Vec: a novel embedding approach for modeling transcription factor binding affinity landscape.

    PubMed

    Dai, Hanjun; Umarov, Ramzan; Kuwahara, Hiroyuki; Li, Yu; Song, Le; Gao, Xin

    2017-11-15

    An accurate characterization of transcription factor (TF)-DNA affinity landscape is crucial to a quantitative understanding of the molecular mechanisms underpinning endogenous gene regulation. While recent advances in biotechnology have brought the opportunity for building binding affinity prediction methods, the accurate characterization of TF-DNA binding affinity landscape still remains a challenging problem. Here we propose a novel sequence embedding approach for modeling the transcription factor binding affinity landscape. Our method represents DNA binding sequences as a hidden Markov model which captures both position specific information and long-range dependency in the sequence. A cornerstone of our method is a novel message passing-like embedding algorithm, called Sequence2Vec, which maps these hidden Markov models into a common nonlinear feature space and uses these embedded features to build a predictive model. Our method is a novel combination of the strength of probabilistic graphical models, feature space embedding and deep learning. We conducted comprehensive experiments on over 90 large-scale TF-DNA datasets which were measured by different high-throughput experimental technologies. Sequence2Vec outperforms alternative machine learning methods as well as the state-of-the-art binding affinity prediction methods. Our program is freely available at https://github.com/ramzan1990/sequence2vec. xin.gao@kaust.edu.sa or lsong@cc.gatech.edu. Supplementary data are available at Bioinformatics online. © The Author(s) 2017. Published by Oxford University Press.

  2. The quantum n-body problem in dimension d ⩾ n – 1: ground state

    NASA Astrophysics Data System (ADS)

    Miller, Willard, Jr.; Turbiner, Alexander V.; Escobar-Ruiz, M. A.

    2018-05-01

    We employ generalized Euler coordinates for the n body system in dimensional space, which consists of the centre-of-mass vector, relative (mutual) mass-independent distances r ij and angles as remaining coordinates. We prove that the kinetic energy of the quantum n-body problem for can be written as the sum of three terms: (i) kinetic energy of centre-of-mass, (ii) the second order differential operator which depends on relative distances alone and (iii) the differential operator which annihilates any angle-independent function. The operator has a large reflection symmetry group and in variables is an algebraic operator, which can be written in terms of generators of the hidden algebra . Thus, makes sense of the Hamiltonian of a quantum Euler–Arnold top in a constant magnetic field. It is conjectured that for any n, the similarity-transformed is the Laplace–Beltrami operator plus (effective) potential; thus, it describes a -dimensional quantum particle in curved space. This was verified for . After de-quantization the similarity-transformed becomes the Hamiltonian of the classical top with variable tensor of inertia in an external potential. This approach allows a reduction of the dn-dimensional spectral problem to a -dimensional spectral problem if the eigenfunctions depend only on relative distances. We prove that the ground state function of the n body problem depends on relative distances alone.

  3. Hidden Worries

    ERIC Educational Resources Information Center

    Reclaiming Children and Youth, 2013

    2013-01-01

    Sometimes children are stressed about seemingly small events that escalate into problem behavior. In this article, an insightful teacher discusses restoration of emotional balance by mobilizing positive support from both school and family using A Response Ability Pathways (RAP) intervention. The RAP techniques and how they can be used are…

  4. The Hidden Cost of Saying No!

    ERIC Educational Resources Information Center

    Dyson, Freeman J.

    1975-01-01

    Four problems of the regulation of technological development are reviewed: Djerassi's study of the regulation of chemical birth control agents; the downfall of the American supersonic airliner; climate modification; and genetic engineering. The author examines technology and the nature of bureaucratic institutions with respect to the political…

  5. The importance of situation-specific encodings: analysis of a simple connectionist model of letter transposition effects

    NASA Astrophysics Data System (ADS)

    Fang, Shin-Yi; Smith, Garrett; Tabor, Whitney

    2018-04-01

    This paper analyses a three-layer connectionist network that solves a translation-invariance problem, offering a novel explanation for transposed letter effects in word reading. Analysis of the hidden unit encodings provides insight into two central issues in cognitive science: (1) What is the novelty of claims of "modality-specific" encodings? and (2) How can a learning system establish a complex internal structure needed to solve a problem? Although these topics (embodied cognition and learnability) are often treated separately, we find a close relationship between them: modality-specific features help the network discover an abstract encoding by causing it to break the initial symmetries of the hidden units in an effective way. While this neural model is extremely simple compared to the human brain, our results suggest that neural networks need not be black boxes and that carefully examining their encoding behaviours may reveal how they differ from classical ideas about the mind-world relationship.

  6. Elder Abuse: The Hidden Problem. A Briefing by the Select Committee on Aging, House of Representatives, Ninety-Sixth Congress, First Session (Boston, Massachusetts, June 23, 1979).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. House Select Committee on Aging.

    This briefing by the Congressional Select Committee on Aging was designed to gather information on the physical and psychological abuse of the elderly. A number of witness reports are included, testifying to the seriousness and extent of the problem of elder abuse. It is pointed out that many victims refuse to admit abuse; public discussions of…

  7. Electric Field Effects on the Hidden Order of Microstructured URu 2Si 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stritzinger, Laurel Elaine Winter; Mcdonald, Ross David; Harrison, Neil

    2017-03-23

    Despite being studied for over 30 years there is still continual interest in they heavy-fermion URu 2Si 2 due largely in part to the still disagreed upon origin of the so-called hidden-order (HO) state that arises below THO = 17.5 K. While both the application of pressure and high magnetic fields have been shown to suppress the HO state, one mechanism that has yet to be explored is the application of an electric field, most likely due to the difficulty of measuring such an effect in a metal. To overcome this challenge we have used focused ion beam (FIB) lithographymore » to obtain the necessary sample geometry to create an electric field across a small section of the sample by applying a voltage. Our results suggest that at low temperatures the application of an electric field is able to suppress the hidden order state.« less

  8. Statistical Inference in Hidden Markov Models Using k-Segment Constraints

    PubMed Central

    Titsias, Michalis K.; Holmes, Christopher C.; Yau, Christopher

    2016-01-01

    Hidden Markov models (HMMs) are one of the most widely used statistical methods for analyzing sequence data. However, the reporting of output from HMMs has largely been restricted to the presentation of the most-probable (MAP) hidden state sequence, found via the Viterbi algorithm, or the sequence of most probable marginals using the forward–backward algorithm. In this article, we expand the amount of information we could obtain from the posterior distribution of an HMM by introducing linear-time dynamic programming recursions that, conditional on a user-specified constraint in the number of segments, allow us to (i) find MAP sequences, (ii) compute posterior probabilities, and (iii) simulate sample paths. We collectively call these recursions k-segment algorithms and illustrate their utility using simulated and real examples. We also highlight the prospective and retrospective use of k-segment constraints for fitting HMMs or exploring existing model fits. Supplementary materials for this article are available online. PMID:27226674

  9. Subcommunities and Their Mutual Relationships in a Transaction Network

    NASA Astrophysics Data System (ADS)

    Iino, T.; Iyetomi, H.

    We investigate a Japanese transaction network consisting ofabout 800 thousand firms (nodes) and four million business relations (links) with focus on its modular structure. Communities detected by maximizing modularity often are dominated by firms with common features or behaviors in the network, such as characterized by regions or industry sectors. However, it is well known that the modularity optimization approach has a resolution limit problem, that is, it fails in identifying fine communities buried in large communities. To unfold such hidden structures, we apply the community detection to each of subnetworks formed by isolating those communities from the whole body. Subcommunities thus identified are composed of firms with finer regions, more specified sectors or business affiliations. Also we introduce a new idea of reduced modularity matrix to measure the strength of relations between (sub)communities.

  10. Exploring extra dimensions through inflationary tensor modes

    NASA Astrophysics Data System (ADS)

    Im, Sang Hui; Nilles, Hans Peter; Trautner, Andreas

    2018-03-01

    Predictions of inflationary schemes can be influenced by the presence of extra dimensions. This could be of particular relevance for the spectrum of gravitational waves in models where the extra dimensions provide a brane-world solution to the hierarchy problem. Apart from models of large as well as exponentially warped extra dimensions, we analyze the size of tensor modes in the Linear Dilaton scheme recently revived in the discussion of the "clockwork mechanism". The results are model dependent, significantly enhanced tensor modes on one side and a suppression on the other. In some cases we are led to a scheme of "remote inflation", where the expansion is driven by energies at a hidden brane. In all cases where tensor modes are enhanced, the requirement of perturbativity of gravity leads to a stringent upper limit on the allowed Hubble rate during inflation.

  11. Curricula Equity in Required Ninth-Grade Physical Education.

    ERIC Educational Resources Information Center

    Napper-Owen, Gloria E.; Kovar, Susan K.; Ermler, Kathy L.; Mehrhof, Joella H.

    1999-01-01

    Surveyed high school physical educators regarding required physical education programs, examining hidden curriculum about gender equity and culture. Team sports dominated the instructional units. Teachers had problems involving all students in coeducational activities. Female teachers were more apt to teach outside their socially accepted area of…

  12. Allergies: The Hidden Hazard.

    ERIC Educational Resources Information Center

    Rapp, Doris J.

    1990-01-01

    Children can suffer from allergies that can markedly affect their behavior and school performance. Once an allergy is suspected, teachers and principals can consider allergens inside the school, outside the school, and related to problem foods or chemicals. A sidebar lists some allergy clues to watch for. Includes nine references. (MLH)

  13. The Camp Caretaker: A Hidden Treasure.

    ERIC Educational Resources Information Center

    Ezersky, Eugene M.

    1996-01-01

    At a round-table discussion, five camp caretakers identified common camp maintenance problems. Snow loads, wooden floors, storage of lake equipment, removal of grass cuttings and leaves, local suppliers, vandalism and trespassing, swimming pools, assigning work, use of outside contractors, decisions to replace or repair, job satisfaction, and…

  14. Computer Intelligence: Unlimited and Untapped.

    ERIC Educational Resources Information Center

    Staples, Betsy

    1983-01-01

    Herbert Simon (Nobel prize-winning economist/professor) expresses his views on human and artificial intelligence, problem solving, inventing concepts, and the future. Includes comments on expert systems, state of the art in artificial intelligence, robotics, and "Bacon," a computer program that finds scientific laws hidden in raw data.…

  15. How to choose a calving law

    NASA Astrophysics Data System (ADS)

    O'Leary, M.

    2014-12-01

    Any model of an ocean-terminating ice mass requires a frontal boundary condition, often referred to as a "calving law". The choice of this boundary condition can have complex and poorly-understood effects on the behaviour of the system. Despite this, calving laws are often chosen based on numerical convenience or fashions in the literature. This can often lead to predictions which have "hidden dependencies" on the particular choice of calving law. As an attempt to alleviate this problem, I will show results from a wide variety of calving laws, applied to tidewater glacier scenarios. I will demonstrate how the decadal-scale stability of a tidewater system can put constraints on possible calving laws, and how certain observational phenomena, such as the presence of "pinning points" are largely independent of the choice of calving law. These results can be used by practitioners to decide on appropriate calving laws for the specific problems at hand. They should also be useful to help direct research into new calving laws, and to guide our conception of what an ideal calving law should look like.

  16. A meta-cognitive learning algorithm for a Fully Complex-valued Relaxation Network.

    PubMed

    Savitha, R; Suresh, S; Sundararajan, N

    2012-08-01

    This paper presents a meta-cognitive learning algorithm for a single hidden layer complex-valued neural network called "Meta-cognitive Fully Complex-valued Relaxation Network (McFCRN)". McFCRN has two components: a cognitive component and a meta-cognitive component. A Fully Complex-valued Relaxation Network (FCRN) with a fully complex-valued Gaussian like activation function (sech) in the hidden layer and an exponential activation function in the output layer forms the cognitive component. The meta-cognitive component contains a self-regulatory learning mechanism which controls the learning ability of FCRN by deciding what-to-learn, when-to-learn and how-to-learn from a sequence of training data. The input parameters of cognitive components are chosen randomly and the output parameters are estimated by minimizing a logarithmic error function. The problem of explicit minimization of magnitude and phase errors in the logarithmic error function is converted to system of linear equations and output parameters of FCRN are computed analytically. McFCRN starts with zero hidden neuron and builds the number of neurons required to approximate the target function. The meta-cognitive component selects the best learning strategy for FCRN to acquire the knowledge from training data and also adapts the learning strategies to implement best human learning components. Performance studies on a function approximation and real-valued classification problems show that proposed McFCRN performs better than the existing results reported in the literature. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. Effective Data-Driven Calibration for a Galvanometric Laser Scanning System Using Binocular Stereo Vision.

    PubMed

    Tu, Junchao; Zhang, Liyan

    2018-01-12

    A new solution to the problem of galvanometric laser scanning (GLS) system calibration is presented. Under the machine learning framework, we build a single-hidden layer feedforward neural network (SLFN)to represent the GLS system, which takes the digital control signal at the drives of the GLS system as input and the space vector of the corresponding outgoing laser beam as output. The training data set is obtained with the aid of a moving mechanism and a binocular stereo system. The parameters of the SLFN are efficiently solved in a closed form by using extreme learning machine (ELM). By quantitatively analyzing the regression precision with respective to the number of hidden neurons in the SLFN, we demonstrate that the proper number of hidden neurons can be safely chosen from a broad interval to guarantee good generalization performance. Compared to the traditional model-driven calibration, the proposed calibration method does not need a complex modeling process and is more accurate and stable. As the output of the network is the space vectors of the outgoing laser beams, it costs much less training time and can provide a uniform solution to both laser projection and 3D-reconstruction, in contrast with the existing data-driven calibration method which only works for the laser triangulation problem. Calibration experiment, projection experiment and 3D reconstruction experiment are respectively conducted to test the proposed method, and good results are obtained.

  18. Hybridization with a twist: Hidden (hastatic) order in URu2Si2

    NASA Astrophysics Data System (ADS)

    Flint, Rebecca

    The hidden order developing below 17.5K in the heavy fermion material URu2Si2 has eluded identification for over thirty years. A number of recent experiments have shed new light on the nature of this phase. In particular, de Haas-van Alphen measurements indicate nearly perfectly Ising quasiparticles deep in the hidden order phase, and recent nonlinear susceptibility measurements show that this strong Ising anisotropy persists up to and above the hidden order transition itself. Along with other features, this Ising anisotropy implies that the conduction electrons hybridize with a local Ising moment - a 5f2 state of the uranium atom with integer spin. As the hybridization mixes states of integer and half-integer spin, it is itself a spinor and this ``hastatic'' (hasta: [Latin] spear) order parameter therefore breaks both time-reversal and double time-reversal symmetries. A microscopic theory of hastatic order naturally unites a number of disparate experimental results from the large entropy of condensation to the spin rotational symmetry breaking seen in torque magnetometry, and provides a number of experimental predictions. Moreover, this new spinorial order parameter provides a window into a number of new heavy fermion phases.

  19. Hidden order and flux attachment in symmetry-protected topological phases: A Laughlin-like approach

    NASA Astrophysics Data System (ADS)

    Ringel, Zohar; Simon, Steven H.

    2015-05-01

    Topological phases of matter are distinct from conventional ones by their lack of a local order parameter. Still in the quantum Hall effect, hidden order parameters exist and constitute the basis for the celebrated composite-particle approach. Whether similar hidden orders exist in 2D and 3D symmetry protected topological phases (SPTs) is a largely open question. Here, we introduce a new approach for generating SPT ground states, based on a generalization of the Laughlin wave function. This approach gives a simple and unifying picture of some classes of SPTs in 1D and 2D, and reveals their hidden order and flux attachment structures. For the 1D case, we derive exact relations between the wave functions obtained in this manner and group cohomology wave functions, as well as matrix product state classification. For the 2D Ising SPT, strong analytical and numerical evidence is given to show that the wave function obtained indeed describes the desired SPT. The Ising SPT then appears as a state with quasi-long-range order in composite degrees of freedom consisting of Ising-symmetry charges attached to Ising-symmetry fluxes.

  20. Ultrasonic Inspection Of Thick Sections

    NASA Technical Reports Server (NTRS)

    Friant, C. L.; Djordjevic, B. B.; O'Keefe, C. V.; Ferrell, W.; Klutz, T.

    1993-01-01

    Ultrasonics used to inspect large, relatively thick vessels for hidden defects. Report based on experiments in through-the-thickness transmission of ultrasonic waves in both steel and filament-wound composite cases of solid-fuel rocket motors.

  1. Key ingredients needed when building large data processing systems for scientists

    NASA Technical Reports Server (NTRS)

    Miller, K. C.

    2002-01-01

    Why is building a large science software system so painful? Weren't teams of software engineers supposed to make life easier for scientists? Does it sometimes feel as if it would be easier to write the million lines of code in Fortran 77 yourself? The cause of this dissatisfaction is that many of the needs of the science customer remain hidden in discussions with software engineers until after a system has already been built. In fact, many of the hidden needs of the science customer conflict with stated needs and are therefore very difficult to meet unless they are addressed from the outset in a system's architectural requirements. What's missing is the consideration of a small set of key software properties in initial agreements about the requirements, the design and the cost of the system.

  2. Selecting a Learning Management System (LMS) in Developing Countries: Instructors' Evaluation

    ERIC Educational Resources Information Center

    Cavus, Nadire

    2013-01-01

    Learning management systems (LMSs) contain hidden costs, unclear user environments, bulky developer and administration manuals, and limitations with regard to interoperability, integration, localization, and bandwidth requirements. Careful evaluation is required in selecting the most appropriate LMS for use, and this is a general problem in…

  3. Aging and Alcohol Abuse: Increasing Counselor Awareness

    ERIC Educational Resources Information Center

    Williams, June M.; Ballard, Mary B.; Alessi, Hunter

    2005-01-01

    Alcohol abuse in older adulthood is a rapidly growing but often hidden problem. The authors provide an overview of the issues related to older adult alcohol abuse through a discussion of physiological, psychological, and social risk factors; an examination of appropriate assessment procedures; and an overview of factors related to treatment.

  4. Hidden in the Middle: Culture, Value and Reward in Bioinformatics

    ERIC Educational Resources Information Center

    Lewis, Jamie; Bartlett, Andrew; Atkinson, Paul

    2016-01-01

    Bioinformatics--the so-called shotgun marriage between biology and computer science--is an interdiscipline. Despite interdisciplinarity being seen as a virtue, for having the capacity to solve complex problems and foster innovation, it has the potential to place projects and people in anomalous categories. For example, valorised…

  5. Administrative Law: The Hidden Comparative Law Course.

    ERIC Educational Resources Information Center

    Strauss, Peter L.

    1996-01-01

    Argues that the main contribution of the Administrative Law course to law students is that it presents problems which contrast with those of the standard court-centered curriculum and can illuminate other areas of law, repeatedly confronting students with doctrinal differences. Offers several examples from civil procedure, constitutional law, and…

  6. Influence of enzymatic hydrolysis on the allergenic reactivity of processed cashew and pistachio

    USDA-ARS?s Scientific Manuscript database

    Tree nuts constitute one of the main cause of fatal anaphylactic reactions due to food allergy upon direct ingestion and as ingredients (hidden allergens), and cashew and pistachio allergies are considered a serious health problem. Several previous studies have shown that thermal processing may modi...

  7. Hispanics in the Criminal Justice System--the "Nonexistent" Problem.

    ERIC Educational Resources Information Center

    Mandel, Jerry

    1979-01-01

    Though hidden from view by being considered "non-existent", the meager evidence indicates that Hispanics have an unusually high arrest and incarceration rate. Hispanic background is rarely asked on the six major sources of criminal justice statistics--statistics of arrests, courts, prisoners, juvenile delinquency, crime victimization, and public…

  8. Evaluating Presentation Skills of Volunteer Trainers.

    ERIC Educational Resources Information Center

    Mohan, Donna K.

    A systematic method for evaluating the presentation skills of volunteer trainers would enable the discovery of hidden problems. It would also increase individual trainer skills and satisfaction and improve the overall effectiveness of the training program. A first step is to determine the general presentation skills a successful volunteer trainer…

  9. Managing Food Allergies in School.

    ERIC Educational Resources Information Center

    Munoz-Furlong, Anne

    1997-01-01

    The number of students with food allergies is increasing, with peanuts the leading culprit. Peer pressure and allergens hidden in baked goods can pose problems for school staff. Children with documented life-threatening allergies are covered by the Americans with Disabilities Act. Principals should reassure parents and use Section 504 guidelines…

  10. Off the Wall?

    ERIC Educational Resources Information Center

    Rittner-Heir, Robbin

    2003-01-01

    Vandalism is the main problem in maintaining school washrooms. Ways to help schools meet this challenge include designing washrooms with hidden moving parts to cut down on vandalism and making toilet partitions of solid polyethylene plastic which is virtually indestructible, hard to deface, and easy to clean. The article suggests it is worth…

  11. Innovations in the Teaching of Behavioral Sciences in the Preclinical Curriculum

    ERIC Educational Resources Information Center

    Mack, Kevin

    2005-01-01

    Objective: In problem-based learning curricula, cases are usually clustered into identified themes or organ systems. While this method of aggregating cases presents clear advantages in terms of resource alignment and student focus, an alternative "hidden cluster" approach provides rich opportunities for content integration. Method: The author…

  12. Sexuality and the Curriculum: The Politics and Practices of Sexuality Education. Critical Issues in the Curriculum.

    ERIC Educational Resources Information Center

    Sears, James T., Ed.

    This book of essays explores the explicit and hidden curriculum of sexuality from kindergarten through college. The 15 interrelated essays challenge conventional assumptions regarding sexuality and the curriculum by applying non-traditional perspectives to traditionally unresolved problems while proposing specific curricular strategies and…

  13. Hidden Disruptions: Technology and Technological Literacy as Influences on Professional Writing Student Teams

    ERIC Educational Resources Information Center

    McGrady, Lisa

    2010-01-01

    This article reports on a study designed to explore whether and in what ways individual students' technological literacies might impact collaborative teams. For the collaborative team discussed in this article, technological literacy--specifically, limited repertoires for solving technical problems, clashes between document management strategies,…

  14. Application research on big data in energy conservation and emission reduction of transportation industry

    NASA Astrophysics Data System (ADS)

    Bai, Bingdong; Chen, Jing; Wang, Mei; Yao, Jingjing

    2017-06-01

    In the context of big data age, the energy conservation and emission reduction of transportation is a natural big data industry. The planning, management, decision-making of energy conservation and emission reduction of transportation and other aspects should be supported by the analysis and forecasting of large amounts of data. Now, with the development of information technology, such as intelligent city, sensor road and so on, information collection technology in the direction of the Internet of things gradually become popular. The 3G/4G network transmission technology develop rapidly, and a large number of energy conservation and emission reduction of transportation data is growing into a series with different ways. The government not only should be able to make good use of big data to solve the problem of energy conservation and emission reduction of transportation, but also to explore and use a large amount of data behind the hidden value. Based on the analysis of the basic characteristics and application technology of energy conservation and emission reduction of transportation data, this paper carries out its application research in energy conservation and emission reduction of transportation industry, so as to provide theoretical basis and reference value for low carbon management.

  15. A fast and accurate online sequential learning algorithm for feedforward networks.

    PubMed

    Liang, Nan-Ying; Huang, Guang-Bin; Saratchandran, P; Sundararajan, N

    2006-11-01

    In this paper, we develop an online sequential learning algorithm for single hidden layer feedforward networks (SLFNs) with additive or radial basis function (RBF) hidden nodes in a unified framework. The algorithm is referred to as online sequential extreme learning machine (OS-ELM) and can learn data one-by-one or chunk-by-chunk (a block of data) with fixed or varying chunk size. The activation functions for additive nodes in OS-ELM can be any bounded nonconstant piecewise continuous functions and the activation functions for RBF nodes can be any integrable piecewise continuous functions. In OS-ELM, the parameters of hidden nodes (the input weights and biases of additive nodes or the centers and impact factors of RBF nodes) are randomly selected and the output weights are analytically determined based on the sequentially arriving data. The algorithm uses the ideas of ELM of Huang et al. developed for batch learning which has been shown to be extremely fast with generalization performance better than other batch training methods. Apart from selecting the number of hidden nodes, no other control parameters have to be manually chosen. Detailed performance comparison of OS-ELM is done with other popular sequential learning algorithms on benchmark problems drawn from the regression, classification and time series prediction areas. The results show that the OS-ELM is faster than the other sequential algorithms and produces better generalization performance.

  16. Probability Sampling Method for a Hidden Population Using Respondent-Driven Sampling: Simulation for Cancer Survivors.

    PubMed

    Jung, Minsoo

    2015-01-01

    When there is no sampling frame within a certain group or the group is concerned that making its population public would bring social stigma, we say the population is hidden. It is difficult to approach this kind of population survey-methodologically because the response rate is low and its members are not quite honest with their responses when probability sampling is used. The only alternative known to address the problems caused by previous methods such as snowball sampling is respondent-driven sampling (RDS), which was developed by Heckathorn and his colleagues. RDS is based on a Markov chain, and uses the social network information of the respondent. This characteristic allows for probability sampling when we survey a hidden population. We verified through computer simulation whether RDS can be used on a hidden population of cancer survivors. According to the simulation results of this thesis, the chain-referral sampling of RDS tends to minimize as the sample gets bigger, and it becomes stabilized as the wave progresses. Therefore, it shows that the final sample information can be completely independent from the initial seeds if a certain level of sample size is secured even if the initial seeds were selected through convenient sampling. Thus, RDS can be considered as an alternative which can improve upon both key informant sampling and ethnographic surveys, and it needs to be utilized for various cases domestically as well.

  17. Reinforcement learning state estimator.

    PubMed

    Morimoto, Jun; Doya, Kenji

    2007-03-01

    In this study, we propose a novel use of reinforcement learning for estimating hidden variables and parameters of nonlinear dynamical systems. A critical issue in hidden-state estimation is that we cannot directly observe estimation errors. However, by defining errors of observable variables as a delayed penalty, we can apply a reinforcement learning frame-work to state estimation problems. Specifically, we derive a method to construct a nonlinear state estimator by finding an appropriate feedback input gain using the policy gradient method. We tested the proposed method on single pendulum dynamics and show that the joint angle variable could be successfully estimated by observing only the angular velocity, and vice versa. In addition, we show that we could acquire a state estimator for the pendulum swing-up task in which a swing-up controller is also acquired by reinforcement learning simultaneously. Furthermore, we demonstrate that it is possible to estimate the dynamics of the pendulum itself while the hidden variables are estimated in the pendulum swing-up task. Application of the proposed method to a two-linked biped model is also presented.

  18. Semi-empirical seismic relations of A-F stars from COROT and Kepler legacy data

    NASA Astrophysics Data System (ADS)

    Moya, A.; Suárez, J. C.; García Hernández, A.; Mendoza, M. A.

    2017-10-01

    Asteroseismology is witnessing a revolution, thanks to high-precise asteroseismic space data (MOST, COROT, Kepler, BRITE) and their large ground-based follow-up programs. Those instruments have provided an unprecedented large amount of information, which allows us to scrutinize its statistical properties in the quest for hidden relations among pulsational and/or physical observables. This approach might be particularly useful for stars whose pulsation content is difficult to interpret. This is the case of intermediate-mass classical pulsating stars (I.e. γ Dor, δ Scuti, hybrids) for which current theories do not properly predict the observed oscillation spectra. Here, we establish a first step in finding such hidden relations from data mining techniques for these stars. We searched for those hidden relations in a sample of δ Scuti and hybrid stars observed by COROT and Kepler (74 and 153, respectively). No significant correlations between pairs of observables were found. However, two statistically significant correlations emerged from multivariable correlations in the observed seismic data, which describe the total number of observed frequencies and the largest one, respectively. Moreover, three different sets of stars were found to cluster according to their frequency density distribution. Such sets are in apparent agreement with the asteroseismic properties commonly accepted for A-F pulsating stars.

  19. Analysis of single ion channel data incorporating time-interval omission and sampling

    PubMed Central

    The, Yu-Kai; Timmer, Jens

    2005-01-01

    Hidden Markov models are widely used to describe single channel currents from patch-clamp experiments. The inevitable anti-aliasing filter limits the time resolution of the measurements and therefore the standard hidden Markov model is not adequate anymore. The notion of time-interval omission has been introduced where brief events are not detected. The developed, exact solutions to this problem do not take into account that the measured intervals are limited by the sampling time. In this case the dead-time that specifies the minimal detectable interval length is not defined unambiguously. We show that a wrong choice of the dead-time leads to considerably biased estimates and present the appropriate equations to describe sampled data. PMID:16849220

  20. A simple method to derive bounds on the size and to train multilayer neural networks

    NASA Technical Reports Server (NTRS)

    Sartori, Michael A.; Antsaklis, Panos J.

    1991-01-01

    A new derivation is presented for the bounds on the size of a multilayer neural network to exactly implement an arbitrary training set; namely, the training set can be implemented with zero error with two layers and with the number of the hidden-layer neurons equal to no.1 is greater than p - 1. The derivation does not require the separation of the input space by particular hyperplanes, as in previous derivations. The weights for the hidden layer can be chosen almost arbitrarily, and the weights for the output layer can be found by solving no.1 + 1 linear equations. The method presented exactly solves (M), the multilayer neural network training problem, for any arbitrary training set.

  1. Surface treatment using metal foil liner

    NASA Technical Reports Server (NTRS)

    Garvey, Ray

    1989-01-01

    A metal foil liner can be used to seal large area surfaces. Characteristics of the two-layer foil liner are discussed. Micrographs for foil-to-foil, foil-to-composite, visible seams, and hidden seams are examined.

  2. On the Application of the Energy Method to Stability Problems

    NASA Technical Reports Server (NTRS)

    Marguerre, Karl

    1947-01-01

    Since stability problems have come into the field of vision of engineers, energy methods have proved to be one of the most powerful aids in mastering them. For finding the especially interesting critical loads special procedures have evolved that depart somewhat from those customary in the usual elasticity theory. A clarification of the connections seemed desirable,especially with regard to the post-critical region, for the treatment of which these special methods are not suited as they are. The present investigation discusses this question-complex (made important by shell construction in aircraft) especially in the classical example of the Euler strut, because in this case - since the basic features are not hidden by difficulties of a mathematical nature - the problem is especially clear. The present treatment differs from that appearing in the Z.f.a.M.M. (1938) under the title "Uber die Behandlung von Stabilittatsproblemen mit Hilfe der energetischen Methode" in that, in order to work out the basic ideas still more clearly,it dispenses with the investigation of behavior at large deflections and of the elastic foundation;in its place the present version gives an elaboration of the 6th section and (in its 7 th and 8th secs.)a new example that shows the applicability of the general criterion to a stability problem that differs from that of Euler in many respects.

  3. Hidden Statistics Approach to Quantum Simulations

    NASA Technical Reports Server (NTRS)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the transitional potential is to provide a jump from a deterministic state to a random state with prescribed probability density. This jump is triggered by blowup instability due to violation of Lipschitz condition generated by the quantum potential. As a result, the dynamics attains quantum properties on a classical scale. The model can be implemented physically as an analog VLSI-based (very-large-scale integration-based) computer, or numerically on a digital computer. This work opens a way of developing fundamentally new algorithms for quantum simulations of exponentially complex problems that expand NASA capabilities in conducting space activities. It has been illustrated that the complexity of simulations of particle interaction can be reduced from an exponential one to a polynomial one.

  4. Tracking the visual focus of attention for a varying number of wandering people.

    PubMed

    Smith, Kevin; Ba, Sileye O; Odobez, Jean-Marc; Gatica-Perez, Daniel

    2008-07-01

    We define and address the problem of finding the visual focus of attention for a varying number of wandering people (VFOA-W), determining where the people's movement is unconstrained. VFOA-W estimation is a new and important problem with mplications for behavior understanding and cognitive science, as well as real-world applications. One such application, which we present in this article, monitors the attention passers-by pay to an outdoor advertisement. Our approach to the VFOA-W problem proposes a multi-person tracking solution based on a dynamic Bayesian network that simultaneously infers the (variable) number of people in a scene, their body locations, their head locations, and their head pose. For efficient inference in the resulting large variable-dimensional state-space we propose a Reversible Jump Markov Chain Monte Carlo (RJMCMC) sampling scheme, as well as a novel global observation model which determines the number of people in the scene and localizes them. We propose a Gaussian Mixture Model (GMM) and Hidden Markov Model (HMM)-based VFOA-W model which use head pose and location information to determine people's focus state. Our models are evaluated for tracking performance and ability to recognize people looking at an outdoor advertisement, with results indicating good performance on sequences where a moderate number of people pass in front of an advertisement.

  5. Bound states via Higgs exchanging and heavy resonant di-Higgs

    NASA Astrophysics Data System (ADS)

    Kang, Zhaofeng

    2017-08-01

    The existence of Higgs boson h predicted by the standard model (SM) was established and hunting for clues to new physics (NP) hidden in h has become the top priority in particle physics. In this paper we explore an intriguing phenomenon that prevails in NP associated with h, bound state (Bh, referring to the ground state only) of relatively heavy particles ϕ out of NP via interchanging h. This is well-motivated due to the intrinsic properties of h: It has zero spin and light mass, capable of mediating Yukawa interactions; moreover, it may be strongly coupled to ϕ in several important contexts, from addressing the naturalness problem by compositeness/supersymmetry (SUSY)/classical scale invariance to understanding neutrino mass origin radiatively and matter asymmetry by electroweak baryogensis. The new resonance Bh, being a neutral scalar boson, has important implications to the large hadron collider (LHC) di-Higgs search because it yields a clear resonant di-Higgs signature at the high mass region (≳ 1 TeV). In other words, searching for Bh offers a new avenue to probe the hidden sector with a Higgs-portal. For illustration in this paper we concentrate on two examples, the stop sector in SUSY and an inert Higgs doublet from a radiative neutrino model. In particular, h-mediation opens a new and wide window to probe the conventional stoponium and the current date begins to have sensitivity to stoponium around TeV.

  6. Skimming Digits: Neuromorphic Classification of Spike-Encoded Images

    PubMed Central

    Cohen, Gregory K.; Orchard, Garrick; Leng, Sio-Hoi; Tapson, Jonathan; Benosman, Ryad B.; van Schaik, André

    2016-01-01

    The growing demands placed upon the field of computer vision have renewed the focus on alternative visual scene representations and processing paradigms. Silicon retinea provide an alternative means of imaging the visual environment, and produce frame-free spatio-temporal data. This paper presents an investigation into event-based digit classification using N-MNIST, a neuromorphic dataset created with a silicon retina, and the Synaptic Kernel Inverse Method (SKIM), a learning method based on principles of dendritic computation. As this work represents the first large-scale and multi-class classification task performed using the SKIM network, it explores different training patterns and output determination methods necessary to extend the original SKIM method to support multi-class problems. Making use of SKIM networks applied to real-world datasets, implementing the largest hidden layer sizes and simultaneously training the largest number of output neurons, the classification system achieved a best-case accuracy of 92.87% for a network containing 10,000 hidden layer neurons. These results represent the highest accuracies achieved against the dataset to date and serve to validate the application of the SKIM method to event-based visual classification tasks. Additionally, the study found that using a square pulse as the supervisory training signal produced the highest accuracy for most output determination methods, but the results also demonstrate that an exponential pattern is better suited to hardware implementations as it makes use of the simplest output determination method based on the maximum value. PMID:27199646

  7. Stanley Corrsin Award Talk: Fluid Mechanics of Fungi and Slime

    NASA Astrophysics Data System (ADS)

    Brenner, Michael

    2013-11-01

    There are interesting fluid mechanics problems everywhere, even in the most lowly and hidden corners of forest floors. Here I discuss some questions we have been working on in recent years involving fungi and slime. A critical issue for the ecology of fungi and slime is nutrient availability: nutrient sources are highly heterogeneous, and strategies are necessary to find food when it runs out. In the fungal phylum Ascomycota, spore dispersal is the primary mechanism for finding new food sources. The defining feature of this phylum is the ascus, a fluid filled sac from which spores are ejected, through a build up in osmotic pressure. We outline the (largely fluid mechanical) design constraints on this ejection strategy, and demonstrate how it provides strong constraints for the diverse morphologies of spores and asci found in nature. The core of the argument revisits a classical problem in elastohydrodynamic lubrication from a different perspective. A completely different strategy for finding new nutrient is found by slime molds and fungi that stretch out - as a single organism- over enormous areas (up to hectares) over forest floors. As a model problem we study the slime mold Physarum polycephalum, which forages with a large network of connected tubes on the forest floors. Localized regions in the network find nutrient sources and then pump the nutrients throughout the entire organism. We discuss fluid mechanical mechanisms for coordinating this transport, which generalize peristalsis to pumping in a heterogeneous network. We give a preliminary discussion to how physarum can detect a nutrient source and pump the nutrient throughout the organism.

  8. Hiding an elephant: heavy sterile neutrino with large mixing angle does not contradict cosmology

    NASA Astrophysics Data System (ADS)

    Bezrukov, F.; Chudaykin, A.; Gorbunov, D.

    2017-06-01

    We study a model of a keV-scale sterile neutrino with a relatively large mixing with the Standard Model sector. Usual considerations predict active generation of such particles in the early Universe, which leads to constraints from the total Dark Matter density and absence of X-ray signal from sterile neutrino decay. These bounds together may deem any attempt of creation of the keV scale sterile neutrino in the laboratory unfeasible. We argue that for models with a hidden sector coupled to the sterile neutrino these bounds can be evaded, opening new perspectives for the direct studies at neutrino experiments such as Troitsk ν-mass and KATRIN. We estimate the generation of sterile neutrinos in scenarios with the hidden sector dynamics keeping the sterile neutrinos either massless or superheavy in the early Universe. In both cases the generation by oscillations from active neutrinos in plasma is suppressed.

  9. Quantum steganography with large payload based on entanglement swapping of χ-type entangled states

    NASA Astrophysics Data System (ADS)

    Qu, Zhi-Guo; Chen, Xiu-Bo; Luo, Ming-Xing; Niu, Xin-Xin; Yang, Yi-Xian

    2011-04-01

    In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.

  10. Modelling with Difference Equations Supported by GeoGebra: Exploring the Kepler Problem

    ERIC Educational Resources Information Center

    Kovacs, Zoltan

    2010-01-01

    The use of difference and differential equations in the modelling is a topic usually studied by advanced students in mathematics. However difference and differential equations appear in the school curriculum in many direct or hidden ways. Difference equations first enter in the curriculum when studying arithmetic sequences. Moreover Newtonian…

  11. Improving School Attendance through Collaboration: A Catalyst for Community Involvement and Change

    ERIC Educational Resources Information Center

    Childs, Joshua; Grooms, Ain A.

    2018-01-01

    Chronic absenteeism is often referred to as a problem hidden in plain sight (Chang & Romero, 2008). In recent years, more communities around the United States have been intentional on improving student attendance and limiting the impact of chronic absenteeism. Using qualitative interviews, we sought to understand how one community was…

  12. Curricular Orientations in Elementary School Music: Roles, Pedagogies, and Values.

    ERIC Educational Resources Information Center

    Bresler, Liora

    1996-01-01

    Explores the day-to-day music curriculum in three elementary schools. Identifies three orientations toward the role of music education: (1) the functional, based on traditional academic goals and content; (2) the complementary, relegating music to a hidden curriculum; and (3) the expansive, focusing on enhancing perceptual and problem-solving…

  13. Relational Aggression among Boys: Blind Spots and Hidden Dramas

    ERIC Educational Resources Information Center

    Eriksen, Ingunn Marie; Lyng, Selma Therese

    2018-01-01

    Although boys too are involved in relational aggression, their experiences are overshadowed by the focus on relational aggression among girls. This paradox mirrors the empirical puzzle that forms the starting point for this article: while teachers saw relational aggression as a 'girl problem', we found a vast undercurrent of relational aggression…

  14. Child Abuse and Neglect in Japan: Coin-Operated-Locker Babies.

    ERIC Educational Resources Information Center

    Kouno, Akihisa; Johnson, Charles F.

    1995-01-01

    This paper reviews Japan's child abuse/neglect history, including the incidence of "coin-operated-locker babies," where murdered infants are hidden in railway and airport lockers, and actions taken to reduce this problem. The incidence of child abuse in Japan and the United States is compared, and social influences on the number of…

  15. Is Your School a Dumping Ground?: Hidden Hazards You Can Identify and Eliminate.

    ERIC Educational Resources Information Center

    Cronin-Jones, Linda L.

    1992-01-01

    Describes how teachers and students can conduct a schoolwide hazardous waste survey. The activity is an introduction to hazardous waste management and is useful in general physical science, chemistry, and environmental science classes. Two activity worksheets are provided. Explains how schools can clean up hazardous waste problems. (PR)

  16. The Hidden Curriculum of Whiteness: White Teachers, White Territory, and White Community.

    ERIC Educational Resources Information Center

    Allen, Ricky Lee

    This paper suggests that space and spatiality are major features of racial identity and the formation of student resistance. It brings together critical studies of "Whiteness," human territoriality, and theories of resistance in education. The problems between white teachers and students of color can be understood better through a combination of…

  17. Using Graphing to Reveal the Hidden Transformations in Palindrome (and Other Types of) Licence Plates

    ERIC Educational Resources Information Center

    Nivens, Ryan Andrew

    2016-01-01

    This article provides a range of activities designed to engage students in using an early form of graphing. While the "Australian Curriculum: Mathematics" (2014) highlights understanding, fluency, problem-solving, and reasoning, the National Research Council (2001) describes five strands of mathematical proficiency, with the additional…

  18. User's Guide for SKETCH

    NASA Technical Reports Server (NTRS)

    Hedgley, David R., Jr.

    2000-01-01

    A user's guide for the computer program SKETCH is presented on this disk. SKETCH solves a popular problem in computer graphics-the removal of hidden lines from images of solid objects. Examples and illustrations are included in the guide. Also included is the SKETCH program, so a user can incorporate the information into a particular software system.

  19. Non-Disclosing Students with Disabilities or Learning Challenges: Characteristics and Size of a Hidden Population

    ERIC Educational Resources Information Center

    Grimes, Susan; Scevak, Jill; Southgate, Erica; Buchanan, Rachel

    2017-01-01

    Internationally, university students with disabilities (SWD) are recognised as being under-represented in higher education. They face significant problems accessing appropriate accommodations for their disability. Academic outcomes for this group are lower in terms of achievement and graduation rates. The true size of the SWD group at university…

  20. Investigating a Case of Hidden Misinterpretations of an Additive Word Problem: Structural Substitution

    ERIC Educational Resources Information Center

    Polotskaia, Elena; Savard, Annie; Freiman, Viktor

    2016-01-01

    According to numerous studies (Barrouillet & Camos 2002; Brousseau 1988; Chevallard 1988; Riley et al. 1984; Schubauer-Leoni & Ntamakiliro, "Revue Des Sciences de L'éducation," 20(1): 87-113, 1994; Vergnaud 1982; Xin, "The Journal of Educational Research," 100(6):347-360, 2007), a combination of many factors, including…

  1. Personality and Occupational Stress in Elite Performers.

    ERIC Educational Resources Information Center

    Hamilton, Linda H.; Kella, John J.

    Performing Arts Psychology has recently emerged as a unique subspecialty comparable to that of Sports Psychology. Attention has been focused on problems common to all performers (e.g., performance anxiety); however, the various stresses within each art form often remain hidden from view. To assess the psychological aspects of different art forms,…

  2. The Relationship between Teachers' Views about Cultural Values and Critical Pedagogy

    ERIC Educational Resources Information Center

    Yilmaz, Kursad; Altinkurt, Yahya; Ozciftci, Elif

    2016-01-01

    Problem Statement: Known as basic elements directing individuals' lives, cultural values are hidden cultural elements that influence all evaluations and perceptions. Values, in that sense, are elements individuals are aware of and provide the answer to the "what should I do?" feeling (Schein, 1992). Critical pedagogy is a project based…

  3. Journal of Undergraduate Psychological Research, Vol. 1, No. 1.

    ERIC Educational Resources Information Center

    Ladd, Sandra L., Ed.; Hughmanick, Michael, Ed.

    1974-01-01

    Articles resulting from studies conducted by college undergraduates in all areas of experimental psychology are provided, together with abstracts of other papers authored by students in the field of study. The articles are: The Influence of SET on Solving Hidden-Word Problems by Lana I. Boutacoff; Violation of Personal Space in Deviant Adolescents…

  4. Credits and Credibility: Educating Professionals for Cultural Sensitivity.

    ERIC Educational Resources Information Center

    Morgan, Elizabeth; Weigel, Van

    A four-part discussion on cultural sensitivity and good listening skills in development professionals is presented. It is noted that there is much in their educational regimen which militates against developing these habits of mind. It is hypothesized that much of this problem resides in the hidden cultural meanings of professionalism in general…

  5. Processes Underlying Young Children's Spatial Orientation during Movement.

    ERIC Educational Resources Information Center

    Bremner, J. Gavin; And Others

    1994-01-01

    Tested children 18 months to 4 years for their ability to relocate a hidden object after self-produced movement around an array of 4 locations. Children encountered no specific difficulty in coordinating dimensions, or they solved the task without recourse to such a system. They also appeared to change strategy when the problem requires more…

  6. Bidirectional extreme learning machine for regression problem and its learning effectiveness.

    PubMed

    Yang, Yimin; Wang, Yaonan; Yuan, Xiaofang

    2012-09-01

    It is clear that the learning effectiveness and learning speed of neural networks are in general far slower than required, which has been a major bottleneck for many applications. Recently, a simple and efficient learning method, referred to as extreme learning machine (ELM), was proposed by Huang , which has shown that, compared to some conventional methods, the training time of neural networks can be reduced by a thousand times. However, one of the open problems in ELM research is whether the number of hidden nodes can be further reduced without affecting learning effectiveness. This brief proposes a new learning algorithm, called bidirectional extreme learning machine (B-ELM), in which some hidden nodes are not randomly selected. In theory, this algorithm tends to reduce network output error to 0 at an extremely early learning stage. Furthermore, we find a relationship between the network output error and the network output weights in the proposed B-ELM. Simulation results demonstrate that the proposed method can be tens to hundreds of times faster than other incremental ELM algorithms.

  7. Rule extraction from minimal neural networks for credit card screening.

    PubMed

    Setiono, Rudy; Baesens, Bart; Mues, Christophe

    2011-08-01

    While feedforward neural networks have been widely accepted as effective tools for solving classification problems, the issue of finding the best network architecture remains unresolved, particularly so in real-world problem settings. We address this issue in the context of credit card screening, where it is important to not only find a neural network with good predictive performance but also one that facilitates a clear explanation of how it produces its predictions. We show that minimal neural networks with as few as one hidden unit provide good predictive accuracy, while having the added advantage of making it easier to generate concise and comprehensible classification rules for the user. To further reduce model size, a novel approach is suggested in which network connections from the input units to this hidden unit are removed by a very straightaway pruning procedure. In terms of predictive accuracy, both the minimized neural networks and the rule sets generated from them are shown to compare favorably with other neural network based classifiers. The rules generated from the minimized neural networks are concise and thus easier to validate in a real-life setting.

  8. Sound Classification in Hearing Aids Inspired by Auditory Scene Analysis

    NASA Astrophysics Data System (ADS)

    Büchler, Michael; Allegro, Silvia; Launer, Stefan; Dillier, Norbert

    2005-12-01

    A sound classification system for the automatic recognition of the acoustic environment in a hearing aid is discussed. The system distinguishes the four sound classes "clean speech," "speech in noise," "noise," and "music." A number of features that are inspired by auditory scene analysis are extracted from the sound signal. These features describe amplitude modulations, spectral profile, harmonicity, amplitude onsets, and rhythm. They are evaluated together with different pattern classifiers. Simple classifiers, such as rule-based and minimum-distance classifiers, are compared with more complex approaches, such as Bayes classifier, neural network, and hidden Markov model. Sounds from a large database are employed for both training and testing of the system. The achieved recognition rates are very high except for the class "speech in noise." Problems arise in the classification of compressed pop music, strongly reverberated speech, and tonal or fluctuating noises.

  9. An Exploration of Latent Structure in Observational Huntington’s Disease Studies

    PubMed Central

    Ghosh, Soumya; Sun, Zhaonan; Li, Ying; Cheng, Yu; Mohan, Amrita; Sampaio, Cristina; Hu, Jianying

    2017-01-01

    Huntington’s disease (HD) is a monogenic neurodegenerative disorder characterized by the progressive decay of motor and cognitive abilities accompanied by psychiatric episodes. Tracking and modeling the progression of the multi-faceted clinical symptoms of HD is a challenging problem that has important implications for staging of HD patients and the development of improved enrollment criteria for future HD studies and trials. In this paper, we describe the first steps towards this goal. We begin by curating data from four recent observational HD studies, each containing a diverse collection of clinical assessments. The resulting dataset is unprecedented in size and contains data from 19,269 study participants. By analyzing this large dataset, we are able to discover hidden low dimensional structure in the data that correlates well with surrogate measures of HD progression. The discovered structures are promising candidates for future consumption by downstream statistical HD progression models. PMID:28815114

  10. The Logistics Of Installing Pacs In An Existing Medical Center

    NASA Astrophysics Data System (ADS)

    Saarinen, Allan O.; Goodsitt, Mitchell M.; Loop, John W.

    1989-05-01

    A largely overlooked issue in the Picture Archiving and Communication Systems (PACS) area is the tremendous amount of site planning activity required to install such a system in an existing medical center. Present PACS equipment requires significant hospital real estate, specialized electrical power, cabling, and environmental controls to operate properly. Marshaling the hospital resources necessary to install PACS equipment requires many different players. The site preparation costs are nontrivial and usually include a number of hidden expenses. This paper summarizes the experience of the University of Washington Department of Radiology in installing an extensive digital imaging network (DIN) and PACS throughout the Department and several clinics in the hospital. The major logistical problems encountered at the University are discussed, a few recommendations are made, and the installation costs are documented. Overall, the University's site preparation costs equalled about seven percent (7%) of the total PACS equipment expenditure at the site.

  11. Reducing neural network training time with parallel processing

    NASA Technical Reports Server (NTRS)

    Rogers, James L., Jr.; Lamarsh, William J., II

    1995-01-01

    Obtaining optimal solutions for engineering design problems is often expensive because the process typically requires numerous iterations involving analysis and optimization programs. Previous research has shown that a near optimum solution can be obtained in less time by simulating a slow, expensive analysis with a fast, inexpensive neural network. A new approach has been developed to further reduce this time. This approach decomposes a large neural network into many smaller neural networks that can be trained in parallel. Guidelines are developed to avoid some of the pitfalls when training smaller neural networks in parallel. These guidelines allow the engineer: to determine the number of nodes on the hidden layer of the smaller neural networks; to choose the initial training weights; and to select a network configuration that will capture the interactions among the smaller neural networks. This paper presents results describing how these guidelines are developed.

  12. Multilayer neural networks for reduced-rank approximation.

    PubMed

    Diamantaras, K I; Kung, S Y

    1994-01-01

    This paper is developed in two parts. First, the authors formulate the solution to the general reduced-rank linear approximation problem relaxing the invertibility assumption of the input autocorrelation matrix used by previous authors. The authors' treatment unifies linear regression, Wiener filtering, full rank approximation, auto-association networks, SVD and principal component analysis (PCA) as special cases. The authors' analysis also shows that two-layer linear neural networks with reduced number of hidden units, trained with the least-squares error criterion, produce weights that correspond to the generalized singular value decomposition of the input-teacher cross-correlation matrix and the input data matrix. As a corollary the linear two-layer backpropagation model with reduced hidden layer extracts an arbitrary linear combination of the generalized singular vector components. Second, the authors investigate artificial neural network models for the solution of the related generalized eigenvalue problem. By introducing and utilizing the extended concept of deflation (originally proposed for the standard eigenvalue problem) the authors are able to find that a sequential version of linear BP can extract the exact generalized eigenvector components. The advantage of this approach is that it's easier to update the model structure by adding one more unit or pruning one or more units when the application requires it. An alternative approach for extracting the exact components is to use a set of lateral connections among the hidden units trained in such a way as to enforce orthogonality among the upper- and lower-layer weights. The authors call this the lateral orthogonalization network (LON) and show via theoretical analysis-and verify via simulation-that the network extracts the desired components. The advantage of the LON-based model is that it can be applied in a parallel fashion so that the components are extracted concurrently. Finally, the authors show the application of their results to the solution of the identification problem of systems whose excitation has a non-invertible autocorrelation matrix. Previous identification methods usually rely on the invertibility assumption of the input autocorrelation, therefore they can not be applied to this case.

  13. A Structure-Adaptive Hybrid RBF-BP Classifier with an Optimized Learning Strategy

    PubMed Central

    Wen, Hui; Xie, Weixin; Pei, Jihong

    2016-01-01

    This paper presents a structure-adaptive hybrid RBF-BP (SAHRBF-BP) classifier with an optimized learning strategy. SAHRBF-BP is composed of a structure-adaptive RBF network and a BP network of cascade, where the number of RBF hidden nodes is adjusted adaptively according to the distribution of sample space, the adaptive RBF network is used for nonlinear kernel mapping and the BP network is used for nonlinear classification. The optimized learning strategy is as follows: firstly, a potential function is introduced into training sample space to adaptively determine the number of initial RBF hidden nodes and node parameters, and a form of heterogeneous samples repulsive force is designed to further optimize each generated RBF hidden node parameters, the optimized structure-adaptive RBF network is used for adaptively nonlinear mapping the sample space; then, according to the number of adaptively generated RBF hidden nodes, the number of subsequent BP input nodes can be determined, and the overall SAHRBF-BP classifier is built up; finally, different training sample sets are used to train the BP network parameters in SAHRBF-BP. Compared with other algorithms applied to different data sets, experiments show the superiority of SAHRBF-BP. Especially on most low dimensional and large number of data sets, the classification performance of SAHRBF-BP outperforms other training SLFNs algorithms. PMID:27792737

  14. Holographic quantitative imaging of sample hidden by turbid medium or occluding objects

    NASA Astrophysics Data System (ADS)

    Bianco, V.; Miccio, L.; Merola, F.; Memmolo, P.; Gennari, O.; Paturzo, Melania; Netti, P. A.; Ferraro, P.

    2015-03-01

    Digital Holography (DH) numerical procedures have been developed to allow imaging through turbid media. A fluid is considered turbid when dispersed particles provoke strong light scattering, thus destroying the image formation by any standard optical system. Here we show that sharp amplitude imaging and phase-contrast mapping of object hidden behind turbid medium and/or occluding objects are possible in harsh noise conditions and with a large field-of view by Multi-Look DH microscopy. In particular, it will be shown that both amplitude imaging and phase-contrast mapping of cells hidden behind a flow of Red Blood Cells can be obtained. This allows, in a noninvasive way, the quantitative evaluation of living processes in Lab on Chip platforms where conventional microscopy techniques fail. The combination of this technique with endoscopic imaging can pave the way for the holographic blood vessel inspection, e.g. to look for settled cholesterol plaques as well as blood clots for a rapid diagnostics of blood diseases.

  15. Self-Organizing Hidden Markov Model Map (SOHMMM).

    PubMed

    Ferles, Christos; Stafylopatis, Andreas

    2013-12-01

    A hybrid approach combining the Self-Organizing Map (SOM) and the Hidden Markov Model (HMM) is presented. The Self-Organizing Hidden Markov Model Map (SOHMMM) establishes a cross-section between the theoretic foundations and algorithmic realizations of its constituents. The respective architectures and learning methodologies are fused in an attempt to meet the increasing requirements imposed by the properties of deoxyribonucleic acid (DNA), ribonucleic acid (RNA), and protein chain molecules. The fusion and synergy of the SOM unsupervised training and the HMM dynamic programming algorithms bring forth a novel on-line gradient descent unsupervised learning algorithm, which is fully integrated into the SOHMMM. Since the SOHMMM carries out probabilistic sequence analysis with little or no prior knowledge, it can have a variety of applications in clustering, dimensionality reduction and visualization of large-scale sequence spaces, and also, in sequence discrimination, search and classification. Two series of experiments based on artificial sequence data and splice junction gene sequences demonstrate the SOHMMM's characteristics and capabilities. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. Annual Research Review: Sleep problems in childhood psychiatric disorders--a review of the latest science.

    PubMed

    Gregory, Alice M; Sadeh, Avi

    2016-03-01

    Hippocrates flagged the value of sleep for good health. Nonetheless, historically, researchers with an interest in developmental psychopathology have largely ignored a possible role for atypical sleep. Recently, however, there has been a surge of interest in this area, perhaps reflecting increased evidence that disturbed or insufficient sleep can result in poor functioning in numerous domains. This review outlines what is known about sleep in the psychiatric diagnoses most relevant to children and for which associations with sleep are beginning to be understood. While based on a comprehensive survey of the literature, the focus of the current review is on the latest science (largely from 2010). There is a description of both concurrent and longitudinal links as well as possible mechanisms underlying associations. Preliminary treatment research is also considered which suggests that treating sleep difficulties may result in improvements in behavioural areas beyond sleep quality. To maximise progress in this field, there now needs to be: (a) greater attention to the assessment of sleep in children; (b) sleep research on a wider range of psychiatric disorders; (c) a greater focus on and examination of mechanisms underlying associations; (d) a clearer consideration of developmental questions and (e) large-scale well-designed treatment studies. While sleep problems may sometimes be missed by parents and healthcare providers; hence constituting a hidden risk for other psychopathologies - knowing about these difficulties creates unique opportunities. The current excitement in this field from experts in diverse areas including developmental psychology, clinical psychology, genetics and neuropsychology should make these opportunities a reality. © 2015 Association for Child and Adolescent Mental Health.

  17. Field Extension of Real Values of Physical Observables in Classical Theory can Help Attain Quantum Results

    NASA Astrophysics Data System (ADS)

    Wang, Hai; Kumar, Asutosh; Cho, Minhyung; Wu, Junde

    2018-04-01

    Physical quantities are assumed to take real values, which stems from the fact that an usual measuring instrument that measures a physical observable always yields a real number. Here we consider the question of what would happen if physical observables are allowed to assume complex values. In this paper, we show that by allowing observables in the Bell inequality to take complex values, a classical physical theory can actually get the same upper bound of the Bell expression as quantum theory. Also, by extending the real field to the quaternionic field, we can puzzle out the GHZ problem using local hidden variable model. Furthermore, we try to build a new type of hidden-variable theory of a single qubit based on the result.

  18. Interferometric Computation Beyond Quantum Theory

    NASA Astrophysics Data System (ADS)

    Garner, Andrew J. P.

    2018-03-01

    There are quantum solutions for computational problems that make use of interference at some stage in the algorithm. These stages can be mapped into the physical setting of a single particle travelling through a many-armed interferometer. There has been recent foundational interest in theories beyond quantum theory. Here, we present a generalized formulation of computation in the context of a many-armed interferometer, and explore how theories can differ from quantum theory and still perform distributed calculations in this set-up. We shall see that quaternionic quantum theory proves a suitable candidate, whereas box-world does not. We also find that a classical hidden variable model first presented by Spekkens (Phys Rev A 75(3): 32100, 2007) can also be used for this type of computation due to the epistemic restriction placed on the hidden variable.

  19. Improving the Quality of Alerts and Predicting Intruder's Next Goal with Hidden Colored Petri-Net

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yu, Dong; Frincke, Deb A.

    2006-06-22

    Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next likely goal. In this paper, we propose a novel approach to alert post-processing and correlation, the Hidden Colored Petri-Net (HCPN). Different from most other alert correlation methods, our approach treats the alert correlation problem as an inference problem rather than a filter problem. Our approach assumes that the intruder’s actions are unknown to the IDS and can be inferred only from the alerts generated by the IDS sensors. HCPN can describe the relationship between different stepsmore » carried out by intruders, model observations (alerts) and transitions (actions) separately, and associate each token element (system state) with a probability (or confidence). The model is an extension to Colored Petri-Net (CPN) .It is so called “hidden” because the transitions (actions) are not directly observable but can be inferred by looking through the observations (alerts). These features make HCPN especially suitable for discovering intruders’ actions from their partial observations (alerts,) and predicting intruders’ next goal. Our experiments on DARPA evaluation datasets and the attack scenarios from the Grand Challenge Problem (GCP) show that HCPN has promise as a way to reducing false positives and negatives, predicting intruder’s next possible action, uncovering intruders’ intrusion strategies after the attack scenario has happened, and providing confidence scores.« less

  20. Dfam: a database of repetitive DNA based on profile hidden Markov models.

    PubMed

    Wheeler, Travis J; Clements, Jody; Eddy, Sean R; Hubley, Robert; Jones, Thomas A; Jurka, Jerzy; Smit, Arian F A; Finn, Robert D

    2013-01-01

    We present a database of repetitive DNA elements, called Dfam (http://dfam.janelia.org). Many genomes contain a large fraction of repetitive DNA, much of which is made up of remnants of transposable elements (TEs). Accurate annotation of TEs enables research into their biology and can shed light on the evolutionary processes that shape genomes. Identification and masking of TEs can also greatly simplify many downstream genome annotation and sequence analysis tasks. The commonly used TE annotation tools RepeatMasker and Censor depend on sequence homology search tools such as cross_match and BLAST variants, as well as Repbase, a collection of known TE families each represented by a single consensus sequence. Dfam contains entries corresponding to all Repbase TE entries for which instances have been found in the human genome. Each Dfam entry is represented by a profile hidden Markov model, built from alignments generated using RepeatMasker and Repbase. When used in conjunction with the hidden Markov model search tool nhmmer, Dfam produces a 2.9% increase in coverage over consensus sequence search methods on a large human benchmark, while maintaining low false discovery rates, and coverage of the full human genome is 54.5%. The website provides a collection of tools and data views to support improved TE curation and annotation efforts. Dfam is also available for download in flat file format or in the form of MySQL table dumps.

  1. Stand out in the scientific job market

    NASA Astrophysics Data System (ADS)

    Kuchner, Marc J.

    2016-04-01

    Alaine Levine's book Networking for Nerds: Find, Access and Land Hidden Game-Changing Career Opportunities Everywhere aims to teach you how to build relationships within your large pool of potential colleagues, mentors and collaborators via conferences, job interviews and online networking.

  2. Reading and Writing Difficulties--A Problem? EMIR Education and Research.

    ERIC Educational Resources Information Center

    Ericson, Britta, Ed.

    This collection of essays contains a brief description of the symptoms of dyslexia and a definition of the terminology. The meaning of being the mother of a dyslexic child and how to live with this "hidden handicap" are also described. Suggestions regarding how to treat persons with reading and writing difficulties are put forward. After…

  3. Educational Support Group in Changing Caregivers' Psychological Elder Abuse Behavior toward Caring for Institutionalized Elders

    ERIC Educational Resources Information Center

    Hsieh, Hsiu-Fang; Wang, Jing-Jy; Yen, Maiofen; Liu, Tzu-Ti

    2009-01-01

    Institutionalized elderly who are frail and dependent are vulnerable to be abused by overwhelmed caregivers especially caregiver psychological abusive behavior is a growing but hidden problem with few evidence-based interventions. The purpose of this study was to examine the effectiveness of an educational support group in alleviating caregiver's…

  4. Hidden Challenges to Education Systems in Transition Economies.

    ERIC Educational Resources Information Center

    Berryman, Sue E.

    This book, published by the World Bank, sounds the alarm for education in Europe and Central Asia (ECA). It describes how the transition from communism to free-market economies has left many countries' educational systems in disarray. At the start of transition, ECA education systems had solved problems that plagued other regions of the world,…

  5. W 4 toda example as hidden Liouville CFT

    NASA Astrophysics Data System (ADS)

    Furlan, P.; Petkova, V. B.

    2017-03-01

    We construct correlators in the W 4 Toda 2d conformal field theory for a particular class of representations and demonstrate a relation to a W 2 (Virasoro) theory with different central charge. The relevance of the classical limits of the constructed 3-point functions and braiding matrices to problems in 4d conformal theories is discussed.

  6. Fundamentals of angled-beam ultrasonic NDE for potential characterization of hidden regions of impact damage in composites

    NASA Astrophysics Data System (ADS)

    Aldrin, John C.; Wertz, John N.; Welter, John T.; Wallentine, Sarah; Lindgren, Eric A.; Kramb, Victoria; Zainey, David

    2018-04-01

    In this study, the use of angled-beam ultrasonic NDE was explored for the potential characterization of the hidden regions of impact damage in composites. Simulated studies using CIVA FIDEL 2D were used to explore this inspection problem. Quasi-shear (qS) modes can be generated over a wide range of angles and used to reflect off the backwall and interrogate under the top delaminations of impact damage. Secondary probe signals that do propagate normal to the surface were found to be significant under certain probe conditions, and can potentially interfere with weakly scattered signals from within the composite panel. Simulations were used to evaluate the source of the multiple paths of reflections from the edge of a delamination; time-of-flight and amplitude will depend on the depth of the delamination and location of neighboring delaminations. For angled-beam inspections, noise from both the top surface roughness and internal features was found to potentially mask the detection of signals from the edge of delaminations. Lastly, the study explored the potential of generating "guided" waves along the backwall using an angled-beam source and subsequently measuring scattered signals from a far surface crack hidden under a delamination.

  7. Double Higgs mechanisms, supermassive stable particles and the vacuum energy

    NASA Astrophysics Data System (ADS)

    Santillán, Osvaldo P.; Gabbanelli, Luciano

    2016-07-01

    In the present work, a hidden scenario which cast a long-lived superheavy particle A0 and simultaneously an extremely light particle a with mass ma ˜ 10-32-10-33 eV is presented. The potential energy V (a) of the particle a models the vacuum energy density of the universe ρc ≃ 10-47GeV4. On the other hand, the A0 particle may act as superheavy dark matter at present times and the products of its decay may be observed in high energy cosmic ray events. The hidden sector proposed here include light fermions with masses near the neutrino mass mν ˜ 10-2 eV and superheavy ones with masses of the order of the GUT scale, interacting through a hidden SU(2)L interaction which also affects the ordinary sector. The construction of such combined scenario is nontrivial since the presence of light particles may spoil the stability of the heavy particle A0. However, double Higgs mechanisms may be helpful for overcoming this problem. In this context, the stability of the superheavy particle A0 is ensured due to chiral symmetry arguments elaborated in the text.

  8. Biological engineering applications of feedforward neural networks designed and parameterized by genetic algorithms.

    PubMed

    Ferentinos, Konstantinos P

    2005-09-01

    Two neural network (NN) applications in the field of biological engineering are developed, designed and parameterized by an evolutionary method based on the evolutionary process of genetic algorithms. The developed systems are a fault detection NN model and a predictive modeling NN system. An indirect or 'weak specification' representation was used for the encoding of NN topologies and training parameters into genes of the genetic algorithm (GA). Some a priori knowledge of the demands in network topology for specific application cases is required by this approach, so that the infinite search space of the problem is limited to some reasonable degree. Both one-hidden-layer and two-hidden-layer network architectures were explored by the GA. Except for the network architecture, each gene of the GA also encoded the type of activation functions in both hidden and output nodes of the NN and the type of minimization algorithm that was used by the backpropagation algorithm for the training of the NN. Both models achieved satisfactory performance, while the GA system proved to be a powerful tool that can successfully replace the problematic trial-and-error approach that is usually used for these tasks.

  9. An Indoor Pedestrian Positioning Method Using HMM with a Fuzzy Pattern Recognition Algorithm in a WLAN Fingerprint System

    PubMed Central

    Ni, Yepeng; Liu, Jianbo; Liu, Shan; Bai, Yaxin

    2016-01-01

    With the rapid development of smartphones and wireless networks, indoor location-based services have become more and more prevalent. Due to the sophisticated propagation of radio signals, the Received Signal Strength Indicator (RSSI) shows a significant variation during pedestrian walking, which introduces critical errors in deterministic indoor positioning. To solve this problem, we present a novel method to improve the indoor pedestrian positioning accuracy by embedding a fuzzy pattern recognition algorithm into a Hidden Markov Model. The fuzzy pattern recognition algorithm follows the rule that the RSSI fading has a positive correlation to the distance between the measuring point and the AP location even during a dynamic positioning measurement. Through this algorithm, we use the RSSI variation trend to replace the specific RSSI value to achieve a fuzzy positioning. The transition probability of the Hidden Markov Model is trained by the fuzzy pattern recognition algorithm with pedestrian trajectories. Using the Viterbi algorithm with the trained model, we can obtain a set of hidden location states. In our experiments, we demonstrate that, compared with the deterministic pattern matching algorithm, our method can greatly improve the positioning accuracy and shows robust environmental adaptability. PMID:27618053

  10. The hidden web and the fentanyl problem: Detection of ocfentanil as an adulterant in heroin.

    PubMed

    Quintana, Pol; Ventura, Mireia; Grifell, Marc; Palma, Alvaro; Galindo, Liliana; Fornís, Iván; Gil, Cristina; Carbón, Xoán; Caudevilla, Fernando; Farré, Magí; Torrens, Marta

    2017-02-01

    The popularization of anonymous markets such as Silk Road is challenging current drug policy and may provide a new context for old issues, such as adulteration of heroin with fentanyl derivatives. The aims of this paper are to report the presence of ocfentanil, a novel, potent, non-controlled fentanyl analog, in samples sold as heroin in the hidden web, and to summarize the effects reported by users. In 2015, four samples allegedly bought as heroin in cryptomarkets of the hidden web were sent to Energy Control for analysis. Energy Control is a Spanish harm reduction NGO that offers anonymous drug checking with the purpose of adapting counselling to the specific substances present in the drug and monitor the drug market. Identification was performed by GC/MS and LC/MS/MS. We contacted the submitters of the samples and performed an Internet search to retrieve additional information. One sample contained ocfentanil, caffeine and heroin. Three samples contained the aforementioned substances plus paracetamol. Two out of the four contacted users reported distinct short acting, opioid-like effects. No fora discussion could be found about the effects of ocfentanil, neither web pages nor individuals advertising the substance. We report the presence of a new substance detected in the hidden web as an adulterant of heroin, ocfentanil. It has short acting opioid-like effects, roughly the same potency as fentanyl, and can be injected, snorted or smoked. Severe side effects have been associated with its use, including one death. No discussion about this substance could be found in the Internet, which suggests this substance has not been sold as such. Available data about purities of drugs purchased in cryptomarkets suggest that adulteration is not a severe problem and this agrees with users' perceptions. However, this study suggests that adulteration is a real threat not only at the street level, but also for users that buy substances in cryptomarkets, and suggest the need for harm reduction initiatives in this setting. Copyright © 2016 Elsevier B.V. All rights reserved.

  11. [Probabilities cannot be calculated retrospectively--not even in the courtroom].

    PubMed

    van Gijn, J

    2005-12-24

    Chance events are part of everyday life, but coincidence of diseases often raises suspicions about hidden causes, for example when power lines are blamed for the geographical clustering of cancer. Recently, criminal procedures in the Netherlands have revolved around the question of whether statistical 'predictions' are a valid reason to hold a hospital nurse accountable for the occurrence of excess deaths during her duty hours, or a kindergarten employee for unexplained respiratory problems in several infants. In both cases, the appeals court judges did not accept the statistical 'argument' in the absence of other evidence. In the UK, however, Sally Clark's initial life sentence for the double murder of her 2 babies was largely based on 'probabilities in retrospect', put forward by the paediatrician Sir Roy Meadow as an expert witness. 4 years later she was acquitted, whereas Meadow was struck off the medical register on a charge of professional misconduct. There is no Bayesian or other mathematical solution to the problem of chance events. Only the detection of causal factors that are plausible and supported by new evidence can help to reinterpret coincidences as relationships. Scrupulous reasoning about probabilities is required, not only of physicians but also of judges and politicians.

  12. Positively deflected anomaly mediation in the light of the Higgs boson discovery

    NASA Astrophysics Data System (ADS)

    Okada, Nobuchika; Tran, Hieu Minh

    2013-02-01

    Anomaly-mediated supersymmetry breaking (AMSB) is a well-known mechanism for flavor-blind transmission of supersymmetry breaking from the hidden sector to the visible sector. However, the pure AMSB scenario suffers from a serious drawback, namely, the tachyonic slepton problem, and needs to be extended. The so-called (positively) deflected AMSB is a simple extension to solve the problem and also provides us with the usual neutralino lightest superpartner as a good candidate for dark matter in the Universe. Motivated by the recent discovery of the Higgs boson at the Large Hadron Collider (LHC) experiments, we perform the parameter scan in the deflected AMSB scenario by taking into account a variety of phenomenological constraints, such as the dark matter relic density and the observed Higgs boson mass around 125-126 GeV. We identify the allowed parameter region and list benchmark mass spectra. We find that in most of the allowed parameter regions, the dark matter neutralino is Higgsino-like and its elastic scattering cross section with nuclei is within the future reach of the direct dark matter search experiments, while (colored) sparticles are quite heavy and their discovery at the LHC is challenging.

  13. Deep Correlated Holistic Metric Learning for Sketch-Based 3D Shape Retrieval.

    PubMed

    Dai, Guoxian; Xie, Jin; Fang, Yi

    2018-07-01

    How to effectively retrieve desired 3D models with simple queries is a long-standing problem in computer vision community. The model-based approach is quite straightforward but nontrivial, since people could not always have the desired 3D query model available by side. Recently, large amounts of wide-screen electronic devices are prevail in our daily lives, which makes the sketch-based 3D shape retrieval a promising candidate due to its simpleness and efficiency. The main challenge of sketch-based approach is the huge modality gap between sketch and 3D shape. In this paper, we proposed a novel deep correlated holistic metric learning (DCHML) method to mitigate the discrepancy between sketch and 3D shape domains. The proposed DCHML trains two distinct deep neural networks (one for each domain) jointly, which learns two deep nonlinear transformations to map features from both domains into a new feature space. The proposed loss, including discriminative loss and correlation loss, aims to increase the discrimination of features within each domain as well as the correlation between different domains. In the new feature space, the discriminative loss minimizes the intra-class distance of the deep transformed features and maximizes the inter-class distance of the deep transformed features to a large margin within each domain, while the correlation loss focused on mitigating the distribution discrepancy across different domains. Different from existing deep metric learning methods only with loss at the output layer, our proposed DCHML is trained with loss at both hidden layer and output layer to further improve the performance by encouraging features in the hidden layer also with desired properties. Our proposed method is evaluated on three benchmarks, including 3D Shape Retrieval Contest 2013, 2014, and 2016 benchmarks, and the experimental results demonstrate the superiority of our proposed method over the state-of-the-art methods.

  14. Eastern Sahara Geology from Orbital Radar: Potential Analog to Mars

    NASA Technical Reports Server (NTRS)

    Farr, T. G.; Paillou, P.; Heggy, E.

    2004-01-01

    Much of the surface of Mars has been intensely reworked by aeolian processes and key evidence about the history of the Martian environment seems to be hidden beneath a widespread layer of debris (paleo lakes and rivers, faults, impact craters). In the same way, the recent geological and hydrological history of the eastern Sahara is still mainly hidden under large regions of wind-blown sand which represent a possible terrestrial analog to Mars. The subsurface geology there is generally invisible to optical remote sensing techniques, but radar images obtained from the Shuttle Imaging Radar (SIR) missions were able to penetrate the superficial sand layer to reveal parts of paleohydrological networks in southern Egypt.

  15. Multivariate analysis for scanning tunneling spectroscopy data

    NASA Astrophysics Data System (ADS)

    Yamanishi, Junsuke; Iwase, Shigeru; Ishida, Nobuyuki; Fujita, Daisuke

    2018-01-01

    We applied principal component analysis (PCA) to two-dimensional tunneling spectroscopy (2DTS) data obtained on a Si(111)-(7 × 7) surface to explore the effectiveness of multivariate analysis for interpreting 2DTS data. We demonstrated that several components that originated mainly from specific atoms at the Si(111)-(7 × 7) surface can be extracted by PCA. Furthermore, we showed that hidden components in the tunneling spectra can be decomposed (peak separation), which is difficult to achieve with normal 2DTS analysis without the support of theoretical calculations. Our analysis showed that multivariate analysis can be an additional powerful way to analyze 2DTS data and extract hidden information from a large amount of spectroscopic data.

  16. Giving High Schools an Occupational Focus.

    ERIC Educational Resources Information Center

    Grubb, W. Norton

    1992-01-01

    High school is an inescapably vocational institution whose occupational focus is largely hidden. Integration of vocational and academic education through academies, occupationally focused schools, and occupational clusters may eliminate "shopping mall" course selections, improve teaching of all subjects, enhance student engagement with learning,…

  17. The free fall of an apple: conceptual subtleties and implications for physics teaching

    NASA Astrophysics Data System (ADS)

    Assis, A. K. T.; Karam, R. A. S.

    2018-05-01

    The study of free fall is thoroughly present in physics teaching at all levels. From the point of view of Newtonian dynamics it appears to be extremely simple, as it consists of a two-body problem with a constant force generating a constant acceleration. However, there are several important conceptual subtleties and hidden assumptions involved in this problem, which are rarely discussed in educational settings. In this work we present some of these subtleties and argue that explicitly addressing them has significant pedagogical benefits.

  18. Area-Preserving Diffeomorphisms, W∞ and { U}q [sl(2)] in Chern-Simons Theory and the Quantum Hall System

    NASA Astrophysics Data System (ADS)

    Kogan, Ian I.

    We discuss a quantum { U}q [sl(2)] symmetry in the Landau problem, which naturally arises due to the relation between { U}q [sl(2)] and the group of magnetic translations. The latter is connected with W∞ and area-preserving (symplectic) diffeomorphisms which are the canonical transformations in the two-dimensional phase space. We shall discuss the hidden quantum symmetry in a 2 + 1 gauge theory with the Chern-Simons term and in a quantum Hall system, which are both connected with the Landau problem.

  19. Effective hybrid teaching-learning-based optimization algorithm for balancing two-sided assembly lines with multiple constraints

    NASA Astrophysics Data System (ADS)

    Tang, Qiuhua; Li, Zixiang; Zhang, Liping; Floudas, C. A.; Cao, Xiaojun

    2015-09-01

    Due to the NP-hardness of the two-sided assembly line balancing (TALB) problem, multiple constraints existing in real applications are less studied, especially when one task is involved with several constraints. In this paper, an effective hybrid algorithm is proposed to address the TALB problem with multiple constraints (TALB-MC). Considering the discrete attribute of TALB-MC and the continuous attribute of the standard teaching-learning-based optimization (TLBO) algorithm, the random-keys method is hired in task permutation representation, for the purpose of bridging the gap between them. Subsequently, a special mechanism for handling multiple constraints is developed. In the mechanism, the directions constraint of each task is ensured by the direction check and adjustment. The zoning constraints and the synchronism constraints are satisfied by teasing out the hidden correlations among constraints. The positional constraint is allowed to be violated to some extent in decoding and punished in cost function. Finally, with the TLBO seeking for the global optimum, the variable neighborhood search (VNS) is further hybridized to extend the local search space. The experimental results show that the proposed hybrid algorithm outperforms the late acceptance hill-climbing algorithm (LAHC) for TALB-MC in most cases, especially for large-size problems with multiple constraints, and demonstrates well balance between the exploration and the exploitation. This research proposes an effective and efficient algorithm for solving TALB-MC problem by hybridizing the TLBO and VNS.

  20. Research on an uplink carrier sense multiple access algorithm of large indoor visible light communication networks based on an optical hard core point process.

    PubMed

    Nan, Zhufen; Chi, Xuefen

    2016-12-20

    The IEEE 802.15.7 protocol suggests that it could coordinate the channel access process based on the competitive method of carrier sensing. However, the directionality of light and randomness of diffuse reflection would give rise to a serious imperfect carrier sense (ICS) problem [e.g., hidden node (HN) problem and exposed node (EN) problem], which brings great challenges in realizing the optical carrier sense multiple access (CSMA) mechanism. In this paper, the carrier sense process implemented by diffuse reflection light is modeled as the choice of independent sets. We establish an ICS model with the presence of ENs and HNs for the multi-point to multi-point visible light communication (VLC) uplink communications system. Considering the severe optical ICS problem, an optical hard core point process (OHCPP) is developed, which characterizes the optical CSMA for the indoor VLC uplink communications system. Due to the limited coverage of the transmitted optical signal, in our OHCPP, the ENs within the transmitters' carrier sense region could be retained provided that they could not corrupt the ongoing communications. Moreover, because of the directionality of both light emitting diode (LED) transmitters and receivers, theoretical analysis of the HN problem becomes difficult. In this paper, we derive the closed-form expression for approximating the outage probability and transmission capacity of VLC networks with the presence of HNs and ENs. Simulation results validate the analysis and also show the existence of an optimal physical carrier-sensing threshold that maximizes the transmission capacity for a given emission angle of LED.

  1. Role of band filling in tuning the high-field phases of URu 2 Si 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wartenbe, M. R.; Chen, K. -W.; Gallagher, A.

    2017-08-28

    We present a detailed study of the low temperature and high magnetic eld phases in the chemical substitution series URu 2Si 2-xPx using electrical transport and magnetization in pulsed magnetic elds up to 65T. Within the hidden order x-regime (0 < x ≲ 0.035) the eld induced ordering that was earlier seen for x = 0 is robust, even as the hidden order temperature is suppressed. Earlier work shows that for 0.035 ≲ x ≲ 0.26 there is a Kondo lattice with a no-ordered state that is replaced by antiferromagnetism for 0.26 ≲ x ≲ 0.5. We observe a simplimore » ed continuation of the eld induced order in the no-order x-regime and an enhancement of the field induced order upon the destruction of the antiferromagnetism with magnetic field. These results closely resemble what is seen for URu 2-xRhxSi 2 a, from which we infer that charge tuning dominantly controls the ground state of URu 2Si 2, regardless of whether s/p or d-electrons are replaced. Contraction of the unit cell volume may also play a role at large x. This provides guidance for determining the specific factors that lead to hidden order versus magnetism in this family of materials and constrains possible models for hidden order.« less

  2. Cascade Error Projection: A Learning Algorithm for Hardware Implementation

    NASA Technical Reports Server (NTRS)

    Duong, Tuan A.; Daud, Taher

    1996-01-01

    In this paper, we workout a detailed mathematical analysis for a new learning algorithm termed Cascade Error Projection (CEP) and a general learning frame work. This frame work can be used to obtain the cascade correlation learning algorithm by choosing a particular set of parameters. Furthermore, CEP learning algorithm is operated only on one layer, whereas the other set of weights can be calculated deterministically. In association with the dynamical stepsize change concept to convert the weight update from infinite space into a finite space, the relation between the current stepsize and the previous energy level is also given and the estimation procedure for optimal stepsize is used for validation of our proposed technique. The weight values of zero are used for starting the learning for every layer, and a single hidden unit is applied instead of using a pool of candidate hidden units similar to cascade correlation scheme. Therefore, simplicity in hardware implementation is also obtained. Furthermore, this analysis allows us to select from other methods (such as the conjugate gradient descent or the Newton's second order) one of which will be a good candidate for the learning technique. The choice of learning technique depends on the constraints of the problem (e.g., speed, performance, and hardware implementation); one technique may be more suitable than others. Moreover, for a discrete weight space, the theoretical analysis presents the capability of learning with limited weight quantization. Finally, 5- to 8-bit parity and chaotic time series prediction problems are investigated; the simulation results demonstrate that 4-bit or more weight quantization is sufficient for learning neural network using CEP. In addition, it is demonstrated that this technique is able to compensate for less bit weight resolution by incorporating additional hidden units. However, generation result may suffer somewhat with lower bit weight quantization.

  3. Affective State Level Recognition in Naturalistic Facial and Vocal Expressions.

    PubMed

    Meng, Hongying; Bianchi-Berthouze, Nadia

    2014-03-01

    Naturalistic affective expressions change at a rate much slower than the typical rate at which video or audio is recorded. This increases the probability that consecutive recorded instants of expressions represent the same affective content. In this paper, we exploit such a relationship to improve the recognition performance of continuous naturalistic affective expressions. Using datasets of naturalistic affective expressions (AVEC 2011 audio and video dataset, PAINFUL video dataset) continuously labeled over time and over different dimensions, we analyze the transitions between levels of those dimensions (e.g., transitions in pain intensity level). We use an information theory approach to show that the transitions occur very slowly and hence suggest modeling them as first-order Markov models. The dimension levels are considered to be the hidden states in the Hidden Markov Model (HMM) framework. Their discrete transition and emission matrices are trained by using the labels provided with the training set. The recognition problem is converted into a best path-finding problem to obtain the best hidden states sequence in HMMs. This is a key difference from previous use of HMMs as classifiers. Modeling of the transitions between dimension levels is integrated in a multistage approach, where the first level performs a mapping between the affective expression features and a soft decision value (e.g., an affective dimension level), and further classification stages are modeled as HMMs that refine that mapping by taking into account the temporal relationships between the output decision labels. The experimental results for each of the unimodal datasets show overall performance to be significantly above that of a standard classification system that does not take into account temporal relationships. In particular, the results on the AVEC 2011 audio dataset outperform all other systems presented at the international competition.

  4. Dark matter versus Mach's principle.

    NASA Astrophysics Data System (ADS)

    von Borzeszkowski, H.-H.; Treder, H.-J.

    1998-02-01

    Empirical and theoretical evidence show that the astrophysical problem of dark matter might be solved by a theory of Einstein-Mayer type. In this theory up to global Lorentz rotations the reference system is determined by the motion of cosmic matter. Thus one is led to a "Riemannian space with teleparallelism" realizing a geometric version of the Mach-Einstein doctrine. The field equations of this gravitational theory contain hidden matter terms where the existence of hidden matter is inferred safely from its gravitational effects. It is argued that in the nonrelativistic mechanical approximation they provide an inertia-free mechanics where the inertial mass of a body is induced by the gravitational action of the comic masses. Interpreted form the Newtonian point of view this mechanics shows that the effective gravitational mass of astrophysical objects depends on r such that one expects the existence of dark matter.

  5. Maximum likelihood: Extracting unbiased information from complex networks

    NASA Astrophysics Data System (ADS)

    Garlaschelli, Diego; Loffredo, Maria I.

    2008-07-01

    The choice of free parameters in network models is subjective, since it depends on what topological properties are being monitored. However, we show that the maximum likelihood (ML) principle indicates a unique, statistically rigorous parameter choice, associated with a well-defined topological feature. We then find that, if the ML condition is incompatible with the built-in parameter choice, network models turn out to be intrinsically ill defined or biased. To overcome this problem, we construct a class of safely unbiased models. We also propose an extension of these results that leads to the fascinating possibility to extract, only from topological data, the “hidden variables” underlying network organization, making them “no longer hidden.” We test our method on World Trade Web data, where we recover the empirical gross domestic product using only topological information.

  6. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.

    PubMed

    Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy

    2015-10-01

    Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright © 2015 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  7. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections

    PubMed Central

    Balboni, Michael J.; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D.; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C.; Peteet, John; Balboni, Tracy

    2017-01-01

    Context Religion and spirituality play an important role in physicians’ medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. Objectives The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine’s hidden curriculum. Methods Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Results Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Conclusion Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. PMID:26025271

  8. Conditional Random Fields for Fast, Large-Scale Genome-Wide Association Studies

    PubMed Central

    Huang, Jim C.; Meek, Christopher; Kadie, Carl; Heckerman, David

    2011-01-01

    Understanding the role of genetic variation in human diseases remains an important problem to be solved in genomics. An important component of such variation consist of variations at single sites in DNA, or single nucleotide polymorphisms (SNPs). Typically, the problem of associating particular SNPs to phenotypes has been confounded by hidden factors such as the presence of population structure, family structure or cryptic relatedness in the sample of individuals being analyzed. Such confounding factors lead to a large number of spurious associations and missed associations. Various statistical methods have been proposed to account for such confounding factors such as linear mixed-effect models (LMMs) or methods that adjust data based on a principal components analysis (PCA), but these methods either suffer from low power or cease to be tractable for larger numbers of individuals in the sample. Here we present a statistical model for conducting genome-wide association studies (GWAS) that accounts for such confounding factors. Our method scales in runtime quadratic in the number of individuals being studied with only a modest loss in statistical power as compared to LMM-based and PCA-based methods when testing on synthetic data that was generated from a generalized LMM. Applying our method to both real and synthetic human genotype/phenotype data, we demonstrate the ability of our model to correct for confounding factors while requiring significantly less runtime relative to LMMs. We have implemented methods for fitting these models, which are available at http://www.microsoft.com/science. PMID:21765897

  9. Ambient and smartphone sensor assisted ADL recognition in multi-inhabitant smart environments.

    PubMed

    Roy, Nirmalya; Misra, Archan; Cook, Diane

    2016-02-01

    Activity recognition in smart environments is an evolving research problem due to the advancement and proliferation of sensing, monitoring and actuation technologies to make it possible for large scale and real deployment. While activities in smart home are interleaved, complex and volatile; the number of inhabitants in the environment is also dynamic. A key challenge in designing robust smart home activity recognition approaches is to exploit the users' spatiotemporal behavior and location, focus on the availability of multitude of devices capable of providing different dimensions of information and fulfill the underpinning needs for scaling the system beyond a single user or a home environment. In this paper, we propose a hybrid approach for recognizing complex activities of daily living (ADL), that lie in between the two extremes of intensive use of body-worn sensors and the use of ambient sensors. Our approach harnesses the power of simple ambient sensors (e.g., motion sensors) to provide additional 'hidden' context (e.g., room-level location) of an individual, and then combines this context with smartphone-based sensing of micro-level postural/locomotive states. The major novelty is our focus on multi-inhabitant environments, where we show how the use of spatiotemporal constraints along with multitude of data sources can be used to significantly improve the accuracy and computational overhead of traditional activity recognition based approaches such as coupled-hidden Markov models. Experimental results on two separate smart home datasets demonstrate that this approach improves the accuracy of complex ADL classification by over 30 %, compared to pure smartphone-based solutions.

  10. Posing a hidden political threat. Pakistan. No attempt has been made at the national level to evolve a religious consensus on the subject of family planning.

    PubMed

    Khan, L A

    1996-01-01

    Pakistan was the first developing country to be concerned about the population problem. The first family planning/population related efforts in Pakistan spawned from the nongovernmental sector in the form of the establishment of the Family Planning Association of Pakistan in 1953. The efforts of the association were then later acknowledged in the First Five-Year Public Sector Development Plan which made a lump sum provision of Rs. 5 million for population activities. The First Five-Year Plan (1955-60) recognized that measures should be taken to limit the size of the Pakistani family in order to reduce the incidence of malnutrition and overcrowding. There has never been an organized and consistent religious opposition to family planning in Pakistan. Islamic provisions in the constitution and diverse views of different groups of religious leaders do, however, pose an ongoing hidden political threat to the government which could be exploited through their street power in urban areas. The author notes that the governments in Pakistan will always be reluctant to aggressively promote family planning. Under these circumstances, the government must seek the cooperation of credible nongovernmental organizations which tend to operate through community-based volunteers who generally have more influence in persuading communities to accept a given point of view. Greater involvement of local community groups in a planned and meaningful way will broaden the base of program promoters and supporters across the country and will create a climate conducive to large-scale adoption of the small family norm as a way of life.

  11. Revealing the hidden networks of interaction in mobile animal groups allows prediction of complex behavioral contagion.

    PubMed

    Rosenthal, Sara Brin; Twomey, Colin R; Hartnett, Andrew T; Wu, Hai Shan; Couzin, Iain D

    2015-04-14

    Coordination among social animals requires rapid and efficient transfer of information among individuals, which may depend crucially on the underlying structure of the communication network. Establishing the decision-making circuits and networks that give rise to individual behavior has been a central goal of neuroscience. However, the analogous problem of determining the structure of the communication network among organisms that gives rise to coordinated collective behavior, such as is exhibited by schooling fish and flocking birds, has remained almost entirely neglected. Here, we study collective evasion maneuvers, manifested through rapid waves, or cascades, of behavioral change (a ubiquitous behavior among taxa) in schooling fish (Notemigonus crysoleucas). We automatically track the positions and body postures, calculate visual fields of all individuals in schools of ∼150 fish, and determine the functional mapping between socially generated sensory input and motor response during collective evasion. We find that individuals use simple, robust measures to assess behavioral changes in neighbors, and that the resulting networks by which behavior propagates throughout groups are complex, being weighted, directed, and heterogeneous. By studying these interaction networks, we reveal the (complex, fractional) nature of social contagion and establish that individuals with relatively few, but strongly connected, neighbors are both most socially influential and most susceptible to social influence. Furthermore, we demonstrate that we can predict complex cascades of behavioral change at their moment of initiation, before they actually occur. Consequently, despite the intrinsic stochasticity of individual behavior, establishing the hidden communication networks in large self-organized groups facilitates a quantitative understanding of behavioral contagion.

  12. Data-Driven Model Uncertainty Estimation in Hydrologic Data Assimilation

    NASA Astrophysics Data System (ADS)

    Pathiraja, S.; Moradkhani, H.; Marshall, L.; Sharma, A.; Geenens, G.

    2018-02-01

    The increasing availability of earth observations necessitates mathematical methods to optimally combine such data with hydrologic models. Several algorithms exist for such purposes, under the umbrella of data assimilation (DA). However, DA methods are often applied in a suboptimal fashion for complex real-world problems, due largely to several practical implementation issues. One such issue is error characterization, which is known to be critical for a successful assimilation. Mischaracterized errors lead to suboptimal forecasts, and in the worst case, to degraded estimates even compared to the no assimilation case. Model uncertainty characterization has received little attention relative to other aspects of DA science. Traditional methods rely on subjective, ad hoc tuning factors or parametric distribution assumptions that may not always be applicable. We propose a novel data-driven approach (named SDMU) to model uncertainty characterization for DA studies where (1) the system states are partially observed and (2) minimal prior knowledge of the model error processes is available, except that the errors display state dependence. It includes an approach for estimating the uncertainty in hidden model states, with the end goal of improving predictions of observed variables. The SDMU is therefore suited to DA studies where the observed variables are of primary interest. Its efficacy is demonstrated through a synthetic case study with low-dimensional chaotic dynamics and a real hydrologic experiment for one-day-ahead streamflow forecasting. In both experiments, the proposed method leads to substantial improvements in the hidden states and observed system outputs over a standard method involving perturbation with Gaussian noise.

  13. Revealing the hidden networks of interaction in mobile animal groups allows prediction of complex behavioral contagion

    PubMed Central

    Rosenthal, Sara Brin; Twomey, Colin R.; Hartnett, Andrew T.; Wu, Hai Shan; Couzin, Iain D.

    2015-01-01

    Coordination among social animals requires rapid and efficient transfer of information among individuals, which may depend crucially on the underlying structure of the communication network. Establishing the decision-making circuits and networks that give rise to individual behavior has been a central goal of neuroscience. However, the analogous problem of determining the structure of the communication network among organisms that gives rise to coordinated collective behavior, such as is exhibited by schooling fish and flocking birds, has remained almost entirely neglected. Here, we study collective evasion maneuvers, manifested through rapid waves, or cascades, of behavioral change (a ubiquitous behavior among taxa) in schooling fish (Notemigonus crysoleucas). We automatically track the positions and body postures, calculate visual fields of all individuals in schools of ∼150 fish, and determine the functional mapping between socially generated sensory input and motor response during collective evasion. We find that individuals use simple, robust measures to assess behavioral changes in neighbors, and that the resulting networks by which behavior propagates throughout groups are complex, being weighted, directed, and heterogeneous. By studying these interaction networks, we reveal the (complex, fractional) nature of social contagion and establish that individuals with relatively few, but strongly connected, neighbors are both most socially influential and most susceptible to social influence. Furthermore, we demonstrate that we can predict complex cascades of behavioral change at their moment of initiation, before they actually occur. Consequently, despite the intrinsic stochasticity of individual behavior, establishing the hidden communication networks in large self-organized groups facilitates a quantitative understanding of behavioral contagion. PMID:25825752

  14. Substance Abuse: A Hidden Problem within the D/deaf and Hard of Hearing Communities

    ERIC Educational Resources Information Center

    Guthmann, Debra; Graham, Vicki

    2004-01-01

    Current research indicates that D/deaf and hard of hearing clients seeking treatment for substance abuse often encounter obstacles in receiving the help they need. Many of these obstacles are the result of a lack of knowledge and experience with regard to treating D/deaf and hard of hearing people. Programs designed for hearing people that attempt…

  15. Hidden Dangers within Our Schools: What Are These Safety Problems and How Can We Fix Them? Safety in the Schools

    ERIC Educational Resources Information Center

    Gunzelmann, Betsy

    2005-01-01

    Safety in the schools involves much more than metal detectors and disaster plans. Although such catastrophe preparation is necessary, we often overlook less obvious beliefs and practices that put children's everyday safety at risk. According to the well-known pediatrician T. Berry Brazelton and the child psychiatrist Stanley Greenspan (2000), all…

  16. The Role of Hidden Curricula on the Resistance Behavior of Undergraduate Students in Psychological Counseling and Guidance at a Turkish University

    ERIC Educational Resources Information Center

    Yuksel, Sedat

    2006-01-01

    Student resistance can be a very important problem for the instructors in universities. Student resistance includes the conscious and preplanned behaviors towards the information presented to them in the classroom and the institutional practices. Typically, student resistance takes the form of passive or active non-compliance with roles and…

  17. On the complexity of neural network classifiers: a comparison between shallow and deep architectures.

    PubMed

    Bianchini, Monica; Scarselli, Franco

    2014-08-01

    Recently, researchers in the artificial neural network field have focused their attention on connectionist models composed by several hidden layers. In fact, experimental results and heuristic considerations suggest that deep architectures are more suitable than shallow ones for modern applications, facing very complex problems, e.g., vision and human language understanding. However, the actual theoretical results supporting such a claim are still few and incomplete. In this paper, we propose a new approach to study how the depth of feedforward neural networks impacts on their ability in implementing high complexity functions. First, a new measure based on topological concepts is introduced, aimed at evaluating the complexity of the function implemented by a neural network, used for classification purposes. Then, deep and shallow neural architectures with common sigmoidal activation functions are compared, by deriving upper and lower bounds on their complexity, and studying how the complexity depends on the number of hidden units and the used activation function. The obtained results seem to support the idea that deep networks actually implements functions of higher complexity, so that they are able, with the same number of resources, to address more difficult problems.

  18. Neural net classification of x-ray pistachio nut data

    NASA Astrophysics Data System (ADS)

    Casasent, David P.; Sipe, Michael A.; Schatzki, Thomas F.; Keagy, Pamela M.; Le, Lan Chau

    1996-12-01

    Classification results for agricultural products are presented using a new neural network. This neural network inherently produces higher-order decision surfaces. It achieves this with fewer hidden layer neurons than other classifiers require. This gives better generalization. It uses new techniques to select the number of hidden layer neurons and adaptive algorithms that avoid other such ad hoc parameter selection problems; it allows selection of the best classifier parameters without the need to analyze the test set results. The agriculture case study considered is the inspection and classification of pistachio nuts using x- ray imagery. Present inspection techniques cannot provide good rejection of worm damaged nuts without rejecting too many good nuts. X-ray imagery has the potential to provide 100% inspection of such agricultural products in real time. Only preliminary results are presented, but these indicate the potential to reduce major defects to 2% of the crop with 1% of good nuts rejected. Future image processing techniques that should provide better features to improve performance and allow inspection of a larger variety of nuts are noted. These techniques and variations of them have uses in a number of other agricultural product inspection problems.

  19. Clustering Multivariate Time Series Using Hidden Markov Models

    PubMed Central

    Ghassempour, Shima; Girosi, Federico; Maeder, Anthony

    2014-01-01

    In this paper we describe an algorithm for clustering multivariate time series with variables taking both categorical and continuous values. Time series of this type are frequent in health care, where they represent the health trajectories of individuals. The problem is challenging because categorical variables make it difficult to define a meaningful distance between trajectories. We propose an approach based on Hidden Markov Models (HMMs), where we first map each trajectory into an HMM, then define a suitable distance between HMMs and finally proceed to cluster the HMMs with a method based on a distance matrix. We test our approach on a simulated, but realistic, data set of 1,255 trajectories of individuals of age 45 and over, on a synthetic validation set with known clustering structure, and on a smaller set of 268 trajectories extracted from the longitudinal Health and Retirement Survey. The proposed method can be implemented quite simply using standard packages in R and Matlab and may be a good candidate for solving the difficult problem of clustering multivariate time series with categorical variables using tools that do not require advanced statistic knowledge, and therefore are accessible to a wide range of researchers. PMID:24662996

  20. Detecting network communities beyond assortativity-related attributes

    NASA Astrophysics Data System (ADS)

    Liu, Xin; Murata, Tsuyoshi; Wakita, Ken

    2014-07-01

    In network science, assortativity refers to the tendency of links to exist between nodes with similar attributes. In social networks, for example, links tend to exist between individuals of similar age, nationality, location, race, income, educational level, religious belief, and language. Thus, various attributes jointly affect the network topology. An interesting problem is to detect community structure beyond some specific assortativity-related attributes ρ, i.e., to take out the effect of ρ on network topology and reveal the hidden community structures which are due to other attributes. An approach to this problem is to redefine the null model of the modularity measure, so as to simulate the effect of ρ on network topology. However, a challenge is that we do not know to what extent the network topology is affected by ρ and by other attributes. In this paper, we propose a distance modularity, which allows us to freely choose any suitable function to simulate the effect of ρ. Such freedom can help us probe the effect of ρ and detect the hidden communities which are due to other attributes. We test the effectiveness of distance modularity on synthetic benchmarks and two real-world networks.

  1. Extracting duration information in a picture category decoding task using hidden Markov Models

    NASA Astrophysics Data System (ADS)

    Pfeiffer, Tim; Heinze, Nicolai; Frysch, Robert; Deouell, Leon Y.; Schoenfeld, Mircea A.; Knight, Robert T.; Rose, Georg

    2016-04-01

    Objective. Adapting classifiers for the purpose of brain signal decoding is a major challenge in brain-computer-interface (BCI) research. In a previous study we showed in principle that hidden Markov models (HMM) are a suitable alternative to the well-studied static classifiers. However, since we investigated a rather straightforward task, advantages from modeling of the signal could not be assessed. Approach. Here, we investigate a more complex data set in order to find out to what extent HMMs, as a dynamic classifier, can provide useful additional information. We show for a visual decoding problem that besides category information, HMMs can simultaneously decode picture duration without an additional training required. This decoding is based on a strong correlation that we found between picture duration and the behavior of the Viterbi paths. Main results. Decoding accuracies of up to 80% could be obtained for category and duration decoding with a single classifier trained on category information only. Significance. The extraction of multiple types of information using a single classifier enables the processing of more complex problems, while preserving good training results even on small databases. Therefore, it provides a convenient framework for online real-life BCI utilizations.

  2. Hiding an elephant: heavy sterile neutrino with large mixing angle does not contradict cosmology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bezrukov, F.; Chudaykin, A.; Gorbunov, D., E-mail: Fedor.Bezrukov@manchester.ac.uk, E-mail: chudy@ms2.inr.ac.ru, E-mail: gorby@ms2.inr.ac.ru

    We study a model of a keV-scale sterile neutrino with a relatively large mixing with the Standard Model sector. Usual considerations predict active generation of such particles in the early Universe, which leads to constraints from the total Dark Matter density and absence of X-ray signal from sterile neutrino decay. These bounds together may deem any attempt of creation of the keV scale sterile neutrino in the laboratory unfeasible. We argue that for models with a hidden sector coupled to the sterile neutrino these bounds can be evaded, opening new perspectives for the direct studies at neutrino experiments such asmore » Troitsk ν-mass and KATRIN. We estimate the generation of sterile neutrinos in scenarios with the hidden sector dynamics keeping the sterile neutrinos either massless or superheavy in the early Universe. In both cases the generation by oscillations from active neutrinos in plasma is suppressed.« less

  3. Object permanence in young infants: further evidence.

    PubMed

    Baillargeon, R; DeVos, J

    1991-12-01

    Recent evidence suggests that 4.5- and even 3.5-month-old infants realize that objects continue to exist when hidden. The goal of the present experiments was to obtain converging evidence of object permanence in young infants. Experiments were conducted using paradigms previously used to demonstrate object permanence in 5.5-month-old infants and 6.5-month-old infants. In one experiment, 3.5-month-old infants watched a short or a tall carrot slide along a track. The track's center was hidden by a screen with a large window in its upper half. The short carrot was shorter than the window's lower edge and so did not appear in the window when passing behind the screen; the tall carrot was taller than the window's lower edge and hence should have appeared in the window but did not. The infants looked reliably longer at the tall than at the short carrot event, suggesting that they (a) represented the existence, height, and trajectory of each carrot behind the screen and (b) expected the tall carrot to appear in the screen window and were surprised that it did not. Control trials supported this interpretation. In another experiment, 4.0-month-old infants saw a toy car roll along a track that was partly hidden by a screen. A large toy mouse was placed behind the screen, either on top or in back of the track. The female infants looked reliably longer when the mouse stood on top as opposed to in back of the track, suggesting that they (a) represented the existence and trajectory of the car behind the screen, (b) represented the existence and location of the mouse behind the screen, and (c) were surprised to see the car reappear from behind the screen when the mouse stood in its path. A second experiment supported this interpretation. The results of these experiments provide further evidence that infants aged 3.5 months and older are able to represent and to reason about hidden objects.

  4. General gauge mediation in five dimensions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McGarrie, Moritz; Russo, Rodolfo

    2010-08-01

    We use the ''general gauge mediation'' (GGM) formalism to describe a five-dimensional setup with an S{sup 1}/Z{sub 2} orbifold. We first consider a model independent supersymmetry breaking hidden sector on one boundary and generic chiral matter on another. Using the definition of GGM, the effects of the hidden sector are contained in a set of global symmetry current correlator functions and is mediated through the bulk. We find the gaugino, sfermion and hyperscalar mass formulas for minimal and generalized messengers in different regimes of a large, small and intermediate extra dimension. Then we use the five-dimensional GGM formalism to constructmore » a model in which an SU(5) Intriligator, Seiberg and Shih (ISS) model is located on the hidden boundary. We weakly gauge a global symmetry of the ISS model and associate it with the bulk vector superfield. Compared to four-dimensional GGM, there is a natural way to adjust the gaugino versus sfermion mass ratio by a factor (Ml){sup 2}, where M is a characteristic mass scale of the supersymmetry breaking sector and l is the length of the extra dimension.« less

  5. From image captioning to video summary using deep recurrent networks and unsupervised segmentation

    NASA Astrophysics Data System (ADS)

    Morosanu, Bogdan-Andrei; Lemnaru, Camelia

    2018-04-01

    Automatic captioning systems based on recurrent neural networks have been tremendously successful at providing realistic natural language captions for complex and varied image data. We explore methods for adapting existing models trained on large image caption data sets to a similar problem, that of summarising videos using natural language descriptions and frame selection. These architectures create internal high level representations of the input image that can be used to define probability distributions and distance metrics on these distributions. Specifically, we interpret each hidden unit inside a layer of the caption model as representing the un-normalised log probability of some unknown image feature of interest for the caption generation process. We can then apply well understood statistical divergence measures to express the difference between images and create an unsupervised segmentation of video frames, classifying consecutive images of low divergence as belonging to the same context, and those of high divergence as belonging to different contexts. To provide a final summary of the video, we provide a group of selected frames and a text description accompanying them, allowing a user to perform a quick exploration of large unlabeled video databases.

  6. How Fast Does Darwin's Elephant Population Grow?

    PubMed

    Podani, János; Kun, Ádám; Szilágyi, András

    2018-06-01

    In "The Origin of Species," Darwin describes a hypothetical example illustrating that large, slowly reproducing mammals such as the elephant can reach very large numbers if population growth is not affected by regulating factors. The elephant example has since been cited in various forms in a wide variety of books, ranging from educational material to encyclopedias. However, Darwin's text was changed over the six editions of the book, although some errors in the mathematics persisted throughout. In addition, full details of the problem remained hidden in his correspondence with readers of the Origin. As a result, Darwin's example is very often misinterpreted, misunderstood or presented as if it were a fact. We show that the population growth of Darwin's elephant population can be modeled by the Leslie matrix method, which we generalize here to males as well. Darwin's most often cited figure, about 19 million elephants after 750 years is not a typical outcome, actually a very unlikely result under more realistic, although still hypothetical situations. We provide a recursion formula suggesting that Darwin's original model corresponds to a tribonacci series, a proof showing that sex ratio is constant over all age classes, and a derivation of a generating function of the sequence.

  7. Conditions for Viral Influence Spreading through Multiplex Correlated Social Networks

    NASA Astrophysics Data System (ADS)

    Hu, Yanqing; Havlin, Shlomo; Makse, Hernán A.

    2014-04-01

    A fundamental problem in network science is to predict how certain individuals are able to initiate new networks to spring up "new ideas." Frequently, these changes in trends are triggered by a few innovators who rapidly impose their ideas through "viral" influence spreading, producing cascades of followers and fragmenting an old network to create a new one. Typical examples include the rise of scientific ideas or abrupt changes in social media, like the rise of Facebook to the detriment of Myspace. How this process arises in practice has not been conclusively demonstrated. Here, we show that a condition for sustaining a viral spreading process is the existence of a multiplex-correlated graph with hidden "influence links." Analytical solutions predict percolation-phase transitions, either abrupt or continuous, where networks are disintegrated through viral cascades of followers, as in empirical data. Our modeling predicts the strict conditions to sustain a large viral spreading via a scaling form of the local correlation function between multilayers, which we also confirm empirically. Ultimately, the theory predicts the conditions for viral cascading in a large class of multiplex networks ranging from social to financial systems and markets.

  8. Uncovering the wisdom hidden between the lines: the Collaborative Reflexive Deliberative Approach.

    PubMed

    Crabtree, Benjamin F; Miller, William L; Gunn, Jane M; Hogg, William E; Scott, Cathie M; Levesque, Jean-Frederic; Harris, Mark F; Chase, Sabrina M; Advocat, Jenny R; Halma, Lisa M; Russell, Grant M

    2018-05-23

    Meta-analysis and meta-synthesis have been developed to synthesize results across published studies; however, they are still largely grounded in what is already published, missing the tacit 'between the lines' knowledge generated during many research projects that are not intrinsic to the main objectives of studies. To develop a novel approach to expand and deepen meta-syntheses using researchers' experience, tacit knowledge and relevant unpublished materials. We established new collaborations among primary health care researchers from different contexts based on common interests in reforming primary care service delivery and a diversity of perspectives. Over 2 years, the team met face-to-face and via tele- and video-conferences to employ the Collaborative Reflexive Deliberative Approach (CRDA) to discuss and reflect on published and unpublished results from participants' studies to identify new patterns and insights. CRDA focuses on uncovering critical insights, interpretations hidden within multiple research contexts. For the process to work, careful attention must be paid to ensure sufficient diversity among participants while also having people who are able to collaborate effectively. Ensuring there are enough studies for contextual variation also matters. It is necessary to balance rigorous facilitation techniques with the creation of safe space for diverse contributions. The CRDA requires large commitments of investigator time, the expense of convening facilitated retreats, considerable coordination, and strong leadership. The process creates an environment where interactions among diverse participants can illuminate hidden information within the contexts of studies, effectively enhancing theory development and generating new research questions and strategies.

  9. Data Analytics and Visualization for Large Army Testing Data

    DTIC Science & Technology

    2013-09-01

    and relationships in the data that would otherwise remain hidden. 7 Bibliography 1. Goodall , J. R.; Tesone, D. R. Visual Analytics for Network...Software Visualization, 2003, pp 143–149. 3. Goodall , J. R.; Sowul, M. VIAssist: Visual Analytics for Cyber Defense, IEEE Conference on Technologies

  10. Student profiling on university co-curriculum activities using data visualization tools

    NASA Astrophysics Data System (ADS)

    Jamil, Jastini Mohd.; Shaharanee, Izwan Nizal Mohd

    2017-11-01

    Co-curricular activities are playing a vital role in the development of a holistic student. Co-curriculum can be described as an extension of the formal learning experiences in a course or academic program. There are many co-curriculum activities such as students' participation in sports, volunteerism, leadership, entrepreneurship, uniform body, student council, and other social events. The number of student involves in co-curriculum activities are large, thus creating an enormous volume of data including their demographic facts, academic performance and co-curriculum types. The task for discovering and analyzing these information becomes increasingly difficult and hard to comprehend. Data visualization offer a better ways in handling with large volume of information. The need for an understanding of these various co-curriculum activities and their effect towards student performance are essential. Visualizing these information can help related stakeholders to become aware of hidden and interesting information from large amount of data drowning in their student data. The main objective of this study is to provide a clearer understanding of the different trends hidden in the student co-curriculum activities data with related to their activities and academic performances. The data visualization software was used to help visualize the data extracted from the database.

  11. Secret Lives of the Hidden Physicists---from Spandex to Spintronics

    NASA Astrophysics Data System (ADS)

    White, Gary

    2006-10-01

    What is a physicist? A case is made for defining a physicist as anyone with a bachelor's degree (or higher) in physics. Under this definition, a large fraction of physicists are hidden, that is, they have left, or never belonged to, the traditional lot of Ph.D. academicians. Data from the Statistical Research Center at the American Institute of Physics and from a survey of members of the national physics honor society, Sigma Pi Sigma, show the vast array of actual career paths taken by physicists. From spandex to blackberries to bioinformatics to flight control to wind energy to spintronics, physicists can be found in nearly every job sector in some of the coolest and most farfetched careers imaginable.

  12. A Hierarchical Framework for State-Space Matrix Inference and Clustering.

    PubMed

    Zuo, Chandler; Chen, Kailei; Hewitt, Kyle J; Bresnick, Emery H; Keleş, Sündüz

    2016-09-01

    In recent years, a large number of genomic and epigenomic studies have been focusing on the integrative analysis of multiple experimental datasets measured over a large number of observational units. The objectives of such studies include not only inferring a hidden state of activity for each unit over individual experiments, but also detecting highly associated clusters of units based on their inferred states. Although there are a number of methods tailored for specific datasets, there is currently no state-of-the-art modeling framework for this general class of problems. In this paper, we develop the MBASIC ( M atrix B ased A nalysis for S tate-space I nference and C lustering) framework. MBASIC consists of two parts: state-space mapping and state-space clustering. In state-space mapping, it maps observations onto a finite state-space, representing the activation states of units across conditions. In state-space clustering, MBASIC incorporates a finite mixture model to cluster the units based on their inferred state-space profiles across all conditions. Both the state-space mapping and clustering can be simultaneously estimated through an Expectation-Maximization algorithm. MBASIC flexibly adapts to a large number of parametric distributions for the observed data, as well as the heterogeneity in replicate experiments. It allows for imposing structural assumptions on each cluster, and enables model selection using information criterion. In our data-driven simulation studies, MBASIC showed significant accuracy in recovering both the underlying state-space variables and clustering structures. We applied MBASIC to two genome research problems using large numbers of datasets from the ENCODE project. The first application grouped genes based on transcription factor occupancy profiles of their promoter regions in two different cell types. The second application focused on identifying groups of loci that are similar to a GATA2 binding site that is functional at its endogenous locus by utilizing transcription factor occupancy data and illustrated applicability of MBASIC in a wide variety of problems. In both studies, MBASIC showed higher levels of raw data fidelity than analyzing these data with a two-step approach using ENCODE results on transcription factor occupancy data.

  13. Current and Perspective Applications of Dense Plasma Focus Devices

    NASA Astrophysics Data System (ADS)

    Gribkov, V. A.

    2008-04-01

    Dense Plasma Focus (DPF) devices' applications, which are intended to support the main-stream large-scale nuclear fusion programs (NFP) from one side (both in fundamental problems of Dense Magnetized Plasma physics and in its engineering issues) as well as elaborated for an immediate use in a number of fields from the other one, are described. In the first direction such problems as self-generated magnetic fields, implosion stability of plasma shells having a high aspect ratio, etc. are important for the Inertial Confinement Fusion (ICF) programs (e.g. as NIF), whereas different problems of current disruption phenomenon, plasma turbulence, mechanisms of generation of fast particles and neutrons in magnetized plasmas are of great interest for the large devices of the Magnetic Plasma Confinement—MPC (e.g. as ITER). In a sphere of the engineering problems of NFP it is shown that in particular the radiation material sciences have DPF as a very efficient tool for radiation tests of prospect materials and for improvement of their characteristics. In the field of broad-band current applications some results obtained in the fields of radiation material sciences, radiobiology, nuclear medicine, express Neutron Activation Analysis (including a single-shot interrogation of hidden illegal objects), dynamic non-destructive quality control, X-Ray microlithography and micromachining, and micro-radiography are presented. As the examples of the potential future applications it is proposed to use DPF as a powerful high-flux neutron source to generate very powerful pulses of neutrons in the nanosecond (ns) range of its duration for innovative experiments in nuclear physics, for the goals of radiation treatment of malignant tumors, for neutron tests of materials of the first wall, blankets and NFP device's constructions (with fluences up to 1 dpa per a year term), and ns pulses of fast electrons, neutrons and hard X-Rays for brachytherapy.

  14. A Hidden Markov Model for Urban-Scale Traffic Estimation Using Floating Car Data.

    PubMed

    Wang, Xiaomeng; Peng, Ling; Chi, Tianhe; Li, Mengzhu; Yao, Xiaojing; Shao, Jing

    2015-01-01

    Urban-scale traffic monitoring plays a vital role in reducing traffic congestion. Owing to its low cost and wide coverage, floating car data (FCD) serves as a novel approach to collecting traffic data. However, sparse probe data represents the vast majority of the data available on arterial roads in most urban environments. In order to overcome the problem of data sparseness, this paper proposes a hidden Markov model (HMM)-based traffic estimation model, in which the traffic condition on a road segment is considered as a hidden state that can be estimated according to the conditions of road segments having similar traffic characteristics. An algorithm based on clustering and pattern mining rather than on adjacency relationships is proposed to find clusters with road segments having similar traffic characteristics. A multi-clustering strategy is adopted to achieve a trade-off between clustering accuracy and coverage. Finally, the proposed model is designed and implemented on the basis of a real-time algorithm. Results of experiments based on real FCD confirm the applicability, accuracy, and efficiency of the model. In addition, the results indicate that the model is practicable for traffic estimation on urban arterials and works well even when more than 70% of the probe data are missing.

  15. Self-growing neural network architecture using crisp and fuzzy entropy

    NASA Technical Reports Server (NTRS)

    Cios, Krzysztof J.

    1992-01-01

    The paper briefly describes the self-growing neural network algorithm, CID3, which makes decision trees equivalent to hidden layers of a neural network. The algorithm generates a feedforward architecture using crisp and fuzzy entropy measures. The results for a real-life recognition problem of distinguishing defects in a glass ribbon, and for a benchmark problen of telling two spirals apart are shown and discussed.

  16. Troublesome aspects of the Renyi-MaxEnt treatment.

    PubMed

    Plastino, A; Rocca, M C; Pennini, F

    2016-07-01

    We study in great detail the possible existence of a Renyi-associated thermodynamics, with negative results. In particular, we uncover a hidden relation in Renyi's variational problem (MaxEnt). This relation connects the two associated Lagrange multipliers (canonical ensemble) with the mean energy 〈U〉 and the Renyi parameter α. As a consequence of such relation, we obtain anomalous Renyi-MaxEnt thermodynamic results.

  17. Skin Color and Latinos: The Origins and Contemporary Patterns of Ethnoracial Ambiguity among Mexican Americans and Puerto Ricans. Report Number 1.

    ERIC Educational Resources Information Center

    Montalvo, Frank F.

    Failure to understand the role of skin color in the development of ethnoracial identity among Hispanic Americans has led to continued psychic and educational problems for them, hidden the cause of real and potential divisiveness in the community, and prevented the development of effective strategies for overcoming ethnic prejudice. The ethnic…

  18. Test results of smart aircraft fastener for KC-135 structural integrity

    NASA Astrophysics Data System (ADS)

    Schoess, Jeffrey N.; Seifert, Greg

    1998-07-01

    Hidden and inaccessible corrosion in aircraft structures is the number one logistics problem for the US Air Force, with an estimated maintenance cost in excess of $LR 1.0B per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system was developed to provide early warning detection of corrosion-related symptoms in hidden locations of aircraft structures. The SAFE system incorporates an in situ measurement approach that measures and autonomously records several environmental conditions within a Hi-Lok aircraft fastener that could cause corrosion. The SAFE system integrates a miniature electrochemical microsensor array and a time-of-wetness sensor with an ultra low power 8-bit microcontroller and 4- Mbyte solid-state FLASH archival memory to measure evidence of active corrosion. A summary of the technical approach and a detailed analysis of the KC-135 lap joint test coupon results are presented.

  19. Smart fastener for KC-135 structural integrity monitoring

    NASA Astrophysics Data System (ADS)

    Schoess, Jeffrey N.; Seifert, Greg

    1997-06-01

    Hidden and inaccessible corrosion in aircraft structures is the number-one logistics problem for the U.S. Air Force, with an estimated maintenance cost in excess of $DOL1.0 billion per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system is being developed to provide early warning detection of corrosion- related symptoms in hidden locations of aircraft structures. The SAFE incorporates an in situ measurement approach that measures and autonomously records several environmental conditions (i.e., pH, temperature, chloride, free potential, time-of-wetness) within a Hi-Lok aircraft fastener that could cause corrosion to occur. The SAFE system integrates a miniature electrochemical microsensor array and a time-of- wetness sensor with an ultra-low-power 8-bit microcontroller and 5-Mbyte solid-state FLASH archival memory to measure the evidence of active corrosion. A summary of the technical approach, system design definition, software architecture, and future field test plans will be presented.

  20. Passive Acoustic Leak Detection for Sodium Cooled Fast Reactors Using Hidden Markov Models

    NASA Astrophysics Data System (ADS)

    Marklund, A. Riber; Kishore, S.; Prakash, V.; Rajan, K. K.; Michel, F.

    2016-06-01

    Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970s and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control.

  1. Experimental entanglement distillation and 'hidden' non-locality.

    PubMed

    Kwiat, P G; Barraza-Lopez, S; Stefanov, A; Gisin, N

    2001-02-22

    Entangled states are central to quantum information processing, including quantum teleportation, efficient quantum computation and quantum cryptography. In general, these applications work best with pure, maximally entangled quantum states. However, owing to dissipation and decoherence, practically available states are likely to be non-maximally entangled, partially mixed (that is, not pure), or both. To counter this problem, various schemes of entanglement distillation, state purification and concentration have been proposed. Here we demonstrate experimentally the distillation of maximally entangled states from non-maximally entangled inputs. Using partial polarizers, we perform a filtering process to maximize the entanglement of pure polarization-entangled photon pairs generated by spontaneous parametric down-conversion. We have also applied our methods to initial states that are partially mixed. After filtering, the distilled states demonstrate certain non-local correlations, as evidenced by their violation of a form of Bell's inequality. Because the initial states do not have this property, they can be said to possess 'hidden' non-locality.

  2. Adaptive distributed source coding.

    PubMed

    Varodayan, David; Lin, Yao-Chung; Girod, Bernd

    2012-05-01

    We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.

  3. Noise-tolerant parity learning with one quantum bit

    NASA Astrophysics Data System (ADS)

    Park, Daniel K.; Rhee, June-Koo K.; Lee, Soonchil

    2018-03-01

    Demonstrating quantum advantage with less powerful but more realistic devices is of great importance in modern quantum information science. Recently, a significant quantum speedup was achieved in the problem of learning a hidden parity function with noise. However, if all data qubits at the query output are completely depolarized, the algorithm fails. In this work, we present a quantum parity learning algorithm that exhibits quantum advantage as long as one qubit is provided with nonzero polarization in each query. In this scenario, the quantum parity learning naturally becomes deterministic quantum computation with one qubit. Then the hidden parity function can be revealed by performing a set of operations that can be interpreted as measuring nonlocal observables on the auxiliary result qubit having nonzero polarization and each data qubit. We also discuss the source of the quantum advantage in our algorithm from the resource-theoretic point of view.

  4. Generating a New Higher-Dimensional Coupled Integrable Dispersionless System: Algebraic Structures, Bäcklund Transformation and Hidden Structural Symmetries

    NASA Astrophysics Data System (ADS)

    Souleymanou, Abbagari; Thomas, B. Bouetou; Timoleon, C. Kofane

    2013-08-01

    The prolongation structure methodologies of Wahlquist—Estabrook [H.D. Wahlquist and F.B. Estabrook, J. Math. Phys. 16 (1975) 1] for nonlinear differential equations are applied to a more general set of coupled integrable dispersionless system. Based on the obtained prolongation structure, a Lie-Algebra valued connection of a closed ideal of exterior differential forms related to the above system is constructed. A Lie-Algebra representation of some hidden structural symmetries of the previous system, its Bäcklund transformation using the Riccati form of the linear eigenvalue problem and their general corresponding Lax-representation are derived. In the wake of the previous results, we extend the above prolongation scheme to higher-dimensional systems from which a new (2 + 1)-dimensional coupled integrable dispersionless system is unveiled along with its inverse scattering formulation, which applications are straightforward in nonlinear optics where additional propagating dimension deserves some attention.

  5. Active semi-supervised learning method with hybrid deep belief networks.

    PubMed

    Zhou, Shusen; Chen, Qingcai; Wang, Xiaolong

    2014-01-01

    In this paper, we develop a novel semi-supervised learning algorithm called active hybrid deep belief networks (AHD), to address the semi-supervised sentiment classification problem with deep learning. First, we construct the previous several hidden layers using restricted Boltzmann machines (RBM), which can reduce the dimension and abstract the information of the reviews quickly. Second, we construct the following hidden layers using convolutional restricted Boltzmann machines (CRBM), which can abstract the information of reviews effectively. Third, the constructed deep architecture is fine-tuned by gradient-descent based supervised learning with an exponential loss function. Finally, active learning method is combined based on the proposed deep architecture. We did several experiments on five sentiment classification datasets, and show that AHD is competitive with previous semi-supervised learning algorithm. Experiments are also conducted to verify the effectiveness of our proposed method with different number of labeled reviews and unlabeled reviews respectively.

  6. Hidden reentrant and Larkin-Ovchinnikov-Fulde-Ferrell superconducting phases in a magnetic field in a (TMTSF)2ClO4.

    PubMed

    Lebed, A G

    2011-08-19

    We solve a long-standing problem about a theoretical description of the upper critical magnetic field, parallel to conducting layers and perpendicular to conducting chains, in a (TMTSF)(2)ClO(4) superconductor. In particular, we explain why the experimental upper critical field, H(c2)(b')≃6 T, is higher than both the quasiclassical upper critical field and the Clogston paramagnetic limit. We show that this property is due to the coexistence of the hidden reentrant and Larkin-Ovchinnikov-Fulde-Ferrell phases in a magnetic field in the form of three plane waves with nonzero momenta of the Cooper pairs. Our results are in good qualitative and quantitative agreement with the recent experimental measurements of H(c2)(b') and support a singlet d-wave-like scenario of superconductivity in (TMTSF)(2)ClO(4). © 2011 American Physical Society

  7. Analysis of Accuracy and Epoch on Back-propagation BFGS Quasi-Newton

    NASA Astrophysics Data System (ADS)

    Silaban, Herlan; Zarlis, Muhammad; Sawaluddin

    2017-12-01

    Back-propagation is one of the learning algorithms on artificial neural networks that have been widely used to solve various problems, such as pattern recognition, prediction and classification. The Back-propagation architecture will affect the outcome of learning processed. BFGS Quasi-Newton is one of the functions that can be used to change the weight of back-propagation. This research tested some back-propagation architectures using classical back-propagation and back-propagation with BFGS. There are 7 architectures that have been tested on glass dataset with various numbers of neurons, 6 architectures with 1 hidden layer and 1 architecture with 2 hidden layers. BP with BFGS improves the convergence of the learning process. The average improvement convergence is 98.34%. BP with BFGS is more optimal on architectures with smaller number of neurons with decreased epoch number is 94.37% with the increase of accuracy about 0.5%.

  8. How should we question young children's understanding of aspectuality?

    PubMed

    Waters, Gillian M; Beck, Sarah R

    2012-09-01

    In two experiments, we investigated whether 4- to 5-year-old children's ability to demonstrate their understanding of aspectuality was influenced by how the test question was phrased. In Experiment 1, 60 children chose whether to look or feel to gain information about a hidden object (identifiable by sight or touch). Test questions referred either to the perceptual aspect of the hidden object (e.g., whether it was red or blue), the modality dimension (e.g., what colour it was), or the object's identity (e.g., which one it was). Children who heard the identity question performed worse than those who heard the aspect or dimension question. Further investigation in Experiment 2 (N= 23) established that children's difficulty with the identity question was not due to a problem recalling the objects. We discuss how the results of these methodological investigations impact on researchers' assessment of the development of aspectuality understanding. ©2011 The British Psychological Society.

  9. Rich Schools, Poor Schools. Hidden Resource Inequalities between Primary Schools

    ERIC Educational Resources Information Center

    Poesen-Vandeputte, Mayke; Nicaise, Ides

    2015-01-01

    Background: There has been relatively little analysis of school context including a large number of elements from the broader social, political and economic influences. However, primary schools in Flanders (Belgium) are supposed to consider their school context when implementing the Flemish policy on equal opportunities in education. Purpose: In…

  10. Data management and language enhancement for generalized set theory computer language for operation of large relational databases

    NASA Technical Reports Server (NTRS)

    Finley, Gail T.

    1988-01-01

    This report covers the study of the relational database implementation in the NASCAD computer program system. The existing system is used primarily for computer aided design. Attention is also directed to a hidden-surface algorithm for final drawing output.

  11. Impulse radar studfinder

    DOEpatents

    McEwan, Thomas E.

    1995-01-01

    An impulse radar studfinder propagates electromagnetic pulses and detects reflected pulses from a fixed range. Unmodulated pulses, about 200 ps wide, are emitted. A large number of reflected pulses are sampled and averaged. Background reflections are subtracted. Reflections from wall studs or other hidden objects are detected and displayed using light emitting diodes.

  12. Impulse radar studfinder

    DOEpatents

    McEwan, T.E.

    1995-10-10

    An impulse radar studfinder propagates electromagnetic pulses and detects reflected pulses from a fixed range. Unmodulated pulses, about 200 ps wide, are emitted. A large number of reflected pulses are sampled and averaged. Background reflections are subtracted. Reflections from wall studs or other hidden objects are detected and displayed using light emitting diodes. 9 figs.

  13. The Hidden "Who" in Leadership Education: Conceptualizing Leadership Educator Professional Identity Development

    ERIC Educational Resources Information Center

    Seemiller, Corey; Priest, Kerry L.

    2015-01-01

    A great deal of literature exists "for" leadership educators related to programs design, delivery, and student learning. However, little is known "about" leadership educators, who have largely been left out of contemporary leadership education research. We looked to teaching and teacher education literature to derive a model…

  14. [Geriatric assessment. Development, status quo and perspectives].

    PubMed

    Lüttje, D; Varwig, D; Teigel, B; Gilhaus, B

    2011-08-01

    Multimorbidity is typical for geriatric patients. Problems not identified in time may lead to increased hospitalisation or prolonged hospital stay. Problems of multimorbidity are not covered by most guidelines or clinical pathways. The geriatric assessment supports standard clinical and technical assessment. Geriatric identification screening is basic for general practitioners and in emergency rooms to filter those patients bearing a special risk. Geriatric basic assessment covers most of the problems relevant for people in old age, revealing even problems that had so far been hidden. It permits to structure a comprehensive and holistic therapeutic approach and to evaluate the targets of treatment relevant for independent living and well-being. This results in reduction of morbidity and mortality. Assessment tools focusing on pain, nutrition and frailty should be added to the standardized geriatric basic assessment in Germany.

  15. Prospects for mirage mediation

    NASA Astrophysics Data System (ADS)

    Pierce, Aaron; Thaler, Jesse

    2006-09-01

    Mirage mediation reduces the fine-tuning in the minimal supersymmetric standard model by dynamically arranging a cancellation between anomaly-mediated and modulus-mediated supersymmetry breaking. We explore the conditions under which a mirage ``messenger scale'' is generated near the weak scale and the little hierarchy problem is solved. We do this by explicitly including the dynamics of the SUSY-breaking sector needed to cancel the cosmological constant. The most plausible scenario for generating a low mirage scale does not readily admit an extra-dimensional interpretation. We also review the possibilities for solving the μ/Bμ problem in such theories, a potential hidden source of fine-tuning.

  16. Competitive Deep-Belief Networks for Underwater Acoustic Target Recognition

    PubMed Central

    Shen, Sheng; Yao, Xiaohui; Sheng, Meiping; Wang, Chen

    2018-01-01

    Underwater acoustic target recognition based on ship-radiated noise belongs to the small-sample-size recognition problems. A competitive deep-belief network is proposed to learn features with more discriminative information from labeled and unlabeled samples. The proposed model consists of four stages: (1) A standard restricted Boltzmann machine is pretrained using a large number of unlabeled data to initialize its parameters; (2) the hidden units are grouped according to categories, which provides an initial clustering model for competitive learning; (3) competitive training and back-propagation algorithms are used to update the parameters to accomplish the task of clustering; (4) by applying layer-wise training and supervised fine-tuning, a deep neural network is built to obtain features. Experimental results show that the proposed method can achieve classification accuracy of 90.89%, which is 8.95% higher than the accuracy obtained by the compared methods. In addition, the highest accuracy of our method is obtained with fewer features than other methods. PMID:29570642

  17. Implications of Emerging Data Mining

    NASA Astrophysics Data System (ADS)

    Kulathuramaiyer, Narayanan; Maurer, Hermann

    Data Mining describes a technology that discovers non-trivial hidden patterns in a large collection of data. Although this technology has a tremendous impact on our lives, the invaluable contributions of this invisible technology often go unnoticed. This paper discusses advances in data mining while focusing on the emerging data mining capability. Such data mining applications perform multidimensional mining on a wide variety of heterogeneous data sources, providing solutions to many unresolved problems. This paper also highlights the advantages and disadvantages arising from the ever-expanding scope of data mining. Data Mining augments human intelligence by equipping us with a wealth of knowledge and by empowering us to perform our daily tasks better. As the mining scope and capacity increases, users and organizations become more willing to compromise privacy. The huge data stores of the ‚master miners` allow them to gain deep insights into individual lifestyles and their social and behavioural patterns. Data integration and analysis capability of combining business and financial trends together with the ability to deterministically track market changes will drastically affect our lives.

  18. Collective navigation of complex networks: Participatory greedy routing.

    PubMed

    Kleineberg, Kaj-Kolja; Helbing, Dirk

    2017-06-06

    Many networks are used to transfer information or goods, in other words, they are navigated. The larger the network, the more difficult it is to navigate efficiently. Indeed, information routing in the Internet faces serious scalability problems due to its rapid growth, recently accelerated by the rise of the Internet of Things. Large networks like the Internet can be navigated efficiently if nodes, or agents, actively forward information based on hidden maps underlying these systems. However, in reality most agents will deny to forward messages, which has a cost, and navigation is impossible. Can we design appropriate incentives that lead to participation and global navigability? Here, we present an evolutionary game where agents share the value generated by successful delivery of information or goods. We show that global navigability can emerge, but its complete breakdown is possible as well. Furthermore, we show that the system tends to self-organize into local clusters of agents who participate in the navigation. This organizational principle can be exploited to favor the emergence of global navigability in the system.

  19. Memory and foraging theory: Chimpanzee utilization of optimality heuristics in the rank-order recovery of hidden foods

    PubMed Central

    Sayers, Ken; Menzel, Charles R.

    2012-01-01

    Many models from foraging theory and movement ecology assume that resources are encountered randomly. If food locations, types and values are retained in memory, however, search time could be significantly reduced, with concurrent effects on biological fitness. Despite this, little is known about what specific characteristics of foods, particularly those relevant to profitability, nonhuman animals can remember. Building upon previous observations, we hypothesized that chimpanzees (Pan troglodytes), after observing foods being hidden in a large wooded test area they could not enter, and after long delays, would direct (through gesture and vocalization) experimentally naïve humans to the reward locations in an order that could be predicted beforehand by the spatial and physical characteristics of those items. In the main experiment, various quantities of almonds, both in and out of shells and sealed in transparent bags, were hidden in the test area. The chimpanzees later directed searchers to those items in a nonrandom order related to quantity, shell presence/absence, and the distance they were hidden from the subject. The recovery sequences were closely related to the actual e/h profitability of the foods. Predicted recovery orders, based on the energetic value of almonds and independently-measured, individual-specific expected pursuit and processing times, were closely related to observed recovery orders. We argue that the information nonhuman animals possess regarding their environment can be extensive, and that further comparative study is vital for incorporating realistic cognitive variables into models of foraging and movement. PMID:23226837

  20. Learning a single-hidden layer feedforward neural network using a rank correlation-based strategy with application to high dimensional gene expression and proteomic spectra datasets in cancer detection.

    PubMed

    Belciug, Smaranda; Gorunescu, Florin

    2018-06-08

    Methods based on microarrays (MA), mass spectrometry (MS), and machine learning (ML) algorithms have evolved rapidly in recent years, allowing for early detection of several types of cancer. A pitfall of these approaches, however, is the overfitting of data due to large number of attributes and small number of instances -- a phenomenon known as the 'curse of dimensionality'. A potentially fruitful idea to avoid this drawback is to develop algorithms that combine fast computation with a filtering module for the attributes. The goal of this paper is to propose a statistical strategy to initiate the hidden nodes of a single-hidden layer feedforward neural network (SLFN) by using both the knowledge embedded in data and a filtering mechanism for attribute relevance. In order to attest its feasibility, the proposed model has been tested on five publicly available high-dimensional datasets: breast, lung, colon, and ovarian cancer regarding gene expression and proteomic spectra provided by cDNA arrays, DNA microarray, and MS. The novel algorithm, called adaptive SLFN (aSLFN), has been compared with four major classification algorithms: traditional ELM, radial basis function network (RBF), single-hidden layer feedforward neural network trained by backpropagation algorithm (BP-SLFN), and support vector-machine (SVM). Experimental results showed that the classification performance of aSLFN is competitive with the comparison models. Copyright © 2018. Published by Elsevier Inc.

  1. Efficient free energy calculations by combining two complementary tempering sampling methods.

    PubMed

    Xie, Liangxu; Shen, Lin; Chen, Zhe-Ning; Yang, Mingjun

    2017-01-14

    Although energy barriers can be efficiently crossed in the reaction coordinate (RC) guided sampling, this type of method suffers from identification of the correct RCs or requirements of high dimensionality of the defined RCs for a given system. If only the approximate RCs with significant barriers are used in the simulations, hidden energy barriers with small to medium height would exist in other degrees of freedom (DOFs) relevant to the target process and consequently cause the problem of insufficient sampling. To address the sampling in this so-called hidden barrier situation, here we propose an effective approach to combine temperature accelerated molecular dynamics (TAMD), an efficient RC-guided sampling method, with the integrated tempering sampling (ITS), a generalized ensemble sampling method. In this combined ITS-TAMD method, the sampling along the major RCs with high energy barriers is guided by TAMD and the sampling of the rest of the DOFs with lower but not negligible barriers is enhanced by ITS. The performance of ITS-TAMD to three systems in the processes with hidden barriers has been examined. In comparison to the standalone TAMD or ITS approach, the present hybrid method shows three main improvements. (1) Sampling efficiency can be improved at least five times even if in the presence of hidden energy barriers. (2) The canonical distribution can be more accurately recovered, from which the thermodynamic properties along other collective variables can be computed correctly. (3) The robustness of the selection of major RCs suggests that the dimensionality of necessary RCs can be reduced. Our work shows more potential applications of the ITS-TAMD method as the efficient and powerful tool for the investigation of a broad range of interesting cases.

  2. Efficient free energy calculations by combining two complementary tempering sampling methods

    NASA Astrophysics Data System (ADS)

    Xie, Liangxu; Shen, Lin; Chen, Zhe-Ning; Yang, Mingjun

    2017-01-01

    Although energy barriers can be efficiently crossed in the reaction coordinate (RC) guided sampling, this type of method suffers from identification of the correct RCs or requirements of high dimensionality of the defined RCs for a given system. If only the approximate RCs with significant barriers are used in the simulations, hidden energy barriers with small to medium height would exist in other degrees of freedom (DOFs) relevant to the target process and consequently cause the problem of insufficient sampling. To address the sampling in this so-called hidden barrier situation, here we propose an effective approach to combine temperature accelerated molecular dynamics (TAMD), an efficient RC-guided sampling method, with the integrated tempering sampling (ITS), a generalized ensemble sampling method. In this combined ITS-TAMD method, the sampling along the major RCs with high energy barriers is guided by TAMD and the sampling of the rest of the DOFs with lower but not negligible barriers is enhanced by ITS. The performance of ITS-TAMD to three systems in the processes with hidden barriers has been examined. In comparison to the standalone TAMD or ITS approach, the present hybrid method shows three main improvements. (1) Sampling efficiency can be improved at least five times even if in the presence of hidden energy barriers. (2) The canonical distribution can be more accurately recovered, from which the thermodynamic properties along other collective variables can be computed correctly. (3) The robustness of the selection of major RCs suggests that the dimensionality of necessary RCs can be reduced. Our work shows more potential applications of the ITS-TAMD method as the efficient and powerful tool for the investigation of a broad range of interesting cases.

  3. The hidden costs of coastal hazards: Implications for risk assessment and mitigation

    USGS Publications Warehouse

    Kunreuther, H.; Platt, R.; Baruch, S.; Bernknopf, R.L.; Buckley, M.; Burkett, V.; Conrad, D.; Davidson, T.; Deutsch, K.; Geis, D.; Jannereth, M.; Knap, A.; Lane, H.; Ljung, G.; McCauley, M.; Mileti, D.; Miller, T.; Morrow, B.; Meyers, J.; Pielke, R.; Pratt, A.; Tripp, J.

    2000-01-01

    Society has limited hazard mitigation dollars to invest. Which actions will be most cost effective, considering the true range of impacts and costs incurred? In 1997, the H. John Heinz III Center for Science, Economics and the Environment began a two-year study with a panel of experts to help develop new strategies to identify and reduce the costs of weather-related hazards associated with rapidly increasing coastal development activities.The Hidden Costs of Coastal Hazards presents the panel's findings, offering the first in-depth study that considers the costs of coastal hazards to natural resources, social institutions, business, and the built environment. Using Hurricane Hugo, which struck South Carolina in 1989, as a case study, it provides for the first time information on the full range of economic costs caused by a major coastal hazard event. The book:describes and examines unreported, undocumented, and hidden costs such as losses due to business interruption, reduction in property values, interruption of social services, psychological trauma, damage to natural systems, and othersexamines the concepts of risk and vulnerability, and discusses conventional approaches to risk assessment and the emerging area of vulnerability assessmentrecommends a comprehensive framework for developing and implementing mitigation strategiesdocuments the human impact of Hurricane Hugo and provides insight from those who lived through it.The Hidden Costs of Coastal Hazards takes a structured approach to the problem of coastal hazards, offering a new framework for community-based hazard mitigation along with specific recommendations for implementation. Decisionmakers -- both policymakers and planners -- who are interested in coastal hazard issues will find the book a unique source of new information and insight, as will private-sector decisionmakers including lenders, investors, developers, and insurers of coastal property.

  4. QAPgrid: A Two Level QAP-Based Approach for Large-Scale Data Analysis and Visualization

    PubMed Central

    Inostroza-Ponta, Mario; Berretta, Regina; Moscato, Pablo

    2011-01-01

    Background The visualization of large volumes of data is a computationally challenging task that often promises rewarding new insights. There is great potential in the application of new algorithms and models from combinatorial optimisation. Datasets often contain “hidden regularities” and a combined identification and visualization method should reveal these structures and present them in a way that helps analysis. While several methodologies exist, including those that use non-linear optimization algorithms, severe limitations exist even when working with only a few hundred objects. Methodology/Principal Findings We present a new data visualization approach (QAPgrid) that reveals patterns of similarities and differences in large datasets of objects for which a similarity measure can be computed. Objects are assigned to positions on an underlying square grid in a two-dimensional space. We use the Quadratic Assignment Problem (QAP) as a mathematical model to provide an objective function for assignment of objects to positions on the grid. We employ a Memetic Algorithm (a powerful metaheuristic) to tackle the large instances of this NP-hard combinatorial optimization problem, and we show its performance on the visualization of real data sets. Conclusions/Significance Overall, the results show that QAPgrid algorithm is able to produce a layout that represents the relationships between objects in the data set. Furthermore, it also represents the relationships between clusters that are feed into the algorithm. We apply the QAPgrid on the 84 Indo-European languages instance, producing a near-optimal layout. Next, we produce a layout of 470 world universities with an observed high degree of correlation with the score used by the Academic Ranking of World Universities compiled in the The Shanghai Jiao Tong University Academic Ranking of World Universities without the need of an ad hoc weighting of attributes. Finally, our Gene Ontology-based study on Saccharomyces cerevisiae fully demonstrates the scalability and precision of our method as a novel alternative tool for functional genomics. PMID:21267077

  5. QAPgrid: a two level QAP-based approach for large-scale data analysis and visualization.

    PubMed

    Inostroza-Ponta, Mario; Berretta, Regina; Moscato, Pablo

    2011-01-18

    The visualization of large volumes of data is a computationally challenging task that often promises rewarding new insights. There is great potential in the application of new algorithms and models from combinatorial optimisation. Datasets often contain "hidden regularities" and a combined identification and visualization method should reveal these structures and present them in a way that helps analysis. While several methodologies exist, including those that use non-linear optimization algorithms, severe limitations exist even when working with only a few hundred objects. We present a new data visualization approach (QAPgrid) that reveals patterns of similarities and differences in large datasets of objects for which a similarity measure can be computed. Objects are assigned to positions on an underlying square grid in a two-dimensional space. We use the Quadratic Assignment Problem (QAP) as a mathematical model to provide an objective function for assignment of objects to positions on the grid. We employ a Memetic Algorithm (a powerful metaheuristic) to tackle the large instances of this NP-hard combinatorial optimization problem, and we show its performance on the visualization of real data sets. Overall, the results show that QAPgrid algorithm is able to produce a layout that represents the relationships between objects in the data set. Furthermore, it also represents the relationships between clusters that are feed into the algorithm. We apply the QAPgrid on the 84 Indo-European languages instance, producing a near-optimal layout. Next, we produce a layout of 470 world universities with an observed high degree of correlation with the score used by the Academic Ranking of World Universities compiled in the The Shanghai Jiao Tong University Academic Ranking of World Universities without the need of an ad hoc weighting of attributes. Finally, our Gene Ontology-based study on Saccharomyces cerevisiae fully demonstrates the scalability and precision of our method as a novel alternative tool for functional genomics.

  6. Deep neural nets as a method for quantitative structure-activity relationships.

    PubMed

    Ma, Junshui; Sheridan, Robert P; Liaw, Andy; Dahl, George E; Svetnik, Vladimir

    2015-02-23

    Neural networks were widely used for quantitative structure-activity relationships (QSAR) in the 1990s. Because of various practical issues (e.g., slow on large problems, difficult to train, prone to overfitting, etc.), they were superseded by more robust methods like support vector machine (SVM) and random forest (RF), which arose in the early 2000s. The last 10 years has witnessed a revival of neural networks in the machine learning community thanks to new methods for preventing overfitting, more efficient training algorithms, and advancements in computer hardware. In particular, deep neural nets (DNNs), i.e. neural nets with more than one hidden layer, have found great successes in many applications, such as computer vision and natural language processing. Here we show that DNNs can routinely make better prospective predictions than RF on a set of large diverse QSAR data sets that are taken from Merck's drug discovery effort. The number of adjustable parameters needed for DNNs is fairly large, but our results show that it is not necessary to optimize them for individual data sets, and a single set of recommended parameters can achieve better performance than RF for most of the data sets we studied. The usefulness of the parameters is demonstrated on additional data sets not used in the calibration. Although training DNNs is still computationally intensive, using graphical processing units (GPUs) can make this issue manageable.

  7. THREaD Mapper Studio: a novel, visual web server for the estimation of genetic linkage maps

    PubMed Central

    Cheema, Jitender; Ellis, T. H. Noel; Dicks, Jo

    2010-01-01

    The estimation of genetic linkage maps is a key component in plant and animal research, providing both an indication of the genetic structure of an organism and a mechanism for identifying candidate genes associated with traits of interest. Because of this importance, several computational solutions to genetic map estimation exist, mostly implemented as stand-alone software packages. However, the estimation process is often largely hidden from the user. Consequently, problems such as a program crashing may occur that leave a user baffled. THREaD Mapper Studio (http://cbr.jic.ac.uk/threadmapper) is a new web site that implements a novel, visual and interactive method for the estimation of genetic linkage maps from DNA markers. The rationale behind the web site is to make the estimation process as transparent and robust as possible, while also allowing users to use their expert knowledge during analysis. Indeed, the 3D visual nature of the tool allows users to spot features in a data set, such as outlying markers and potential structural rearrangements that could cause problems with the estimation procedure and to account for them in their analysis. Furthermore, THREaD Mapper Studio facilitates the visual comparison of genetic map solutions from third party software, aiding users in developing robust solutions for their data sets. PMID:20494977

  8. Enhancing collaborative filtering by user interest expansion via personalized ranking.

    PubMed

    Liu, Qi; Chen, Enhong; Xiong, Hui; Ding, Chris H Q; Chen, Jian

    2012-02-01

    Recommender systems suggest a few items from many possible choices to the users by understanding their past behaviors. In these systems, the user behaviors are influenced by the hidden interests of the users. Learning to leverage the information about user interests is often critical for making better recommendations. However, existing collaborative-filtering-based recommender systems are usually focused on exploiting the information about the user's interaction with the systems; the information about latent user interests is largely underexplored. To that end, inspired by the topic models, in this paper, we propose a novel collaborative-filtering-based recommender system by user interest expansion via personalized ranking, named iExpand. The goal is to build an item-oriented model-based collaborative-filtering framework. The iExpand method introduces a three-layer, user-interests-item, representation scheme, which leads to more accurate ranking recommendation results with less computation cost and helps the understanding of the interactions among users, items, and user interests. Moreover, iExpand strategically deals with many issues that exist in traditional collaborative-filtering approaches, such as the overspecialization problem and the cold-start problem. Finally, we evaluate iExpand on three benchmark data sets, and experimental results show that iExpand can lead to better ranking performance than state-of-the-art methods with a significant margin.

  9. Complementary hydro-mechanical coupled finite/discrete element and microseismic modelling to predict hydraulic fracture propagation in tight shale reservoirs

    NASA Astrophysics Data System (ADS)

    Profit, Matthew; Dutko, Martin; Yu, Jianguo; Cole, Sarah; Angus, Doug; Baird, Alan

    2016-04-01

    This paper presents a novel approach to predict the propagation of hydraulic fractures in tight shale reservoirs. Many hydraulic fracture modelling schemes assume that the fracture direction is pre-seeded in the problem domain discretisation. This is a severe limitation as the reservoir often contains large numbers of pre-existing fractures that strongly influence the direction of the propagating fracture. To circumvent these shortcomings, a new fracture modelling treatment is proposed where the introduction of discrete fracture surfaces is based on new and dynamically updated geometrical entities rather than the topology of the underlying spatial discretisation. Hydraulic fracturing is an inherently coupled engineering problem with interactions between fluid flow and fracturing when the stress state of the reservoir rock attains a failure criterion. This work follows a staggered hydro-mechanical coupled finite/discrete element approach to capture the key interplay between fluid pressure and fracture growth. In field practice, the fracture growth is hidden from the design engineer and microseismicity is often used to infer hydraulic fracture lengths and directions. Microseismic output can also be computed from changes of the effective stress in the geomechanical model and compared against field microseismicity. A number of hydraulic fracture numerical examples are presented to illustrate the new technology.

  10. Perceived unmet need and barriers to care amongst street-involved people who use illicit drugs.

    PubMed

    Hyshka, Elaine; Anderson, Jalene Tayler; Wild, T Cameron

    2017-05-01

    Research on perceived unmet need for care for mental health and substance use problems focuses on general populations to the detriment of hidden populations. This study describes prevalence and correlates of perceived unmet need for care in a community-based sample of street-involved people who use illicit drugs and identifies barriers to care. A sample of 320 street-involved people who use drugs participated in a structured, interviewer-assisted survey in Edmonton, Canada. The survey included the Perceived Need for Care Questionnaire, which assessed unmet need for care for mental health and substance use problems across seven service types. Logistic regression examined the associations between perceived unmet need, extent of socioeconomic marginalisation and problem severity. Barriers underlying unmet service needs were also examined. Most (82%) participants reported unmet need for one or more services during the past year. Odds of reporting one or more unmet needs were elevated amongst participants reporting substantial housing instability (adjusted odds ratio = 2.37; 95% confidence interval 1.19-4.28) and amongst participants meeting criteria for drug dependence (adjusted odds ratio = 1.22; 95% confidence interval 1.03-1.50), even after adjustment for sociodemographic covariates. Structural, rather than motivational barriers were the most commonly reported reasons underlying unmet service needs. Street-involved people who use drugs experience very high rates of perceived unmet need for care for mental health and substance use problems. General population studies on perceived unmet need are insufficient for understanding needs and barriers to care in hidden populations.[Hyshka E, Anderson JT, Wild TC. Perceived unmet need and barriers to care amongst street-involved people who use illicit drugs. Drug Alcohol Rev 2017;36:295-304]. © 2016 Australasian Professional Society on Alcohol and other Drugs.

  11. "Hidden" O(2) and SO(2) symmetry in lepton mixing

    NASA Astrophysics Data System (ADS)

    Heeck, Julian; Rodejohann, Werner

    2012-02-01

    To generate the minimal neutrino Majorana mass matrix that has a free solar mixing angle and Δ m_{{^{text{sol}}}}^2 = 0 it suffices to implement an O(2) symmetry, or one of its subgroups SO(2), ZN ≥3, or DN ≥3. This O(2) generalizes the hidden {text{Z}}_{{^{{2}}}}^s of lepton mixing and leads in addition automatically to μ-τ symmetry. Flavor-democratic perturbations, as expected e.g. from the Planck scale, then result in tri-bimaximal mixing. We present a minimal model with three Higgs doublets implementing a type-I seesaw mechanism with a spontaneous breakdown of the symmetry, leading to large θ 13 and small Δ m_{{^{text{sol}}}}^2 = 0 due to the particular decomposition of the perturbations under μ-τ symmetry.

  12. Galaxies Detected by the Dwingeloo Obscured Galaxies Survey

    NASA Astrophysics Data System (ADS)

    Rivers, A. J.; Henning, P. A.; Kraan-Korteweg, R. C.

    1999-04-01

    The Dwingeloo Obscured Galaxies Survey (DOGS) is a 21-cm blind survey for galaxies hidden in the northern `Zone of Avoidance' (ZOA): the portion of the optical extragalactic sky which is obscured by dust in the Milky Way. Like the Parkes southern hemisphere ZOA survey, the DOGS project is designed to reveal hidden dynamically important nearby galaxies and to help `fill in the blanks' in the local large scale structure. To date, 36 galaxies have been detected by the Dwingeloo survey; 23 of these were previously unknown [no corresponding sources recorded in the NASA Extragalactic Database (NED)]. Among the interesting detections are three nearby galaxies in the vicinity of NGC 6946 and 11 detections in the Supergalactic plane crossing region. VLA follow-up observations have been conducted for several of the DOGS detections.

  13. Uncovering the wisdom hidden between the lines: the Collaborative Reflexive Deliberative Approach

    PubMed Central

    Crabtree, Benjamin F; Miller, William L; Gunn, Jane M; Hogg, William E; Scott, Cathie M; Levesque, Jean-Frederic; Harris, Mark F; Chase, Sabrina M; Advocat, Jenny R; Halma, Lisa M; Russell, Grant M

    2018-01-01

    Abstract Background Meta-analysis and meta-synthesis have been developed to synthesize results across published studies; however, they are still largely grounded in what is already published, missing the tacit ‘between the lines’ knowledge generated during many research projects that are not intrinsic to the main objectives of studies. Objective To develop a novel approach to expand and deepen meta-syntheses using researchers’ experience, tacit knowledge and relevant unpublished materials. Methods We established new collaborations among primary health care researchers from different contexts based on common interests in reforming primary care service delivery and a diversity of perspectives. Over 2 years, the team met face-to-face and via tele- and video-conferences to employ the Collaborative Reflexive Deliberative Approach (CRDA) to discuss and reflect on published and unpublished results from participants’ studies to identify new patterns and insights. Results CRDA focuses on uncovering critical insights, interpretations hidden within multiple research contexts. For the process to work, careful attention must be paid to ensure sufficient diversity among participants while also having people who are able to collaborate effectively. Ensuring there are enough studies for contextual variation also matters. It is necessary to balance rigorous facilitation techniques with the creation of safe space for diverse contributions. Conclusions The CRDA requires large commitments of investigator time, the expense of convening facilitated retreats, considerable coordination, and strong leadership. The process creates an environment where interactions among diverse participants can illuminate hidden information within the contexts of studies, effectively enhancing theory development and generating new research questions and strategies. PMID:29069335

  14. Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem

    NASA Astrophysics Data System (ADS)

    Rustamov, Samir; Mustafayev, Elshan; Clements, Mark A.

    2018-04-01

    The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM) can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.

  15. Committee opinion no. 507: human trafficking.

    PubMed

    2011-09-01

    Human trafficking is a widespread problem with estimates ranging from 14,000 to 50,000 individuals trafficked into the United States annually. This hidden population involves the commercial sex industry, agriculture, factories, hotel and restaurant businesses, domestic workers, marriage brokers, and some adoption firms. Because 80% of trafficked individuals are women and girls, women’s health care providers may better serve their diverse patient population by increasing their awareness of this problem. The exploitation of people of any race, gender, sexual orientation, or ethnicity is unacceptable at any time, in any place. The members of the American College of Obstetricians and Gynecologists should be aware of this problem and strive to recognize and assist their patients who are victims or who have been victims of human trafficking.

  16. Total Quality Management: A Guide to Implementation

    DTIC Science & Technology

    1989-08-01

    Kaizen. New York: Random House. 1986. Ishikawa , Kaoru . Guide to Quality Control. Asian Productivity Organization. 1984. Ishikawa , Kaoru . What is Total...with the problems and the new management principles are based on the complexities of the new Systems Age. The theories of Deming, Juran, Ishikawa , and...Progress. Jun 1985. Miller, Jeffery G. and Thomas E. Vollmann. "The Hidden Factory." Harvard Business Review. Sep-Oct 1985. Shimoyamada, Kaoru . "The

  17. Proposed Test of Relative Phase as Hidden Variable in Quantum Mechanics

    DTIC Science & Technology

    2012-01-01

    implicitly due to its ubiquity in quantum theory , but searches for dependence of measurement outcome on other parameters have been lacking. For a two -state...implemen- tation for the specific case of an atomic two -state system with laser-induced fluores- cence for measurement. Keywords Quantum measurement...Measurement postulate · Born rule 1 Introduction 1.1 Problems with Quantum Measurement Quantum theory prescribes probabilities for outcomes of measurements

  18. Lymphogranuloma venereum: a hidden emerging problem, Barcelona, 2011.

    PubMed

    Vargas-Leguas, H; Garcia de Olalla, P; Arando, M; Armengol, P; Barbera, Mj; Vall, M; Vives, A; Martin-Ezquerra, G; Alsina, M; Blanco, J; Munoz, C; Caballero, E; Andreu, A; Ros, M; Gorrindo, P; Dominguez, A; Cayla, Ja

    2012-01-12

    From the beginning of 2007 until the end of 2011, 146 cases of lymphogranuloma venereum (LGV) were notified to the Barcelona Public Health Agency. Some 49% of them were diagnosed and reported in 2011, mainly in men who have sex with men. Almost half of them, 32 cases, were reported between July and September. This cluster represents the largest since 2004. This article presents the ongoing outbreak of LGV in Barcelona.

  19. Hidden Realities inside PBL Design Processes: Is Consensus Design an Impossible Clash of Interest between the Individual and the Collective, and Is Architecture Its First Victim?

    ERIC Educational Resources Information Center

    Pihl, Ole

    2015-01-01

    How do architecture students experience the contradictions between the individual and the group at the Department of Architecture and Design of Aalborg University? The Problem-Based Learning model has been extensively applied to the department's degree programs in coherence with the Integrated Design Process, but is a group-based architecture and…

  20. Attentional Selection in Object Recognition

    DTIC Science & Technology

    1993-02-01

    order. It also affects the choice of strategies in both the 24 A Computational Model of Attentional Selection filtering and arbiter stages. The set...such processing. In Treisman’s model this was hidden in the concept of the selection filter . Later computational models of attention tried to...This thesis presents a novel approach to the selection problem by propos. ing a computational model of visual attentional selection as a paradigm for

  1. Antibiotic pharmacoeconomics: an attempt to find the real cost of hospital antibiotic prescribing.

    PubMed Central

    Kerr, J. R.; Barr, J. G.; Smyth, E. T.; O'Hare, J.; Bell, P. M.; Callender, M. E.

    1993-01-01

    Antibiotics account for a large part of all hospital pharmacy budgets, but the actual cost of their prescription is unknown. These costs include intravenous administration, labour, serum antibiotic assay, monitoring of haematological and biochemical indices, disposal of sharps and adverse effects. An in-house method of costing antibiotic therapy is presented, to quantify these hidden expenses. Since not only an awareness, but an accurate quantification, of hidden costs is required, a study of various hospital procedures relating directly to antibiotic therapy was undertaken in an acute medical ward; this involved the identification of particular staff members performing various procedures, consumables used and time taken. The cost of five-day courses of gentamicin, penicillin G, ampicillin, flucloxacillin, cefuroxime, ceftotaxime and erythromycin has been calculated; drug and hidden costs for each are presented graphically for comparison. The breakdown cost for gentamicin is presented to illustrate the method. The costing of adverse effects has not been attempted. We suggest that costings of this sort are used in cost-benefit analysis of antibiotic use. These calculations have been incorporated into a computer spreadsheet and this costing service will be offered to clinical areas of our hospital. PMID:8516976

  2. Estimates of Storage Capacity of Multilayer Perceptron with Threshold Logic Hidden Units.

    PubMed

    Kowalczyk, Adam

    1997-11-01

    We estimate the storage capacity of multilayer perceptron with n inputs, h(1) threshold logic units in the first hidden layer and 1 output. We show that if the network can memorize 50% of all dichotomies of a randomly selected N-tuple of points of R(n) with probability 1, then N

  3. Search protocols for hidden forensic objects beneath floors and within walls.

    PubMed

    Ruffell, Alastair; Pringle, Jamie K; Forbes, Shari

    2014-04-01

    The burial of objects (human remains, explosives, weapons) below or behind concrete, brick, plaster or tiling may be associated with serious crime and are difficult locations to search. These are quite common forensic search scenarios but little has been published on them to-date. Most documented discoveries are accidental or from suspect/witness testimony. The problem in locating such hidden objects means a random or chance-based approach is not advisable. A preliminary strategy is presented here, based on previous studies, augmented by primary research where new technology or applications are required. This blend allows a rudimentary search workflow, from remote desktop study, to non-destructive investigation through to recommendations as to how the above may inform excavation, demonstrated here with a case study from a homicide investigation. Published case studies on the search for human remains demonstrate the problems encountered when trying to find and recover sealed-in and sealed-over locations. Established methods include desktop study, photography, geophysics and search dogs: these are integrated with new technology (LiDAR and laser scanning; photographic rectification; close-quarter aerial imagery; ground-penetrating radar on walls and gamma-ray/neutron activation radiography) to propose this possible search strategy. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  4. Binary space partitioning trees and their uses

    NASA Technical Reports Server (NTRS)

    Bell, Bradley N.

    1989-01-01

    Binary Space Partitioning (BSP) trees have some qualities that make them useful in solving many graphics related problems. The purpose is to describe what a BSP tree is, and how it can be used to solve the problem of hidden surface removal, and constructive solid geometry. The BSP tree is based on the idea that a plane acting as a divider subdivides space into two parts with one being on the positive side and the other on the negative. A polygonal solid is then represented as the volume defined by the collective interior half spaces of the solid's bounding surfaces. The nature of how the tree is organized lends itself well for sorting polygons relative to an arbitrary point in 3 space. The speed at which the tree can be traversed for depth sorting is fast enough to provide hidden surface removal at interactive speeds. The fact that a BSP tree actually represents a polygonal solid as a bounded volume also makes it quite useful in performing the boolean operations used in constructive solid geometry. Due to the nature of the BSP tree, polygons can be classified as they are subdivided. The ability to classify polygons as they are subdivided can enhance the simplicity of implementing constructive solid geometry.

  5. Nonlinear inversion of electrical resistivity imaging using pruning Bayesian neural networks

    NASA Astrophysics Data System (ADS)

    Jiang, Fei-Bo; Dai, Qian-Wei; Dong, Li

    2016-06-01

    Conventional artificial neural networks used to solve electrical resistivity imaging (ERI) inversion problem suffer from overfitting and local minima. To solve these problems, we propose to use a pruning Bayesian neural network (PBNN) nonlinear inversion method and a sample design method based on the K-medoids clustering algorithm. In the sample design method, the training samples of the neural network are designed according to the prior information provided by the K-medoids clustering results; thus, the training process of the neural network is well guided. The proposed PBNN, based on Bayesian regularization, is used to select the hidden layer structure by assessing the effect of each hidden neuron to the inversion results. Then, the hyperparameter α k , which is based on the generalized mean, is chosen to guide the pruning process according to the prior distribution of the training samples under the small-sample condition. The proposed algorithm is more efficient than other common adaptive regularization methods in geophysics. The inversion of synthetic data and field data suggests that the proposed method suppresses the noise in the neural network training stage and enhances the generalization. The inversion results with the proposed method are better than those of the BPNN, RBFNN, and RRBFNN inversion methods as well as the conventional least squares inversion.

  6. Adaptive Online Sequential ELM for Concept Drift Tackling

    PubMed Central

    Basaruddin, Chan

    2016-01-01

    A machine learning method needs to adapt to over time changes in the environment. Such changes are known as concept drift. In this paper, we propose concept drift tackling method as an enhancement of Online Sequential Extreme Learning Machine (OS-ELM) and Constructive Enhancement OS-ELM (CEOS-ELM) by adding adaptive capability for classification and regression problem. The scheme is named as adaptive OS-ELM (AOS-ELM). It is a single classifier scheme that works well to handle real drift, virtual drift, and hybrid drift. The AOS-ELM also works well for sudden drift and recurrent context change type. The scheme is a simple unified method implemented in simple lines of code. We evaluated AOS-ELM on regression and classification problem by using concept drift public data set (SEA and STAGGER) and other public data sets such as MNIST, USPS, and IDS. Experiments show that our method gives higher kappa value compared to the multiclassifier ELM ensemble. Even though AOS-ELM in practice does not need hidden nodes increase, we address some issues related to the increasing of the hidden nodes such as error condition and rank values. We propose taking the rank of the pseudoinverse matrix as an indicator parameter to detect “underfitting” condition. PMID:27594879

  7. Robust Hidden Markov Model based intelligent blood vessel detection of fundus images.

    PubMed

    Hassan, Mehdi; Amin, Muhammad; Murtza, Iqbal; Khan, Asifullah; Chaudhry, Asmatullah

    2017-11-01

    In this paper, we consider the challenging problem of detecting retinal vessel networks. Precise detection of retinal vessel networks is vital for accurate eye disease diagnosis. Most of the blood vessel tracking techniques may not properly track vessels in presence of vessels' occlusion. Owing to problem in sensor resolution or acquisition of fundus images, it is possible that some part of vessel may occlude. In this scenario, it becomes a challenging task to accurately trace these vital vessels. For this purpose, we have proposed a new robust and intelligent retinal vessel detection technique on Hidden Markov Model. The proposed model is able to successfully track vessels in the presence of occlusion. The effectiveness of the proposed technique is evaluated on publically available standard DRIVE dataset of the fundus images. The experiments show that the proposed technique not only outperforms the other state of the art methodologies of retinal blood vessels segmentation, but it is also capable of accurate occlusion handling in retinal vessel networks. The proposed technique offers better average classification accuracy, sensitivity, specificity, and area under the curve (AUC) of 95.7%, 81.0%, 97.0%, and 90.0% respectively, which shows the usefulness of the proposed technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Factor analysis of auto-associative neural networks with application in speaker verification.

    PubMed

    Garimella, Sri; Hermansky, Hynek

    2013-04-01

    Auto-associative neural network (AANN) is a fully connected feed-forward neural network, trained to reconstruct its input at its output through a hidden compression layer, which has fewer numbers of nodes than the dimensionality of input. AANNs are used to model speakers in speaker verification, where a speaker-specific AANN model is obtained by adapting (or retraining) the universal background model (UBM) AANN, an AANN trained on multiple held out speakers, using corresponding speaker data. When the amount of speaker data is limited, this adaptation procedure may lead to overfitting as all the parameters of UBM-AANN are adapted. In this paper, we introduce and develop the factor analysis theory of AANNs to alleviate this problem. We hypothesize that only the weight matrix connecting the last nonlinear hidden layer and the output layer is speaker-specific, and further restrict it to a common low-dimensional subspace during adaptation. The subspace is learned using large amounts of development data, and is held fixed during adaptation. Thus, only the coordinates in a subspace, also known as i-vector, need to be estimated using speaker-specific data. The update equations are derived for learning both the common low-dimensional subspace and the i-vectors corresponding to speakers in the subspace. The resultant i-vector representation is used as a feature for the probabilistic linear discriminant analysis model. The proposed system shows promising results on the NIST-08 speaker recognition evaluation (SRE), and yields a 23% relative improvement in equal error rate over the previously proposed weighted least squares-based subspace AANNs system. The experiments on NIST-10 SRE confirm that these improvements are consistent and generalize across datasets.

  9. A window into the future of the Earth, hidden in the jungles of Costa Rica's volcanoes

    NASA Astrophysics Data System (ADS)

    Fisher, J. B.; Schwandner, F. M.; Asner, G. P.; Schimel, D.; Norby, R. J.; Keller, M.; Pavlick, R.; Braverman, A. J.; Pieri, D. C.; Diaz, J. A.; Gutierrez, M.; Duarte, E. A.; Lewicki, J. L.; Manning, C. E.; Deering, C. D.; Seibt, U.; Miller, G. R.; Drewry, D.; Chambers, J.

    2017-12-01

    The CO2 fertilization response of the terrestrial biosphere contributes among the largest sensitivities and uncertainties across projections of the Earth's future. The source of that uncertainty can be pinpointed to the largest fluxes in the biosphere: the tropics. Free Air CO2 Enrichment (FACE) experiments have contributed immensely to our understanding of short-term CO2 fertilization, but, outside of a small pilot study in development, have been absent in the tropics. This is largely due to numerous hurdles of not only conducting such experiments in challenging environments, but also due to the need to expand their extent considerably to encompass the enormous diversity of species-level responses, in addition to the need for multi-decadal scale responses. As such, we have remained at a critical impasse in our ability to advance understanding of the response of the tropical biosphere to increasing CO2. Recent discoveries have found a cluster of volcanoes degassing CO2 into tropical ecosystems in Costa Rica at concentrations similar to future Earth atmosphere levels. The degassing has been occurring persistently from 10s to 100s of years over 10s to 100s of square kilometers, at different levels depending on the volcano. Fortuitously, this provides a natural "experiment" across a range of conditions needed to assess a widespread and long-lived tropical ecosystem response to elevated CO2: tree species will have had time to shift in composition, traits, structure, and function. Nonetheless, due both to the challenges with assessing these changes on the ground, and heterogeneity causing problems with coarse-scale satellite remote sensing observations, this "window" into the future of the Earth has remained veiled. Here, we describe an airborne-based plan designed to uncover this gem hidden in the jungles of Costa Rica's volcanoes.

  10. Bayesian state space models for dynamic genetic network construction across multiple tissues.

    PubMed

    Liang, Yulan; Kelemen, Arpad

    2016-08-01

    Construction of gene-gene interaction networks and potential pathways is a challenging and important problem in genomic research for complex diseases while estimating the dynamic changes of the temporal correlations and non-stationarity are the keys in this process. In this paper, we develop dynamic state space models with hierarchical Bayesian settings to tackle this challenge for inferring the dynamic profiles and genetic networks associated with disease treatments. We treat both the stochastic transition matrix and the observation matrix time-variant and include temporal correlation structures in the covariance matrix estimations in the multivariate Bayesian state space models. The unevenly spaced short time courses with unseen time points are treated as hidden state variables. Hierarchical Bayesian approaches with various prior and hyper-prior models with Monte Carlo Markov Chain and Gibbs sampling algorithms are used to estimate the model parameters and the hidden state variables. We apply the proposed Hierarchical Bayesian state space models to multiple tissues (liver, skeletal muscle, and kidney) Affymetrix time course data sets following corticosteroid (CS) drug administration. Both simulation and real data analysis results show that the genomic changes over time and gene-gene interaction in response to CS treatment can be well captured by the proposed models. The proposed dynamic Hierarchical Bayesian state space modeling approaches could be expanded and applied to other large scale genomic data, such as next generation sequence (NGS) combined with real time and time varying electronic health record (EHR) for more comprehensive and robust systematic and network based analysis in order to transform big biomedical data into predictions and diagnostics for precision medicine and personalized healthcare with better decision making and patient outcomes.

  11. One-step estimation of networked population size: Respondent-driven capture-recapture with anonymity.

    PubMed

    Khan, Bilal; Lee, Hsuan-Wei; Fellows, Ian; Dombrowski, Kirk

    2018-01-01

    Size estimation is particularly important for populations whose members experience disproportionate health issues or pose elevated health risks to the ambient social structures in which they are embedded. Efforts to derive size estimates are often frustrated when the population is hidden or hard-to-reach in ways that preclude conventional survey strategies, as is the case when social stigma is associated with group membership or when group members are involved in illegal activities. This paper extends prior research on the problem of network population size estimation, building on established survey/sampling methodologies commonly used with hard-to-reach groups. Three novel one-step, network-based population size estimators are presented, for use in the context of uniform random sampling, respondent-driven sampling, and when networks exhibit significant clustering effects. We give provably sufficient conditions for the consistency of these estimators in large configuration networks. Simulation experiments across a wide range of synthetic network topologies validate the performance of the estimators, which also perform well on a real-world location-based social networking data set with significant clustering. Finally, the proposed schemes are extended to allow them to be used in settings where participant anonymity is required. Systematic experiments show favorable tradeoffs between anonymity guarantees and estimator performance. Taken together, we demonstrate that reasonable population size estimates are derived from anonymous respondent driven samples of 250-750 individuals, within ambient populations of 5,000-40,000. The method thus represents a novel and cost-effective means for health planners and those agencies concerned with health and disease surveillance to estimate the size of hidden populations. We discuss limitations and future work in the concluding section.

  12. Construction of EFL Student Teachers' Beliefs about Method: Insights from Postmethod

    ERIC Educational Resources Information Center

    Zeng, Zhengping

    2018-01-01

    Student Teachers' beliefs and their teaching behaviors are interactive and closely related. Student teachers' any adoption of teaching methods in micro-teaching or teaching practicum is largely hidden behind their beliefs. In this paper, starting with the origin and changes of methods in language teaching method era, the author explains certain…

  13. The Development of Comprehensive Search Skills.

    ERIC Educational Resources Information Center

    Wellman, Henry M.; And Others

    1984-01-01

    One experiment examined two and one-half, three and one-half and four and one-half year olds' ability to conduct nonredundant comprehensive searches of small lidded trash cans. A second experiment examined three , four, and five year olds' ability to find Easter eggs hidden on a large playground. Results were discussed in relation to developmental…

  14. Uncovering the Hidden Meaning of Cross-Curriculum Comparison Results on the Force Concept Inventory

    ERIC Educational Resources Information Center

    Ding, Lin; Caballero, Marcos D.

    2014-01-01

    In a recent study, Caballero and colleagues conducted a large-scale evaluation using the Force Concept Inventory (FCI) to compare student learning outcomes between two introductory physics curricula: the Matter and Interactions (M&I) mechanics course and a pedagogically-reformed-traditional-content (PRTC) mechanics course. Using a conventional…

  15. Eight Ways to Build Community with Social Media

    ERIC Educational Resources Information Center

    Cameron, Sally Chapman

    2010-01-01

    When Massachusetts' Bristol Community College (BCC) installed photovoltaic panels on the roofs of three campus buildings, the goal was to position the college as a regional leader in sustainability. The question was how to let the surrounding community know about its investment. The project took place largely out of public view, hidden high on the…

  16. China’s Cyber Power and America’s National Security

    DTIC Science & Technology

    2011-03-24

    activates and can damage software, stored data, or may allow a hacker remote access to the computer system. The term comes from Greek mythology about...the Trojan War: the Greeks presented the citizens of Troy with a large wooden horse in which they had secretly hidden their warriors. During the

  17. Efficiently Exploring Multilevel Data with Recursive Partitioning

    ERIC Educational Resources Information Center

    Martin, Daniel P.; von Oertzen, Timo; Rimm-Kaufman, Sara E.

    2015-01-01

    There is an increasing number of datasets with many participants, variables, or both, in education and other fields that often deal with large, multilevel data structures. Once initial confirmatory hypotheses are exhausted, it can be difficult to determine how best to explore the dataset to discover hidden relationships that could help to inform…

  18. Hidden Treasures for Science Teaching: United States Patents.

    ERIC Educational Resources Information Center

    Anderson, Norman D.

    United States patents are a source of historical information with many implications for science teaching. Using patents as science teaching devices has been largely ignored by science educators. Some of these devices can be easily modified for use in today's classrooms; in addition, patents serve as great examples of how our knowledge of science…

  19. Sexual Harassment and Abuse of Adolescent Schoolgirls in South India

    ERIC Educational Resources Information Center

    Leach, Fiona; Sitaram, Shashikala

    2007-01-01

    This article reports on a small exploratory study of adolescent girls' experiences of sexual harassment and abuse while attending secondary school in Karnataka State, South India. In South Asia, public discussion of sexual matters, especially relating to children, is largely taboo, and the study uncovers a hidden aspect of schooling, which…

  20. MaCH-Admix: Genotype Imputation for Admixed Populations

    PubMed Central

    Liu, Eric Yi; Li, Mingyao; Wang, Wei; Li, Yun

    2012-01-01

    Imputation in admixed populations is an important problem but challenging due to the complex linkage disequilibrium (LD) pattern. The emergence of large reference panels such as that from the 1,000 Genomes Project enables more accurate imputation in general, and in particular for admixed populations and for uncommon variants. To efficiently benefit from these large reference panels, one key issue to consider in modern genotype imputation framework is the selection of effective reference panels. In this work, we consider a number of methods for effective reference panel construction inside a hidden Markov model and specific to each target individual. These methods fall into two categories: identity-by-state (IBS) based and ancestry-weighted approach. We evaluated the performance on individuals from recently admixed populations. Our target samples include 8,421 African Americans and 3,587 Hispanic Americans from the Women’s Health Initiative, which allow assessment of imputation quality for uncommon variants. Our experiments include both large and small reference panels; large, medium, and small target samples; and in genome regions of varying levels of LD. We also include BEAGLE and IMPUTE2 for comparison. Experiment results with large reference panel suggest that our novel piecewise IBS method yields consistently higher imputation quality than other methods/software. The advantage is particularly noteworthy among uncommon variants where we observe up to 5.1% information gain with the difference being highly significant (Wilcoxon signed rank test P-value < 0.0001). Our work is the first that considers various sensible approaches for imputation in admixed populations and presents a comprehensive comparison. PMID:23074066

  1. Spatial occupancy models for large data sets

    USGS Publications Warehouse

    Johnson, Devin S.; Conn, Paul B.; Hooten, Mevin B.; Ray, Justina C.; Pond, Bruce A.

    2013-01-01

    Since its development, occupancy modeling has become a popular and useful tool for ecologists wishing to learn about the dynamics of species occurrence over time and space. Such models require presence–absence data to be collected at spatially indexed survey units. However, only recently have researchers recognized the need to correct for spatially induced overdisperison by explicitly accounting for spatial autocorrelation in occupancy probability. Previous efforts to incorporate such autocorrelation have largely focused on logit-normal formulations for occupancy, with spatial autocorrelation induced by a random effect within a hierarchical modeling framework. Although useful, computational time generally limits such an approach to relatively small data sets, and there are often problems with algorithm instability, yielding unsatisfactory results. Further, recent research has revealed a hidden form of multicollinearity in such applications, which may lead to parameter bias if not explicitly addressed. Combining several techniques, we present a unifying hierarchical spatial occupancy model specification that is particularly effective over large spatial extents. This approach employs a probit mixture framework for occupancy and can easily accommodate a reduced-dimensional spatial process to resolve issues with multicollinearity and spatial confounding while improving algorithm convergence. Using open-source software, we demonstrate this new model specification using a case study involving occupancy of caribou (Rangifer tarandus) over a set of 1080 survey units spanning a large contiguous region (108 000 km2) in northern Ontario, Canada. Overall, the combination of a more efficient specification and open-source software allows for a facile and stable implementation of spatial occupancy models for large data sets.

  2. Analyzing hidden populations online: topic, emotion, and social network of HIV-related users in the largest Chinese online community.

    PubMed

    Liu, Chuchu; Lu, Xin

    2018-01-05

    Traditional survey methods are limited in the study of hidden populations due to the hard to access properties, including lack of a sampling frame, sensitivity issue, reporting error, small sample size, etc. The rapid increase of online communities, of which members interact with others via the Internet, have generated large amounts of data, offering new opportunities for understanding hidden populations with unprecedented sample sizes and richness of information. In this study, we try to understand the multidimensional characteristics of a hidden population by analyzing the massive data generated in the online community. By elaborately designing crawlers, we retrieved a complete dataset from the "HIV bar," the largest bar related to HIV on the Baidu Tieba platform, for all records from January 2005 to August 2016. Through natural language processing and social network analysis, we explored the psychology, behavior and demand of online HIV population and examined the network community structure. In HIV communities, the average topic similarity among members is positively correlated to network efficiency (r = 0.70, p < 0.001), indicating that the closer the social distance between members of the community, the more similar their topics. The proportion of negative users in each community is around 60%, weakly correlated with community size (r = 0.25, p = 0.002). It is found that users suspecting initial HIV infection or first in contact with high-risk behaviors tend to seek help and advice on the social networking platform, rather than immediately going to a hospital for blood tests. Online communities have generated copious amounts of data offering new opportunities for understanding hidden populations with unprecedented sample sizes and richness of information. It is recommended that support through online services for HIV/AIDS consultation and diagnosis be improved to avoid privacy concerns and social discrimination in China.

  3. The Physiological Bases of Hidden Noise-Induced Hearing Loss: Protocol for a Functional Neuroimaging Study

    PubMed Central

    Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T

    2018-01-01

    Background Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Objective Our Medical Research Council–funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Methods Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. Results This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. Conclusions This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. PMID:29523503

  4. Inferring the mesoscale structure of layered, edge-valued, and time-varying networks

    NASA Astrophysics Data System (ADS)

    Peixoto, Tiago P.

    2015-10-01

    Many network systems are composed of interdependent but distinct types of interactions, which cannot be fully understood in isolation. These different types of interactions are often represented as layers, attributes on the edges, or as a time dependence of the network structure. Although they are crucial for a more comprehensive scientific understanding, these representations offer substantial challenges. Namely, it is an open problem how to precisely characterize the large or mesoscale structure of network systems in relation to these additional aspects. Furthermore, the direct incorporation of these features invariably increases the effective dimension of the network description, and hence aggravates the problem of overfitting, i.e., the use of overly complex characterizations that mistake purely random fluctuations for actual structure. In this work, we propose a robust and principled method to tackle these problems, by constructing generative models of modular network structure, incorporating layered, attributed and time-varying properties, as well as a nonparametric Bayesian methodology to infer the parameters from data and select the most appropriate model according to statistical evidence. We show that the method is capable of revealing hidden structure in layered, edge-valued, and time-varying networks, and that the most appropriate level of granularity with respect to the additional dimensions can be reliably identified. We illustrate our approach on a variety of empirical systems, including a social network of physicians, the voting correlations of deputies in the Brazilian national congress, the global airport network, and a proximity network of high-school students.

  5. Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems.

    PubMed

    Choi, Sou-Cheng T; Saunders, Michael A

    2014-02-01

    We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP.

  6. Finding hidden periodic signals in time series - an application to stock prices

    NASA Astrophysics Data System (ADS)

    O'Shea, Michael

    2014-03-01

    Data in the form of time series appear in many areas of science. In cases where the periodicity is apparent and the only other contribution to the time series is stochastic in origin, the data can be `folded' to improve signal to noise and this has been done for light curves of variable stars with the folding resulting in a cleaner light curve signal. Stock index prices versus time are classic examples of time series. Repeating patterns have been claimed by many workers and include unusually large returns on small-cap stocks during the month of January, and small returns on the Dow Jones Industrial average (DJIA) in the months June through September compared to the rest of the year. Such observations imply that these prices have a periodic component. We investigate this for the DJIA. If such a component exists it is hidden in a large non-periodic variation and a large stochastic variation. We show how to extract this periodic component and for the first time reveal its yearly (averaged) shape. This periodic component leads directly to the `Sell in May and buy at Halloween' adage. We also drill down and show that this yearly variation emerges from approximately half of the underlying stocks making up the DJIA index.

  7. Nature's Mechanisms for Tough, Self-healing Polymers and Polymer Adhesives

    NASA Astrophysics Data System (ADS)

    Hansma, Paul

    2007-03-01

    Spider silk^2 and the natural polymer adhesives in abalone shells^3 and bone^4,5 can give us insights into nature's mechanisms for tough, self-healing polymers and polymer adhesives. The natural polymer adhesives in biomaterials have been optimized by evolution. An optimized polymer adhesive has five characteristics. 1) It holds together the strong elements of the composite. 2) It yields just before the strong elements would otherwise break. 3) It dissipates large amounts of energy as it yields. 4) It self heals after it yields. 5) It takes just a few percent by weight. Both natural polymer adhesives and silk rely on sacrificial bonds and hidden length for toughness and self-healing.^6 A relatively large energy, of order 100eV, is required to stretch a polymer molecule after a weak bond, a sacrificial bond, breaks and liberates hidden length, which was previously hidden, typically in a loop or folded domain, from whatever was stretching the polymer. The bond is called sacrificial if it breaks at forces well below the forces that could otherwise break the polymer backbone, typically greater than 1nN. In many biological cases, the breaking of sacrificial bonds has been found to be reversible, thereby also providing a ``self-healing'' property to the material.^2-4 Individual polymer adhesive molecules based on sacrificial bonds and hidden length can supply forces of order 300pN over distances of 100s of nanometers. Model calculations show that a few percent by weight of adhesives based on these principles could be optimized adhesives for high performance composite materials including nanotube and graphene sheet composites. ^2N. Becker, E. Oroudjev, S. Mutz et al., Nature Materials 2 (4), 278 (2003). ^3B. L. Smith, T. E. Schaffer, M. Viani et al., Nature 399 (6738), 761 (1999). ^4J. B. Thompson, J. H. Kindt, B. Drake et al., Nature 414 (6865), 773 (2001). ^5G. E. Fantner, T. Hassenkam, J. H. Kindt et al., Nature Materials 4, 612 (2005). ^6G. E. Fantner, E. Oroudjev, G. Schitter et al., Biophysical Journal 90 (4), 1411 (2006).

  8. The secret art of managing healthcare expenses: investigating implicit rationing and autonomy in public healthcare systems.

    PubMed

    Lauridsen, S M R; Norup, M S; Rossel, P J H

    2007-12-01

    Rationing healthcare is a difficult task, which includes preventing patients from accessing potentially beneficial treatments. Proponents of implicit rationing argue that politicians cannot resist pressure from strong patient groups for treatments and conclude that physicians should ration without informing patients or the public. The authors subdivide this specific programme of implicit rationing, or "hidden rationing", into local hidden rationing, unsophisticated global hidden rationing and sophisticated global hidden rationing. They evaluate the appropriateness of these methods of rationing from the perspectives of individual and political autonomy and conclude that local hidden rationing and unsophisticated global hidden rationing clearly violate patients' individual autonomy, that is, their right to participate in medical decision-making. While sophisticated global hidden rationing avoids this charge, the authors point out that it nonetheless violates the political autonomy of patients, that is, their right to engage in public affairs as citizens. A defence of any of the forms of hidden rationing is therefore considered to be incompatible with a defence of autonomy.

  9. Dissipative hidden sector dark matter

    NASA Astrophysics Data System (ADS)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  10. Clinical Holistic Medicine: A Psychological Theory of Dependency to Improve Quality of Life

    PubMed Central

    Ventegodt, Søren; Morad, Mohammed; Kandel, Isack; Merrick, Joav

    2004-01-01

    In this paper, we suggest a psychological theory of dependency as an escape from feeling existential suffering and a poor quality of life. The ways in which human beings escape hidden existential pains are multiple. The wide range of dependency states seems to be the most common escape strategy used. If the patient can be guided into the hidden existential pain to feel, understand, and integrate it, we believe that dependency can be cured. The problem is that the patient must be highly motivated, sufficiently resourceful, and supported to want such a treatment that is inherently painful. Often, the family and surrounding world is suffering more than the dependent person himself, because the pattern of behavior the patient is dependent on makes him or her rather insensitive and unable to feel. If the patient is motivated, resourceful, and trusts his physician, recovery from even a severe state of dependency is not out of reach, if the holistic medical tools are applied wisely. The patient must find hidden resources to take action, then in therapy confront and feel old emotional pain, understand the source and inner logic of it, and finally learn to let go of negative attitudes and beliefs. In this way, the person can be healed and released of the emotional suffering and no longer be a slave to the dependency pattern. PMID:15349506

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vongehr, Sascha, E-mail: vongehr@usc.edu

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability,more » and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs.« less

  12. Radar HRRP Target Recognition Based on Stacked Autoencoder and Extreme Learning Machine

    PubMed Central

    Liu, Yongxiang; Huo, Kai; Zhang, Zhongshuai

    2018-01-01

    A novel radar high-resolution range profile (HRRP) target recognition method based on a stacked autoencoder (SAE) and extreme learning machine (ELM) is presented in this paper. As a key component of deep structure, the SAE does not only learn features by making use of data, it also obtains feature expressions at different levels of data. However, with the deep structure, it is hard to achieve good generalization performance with a fast learning speed. ELM, as a new learning algorithm for single hidden layer feedforward neural networks (SLFNs), has attracted great interest from various fields for its fast learning speed and good generalization performance. However, ELM needs more hidden nodes than conventional tuning-based learning algorithms due to the random set of input weights and hidden biases. In addition, the existing ELM methods cannot utilize the class information of targets well. To solve this problem, a regularized ELM method based on the class information of the target is proposed. In this paper, SAE and the regularized ELM are combined to make full use of their advantages and make up for each of their shortcomings. The effectiveness of the proposed method is demonstrated by experiments with measured radar HRRP data. The experimental results show that the proposed method can achieve good performance in the two aspects of real-time and accuracy, especially when only a few training samples are available. PMID:29320453

  13. Radar HRRP Target Recognition Based on Stacked Autoencoder and Extreme Learning Machine.

    PubMed

    Zhao, Feixiang; Liu, Yongxiang; Huo, Kai; Zhang, Shuanghui; Zhang, Zhongshuai

    2018-01-10

    A novel radar high-resolution range profile (HRRP) target recognition method based on a stacked autoencoder (SAE) and extreme learning machine (ELM) is presented in this paper. As a key component of deep structure, the SAE does not only learn features by making use of data, it also obtains feature expressions at different levels of data. However, with the deep structure, it is hard to achieve good generalization performance with a fast learning speed. ELM, as a new learning algorithm for single hidden layer feedforward neural networks (SLFNs), has attracted great interest from various fields for its fast learning speed and good generalization performance. However, ELM needs more hidden nodes than conventional tuning-based learning algorithms due to the random set of input weights and hidden biases. In addition, the existing ELM methods cannot utilize the class information of targets well. To solve this problem, a regularized ELM method based on the class information of the target is proposed. In this paper, SAE and the regularized ELM are combined to make full use of their advantages and make up for each of their shortcomings. The effectiveness of the proposed method is demonstrated by experiments with measured radar HRRP data. The experimental results show that the proposed method can achieve good performance in the two aspects of real-time and accuracy, especially when only a few training samples are available.

  14. The ``Folk Theorem'' on effective field theory: How does it fare in nuclear physics?

    NASA Astrophysics Data System (ADS)

    Rho, Mannque

    2017-10-01

    This is a brief history of what I consider as very important, some of which truly seminal, contributions made by young Korean nuclear theorists, mostly graduate students working on PhD thesis in 1990s and early 2000s, to nuclear effective field theory, nowadays heralded as the first-principle approach to nuclear physics. The theoretical framework employed is an effective field theory anchored on a single scale-invariant hidden local symmetric Lagrangian constructed in the spirit of Weinberg's "Folk Theorem" on effective field theory. The problems addressed are the high-precision calculations on the thermal np capture, the solar pp fusion process, the solar hep process — John Bahcall's challenge to nuclear theorists — and the quenching of g A in giant Gamow-Teller resonances and the whopping enhancement of first-forbidden beta transitions relevant in astrophysical processes. Extending adventurously the strategy to a wild uncharted domain in which a systematic implementation of the "theorem" is far from obvious, the same effective Lagrangian is applied to the structure of compact stars. A surprising, unexpected, result on the properties of massive stars, totally different from what has been obtained up to day in the literature, is predicted, such as the precocious onset of conformal sound velocity together with a hint for the possible emergence in dense matter of hidden symmetries such as scale symmetry and hidden local symmetry.

  15. Two fast and accurate heuristic RBF learning rules for data classification.

    PubMed

    Rouhani, Modjtaba; Javan, Dawood S

    2016-03-01

    This paper presents new Radial Basis Function (RBF) learning methods for classification problems. The proposed methods use some heuristics to determine the spreads, the centers and the number of hidden neurons of network in such a way that the higher efficiency is achieved by fewer numbers of neurons, while the learning algorithm remains fast and simple. To retain network size limited, neurons are added to network recursively until termination condition is met. Each neuron covers some of train data. The termination condition is to cover all training data or to reach the maximum number of neurons. In each step, the center and spread of the new neuron are selected based on maximization of its coverage. Maximization of coverage of the neurons leads to a network with fewer neurons and indeed lower VC dimension and better generalization property. Using power exponential distribution function as the activation function of hidden neurons, and in the light of new learning approaches, it is proved that all data became linearly separable in the space of hidden layer outputs which implies that there exist linear output layer weights with zero training error. The proposed methods are applied to some well-known datasets and the simulation results, compared with SVM and some other leading RBF learning methods, show their satisfactory and comparable performance. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Quantum learning of classical stochastic processes: The completely positive realization problem

    NASA Astrophysics Data System (ADS)

    Monràs, Alex; Winter, Andreas

    2016-01-01

    Among several tasks in Machine Learning, a specially important one is the problem of inferring the latent variables of a system and their causal relations with the observed behavior. A paradigmatic instance of this is the task of inferring the hidden Markov model underlying a given stochastic process. This is known as the positive realization problem (PRP), [L. Benvenuti and L. Farina, IEEE Trans. Autom. Control 49(5), 651-664 (2004)] and constitutes a central problem in machine learning. The PRP and its solutions have far-reaching consequences in many areas of systems and control theory, and is nowadays an important piece in the broad field of positive systems theory. We consider the scenario where the latent variables are quantum (i.e., quantum states of a finite-dimensional system) and the system dynamics is constrained only by physical transformations on the quantum system. The observable dynamics is then described by a quantum instrument, and the task is to determine which quantum instrument — if any — yields the process at hand by iterative application. We take as a starting point the theory of quasi-realizations, whence a description of the dynamics of the process is given in terms of linear maps on state vectors and probabilities are given by linear functionals on the state vectors. This description, despite its remarkable resemblance with the hidden Markov model, or the iterated quantum instrument, is however devoid of any stochastic or quantum mechanical interpretation, as said maps fail to satisfy any positivity conditions. The completely positive realization problem then consists in determining whether an equivalent quantum mechanical description of the same process exists. We generalize some key results of stochastic realization theory, and show that the problem has deep connections with operator systems theory, giving possible insight to the lifting problem in quotient operator systems. Our results have potential applications in quantum machine learning, device-independent characterization and reverse-engineering of stochastic processes and quantum processors, and more generally, of dynamical processes with quantum memory [M. Guţă, Phys. Rev. A 83(6), 062324 (2011); M. Guţă and N. Yamamoto, e-print arXiv:1303.3771(2013)].

  17. Facilitating dynamo action via control of large-scale turbulence.

    PubMed

    Limone, A; Hatch, D R; Forest, C B; Jenko, F

    2012-12-01

    The magnetohydrodynamic dynamo effect is considered to be the major cause of magnetic field generation in geo- and astrophysical systems. Recent experimental and numerical results show that turbulence constitutes an obstacle to dynamos; yet its role in this context is not totally clear. Via numerical simulations, we identify large-scale turbulent vortices with a detrimental effect on the amplification of the magnetic field in a geometry of experimental interest and propose a strategy for facilitating the dynamo instability by manipulating these detrimental "hidden" dynamics.

  18. The Hidden Curriculum as Emancipatory and Non-Emancipatory Tools.

    ERIC Educational Resources Information Center

    Kanpol, Barry

    Moral values implied in school practices and policies constitute the "hidden curriculum." Because the hidden curriculum may promote certain moral values to students, teachers are partially responsible for the moral education of students. A component of the hidden curriculum, institutional political resistance, concerns teacher opposition to…

  19. Apollo 16: Nothing So Hidden

    NASA Technical Reports Server (NTRS)

    1972-01-01

    This film shows the landing and the three lunar traverses in the highland region of the moon, near the crater descartes. It includes an astronaut's eye view from the rover, lunar grand prix, discovery of the house-sized rock, lunar lift-off and eva 173,000 miles above the earth. Microphones and cameras in mission control record the emergency problem solving during the prelanding crisis and the reactions of scientists on earth as the astronauts explore the moon.

  20. Bayesian Recurrent Neural Network for Language Modeling.

    PubMed

    Chien, Jen-Tzung; Ku, Yuan-Chu

    2016-02-01

    A language model (LM) is calculated as the probability of a word sequence that provides the solution to word prediction for a variety of information systems. A recurrent neural network (RNN) is powerful to learn the large-span dynamics of a word sequence in the continuous space. However, the training of the RNN-LM is an ill-posed problem because of too many parameters from a large dictionary size and a high-dimensional hidden layer. This paper presents a Bayesian approach to regularize the RNN-LM and apply it for continuous speech recognition. We aim to penalize the too complicated RNN-LM by compensating for the uncertainty of the estimated model parameters, which is represented by a Gaussian prior. The objective function in a Bayesian classification network is formed as the regularized cross-entropy error function. The regularized model is constructed not only by calculating the regularized parameters according to the maximum a posteriori criterion but also by estimating the Gaussian hyperparameter by maximizing the marginal likelihood. A rapid approximation to a Hessian matrix is developed to implement the Bayesian RNN-LM (BRNN-LM) by selecting a small set of salient outer-products. The proposed BRNN-LM achieves a sparser model than the RNN-LM. Experiments on different corpora show the robustness of system performance by applying the rapid BRNN-LM under different conditions.

  1. Polsar Land Cover Classification Based on Hidden Polarimetric Features in Rotation Domain and Svm Classifier

    NASA Astrophysics Data System (ADS)

    Tao, C.-S.; Chen, S.-W.; Li, Y.-Z.; Xiao, S.-P.

    2017-09-01

    Land cover classification is an important application for polarimetric synthetic aperture radar (PolSAR) data utilization. Rollinvariant polarimetric features such as H / Ani / α / Span are commonly adopted in PolSAR land cover classification. However, target orientation diversity effect makes PolSAR images understanding and interpretation difficult. Only using the roll-invariant polarimetric features may introduce ambiguity in the interpretation of targets' scattering mechanisms and limit the followed classification accuracy. To address this problem, this work firstly focuses on hidden polarimetric feature mining in the rotation domain along the radar line of sight using the recently reported uniform polarimetric matrix rotation theory and the visualization and characterization tool of polarimetric coherence pattern. The former rotates the acquired polarimetric matrix along the radar line of sight and fully describes the rotation characteristics of each entry of the matrix. Sets of new polarimetric features are derived to describe the hidden scattering information of the target in the rotation domain. The latter extends the traditional polarimetric coherence at a given rotation angle to the rotation domain for complete interpretation. A visualization and characterization tool is established to derive new polarimetric features for hidden information exploration. Then, a classification scheme is developed combing both the selected new hidden polarimetric features in rotation domain and the commonly used roll-invariant polarimetric features with a support vector machine (SVM) classifier. Comparison experiments based on AIRSAR and multi-temporal UAVSAR data demonstrate that compared with the conventional classification scheme which only uses the roll-invariant polarimetric features, the proposed classification scheme achieves both higher classification accuracy and better robustness. For AIRSAR data, the overall classification accuracy with the proposed classification scheme is 94.91 %, while that with the conventional classification scheme is 93.70 %. Moreover, for multi-temporal UAVSAR data, the averaged overall classification accuracy with the proposed classification scheme is up to 97.08 %, which is much higher than the 87.79 % from the conventional classification scheme. Furthermore, for multitemporal PolSAR data, the proposed classification scheme can achieve better robustness. The comparison studies also clearly demonstrate that mining and utilization of hidden polarimetric features and information in the rotation domain can gain the added benefits for PolSAR land cover classification and provide a new vision for PolSAR image interpretation and application.

  2. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    NASA Astrophysics Data System (ADS)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  3. Domestic Violence between Same-Sex Partners: Implications for Counseling.

    ERIC Educational Resources Information Center

    Peterman, Linda M.; Dixon, Charlotte G.

    2003-01-01

    Discusses the dynamics of domestic violence between partners of the same sex. The social and cultural issues in the gay and lesbian communities play a large part in perpetuating the myths of domestic violence, which keeps the abuse hidden. This article is based on an extensive review of the literature and a clinical consensus among experts in the…

  4. JPRS Report, China.

    DTIC Science & Technology

    1991-12-03

    BANKING Hidden Financial Distribution [CAIMAO JINGJI No8] .................................... .. . .. .. 25 Guangxi Tax Chief on Using Tax Levers [GUANGXI...assets is confused. economy. They are of major importance in the invigo- Under the financial contracting system, the conflict ration of large and...to various economic levers and legal strictures state, and to change enterprises from appendages of the such as financial , fiscal, and tax policies

  5. Analysis of 3-D Tongue Motion from Tagged and Cine Magnetic Resonance Images

    ERIC Educational Resources Information Center

    Xing, Fangxu; Woo, Jonghye; Lee, Junghoon; Murano, Emi Z.; Stone, Maureen; Prince, Jerry L.

    2016-01-01

    Purpose: Measuring tongue deformation and internal muscle motion during speech has been a challenging task because the tongue deforms in 3 dimensions, contains interdigitated muscles, and is largely hidden within the vocal tract. In this article, a new method is proposed to analyze tagged and cine magnetic resonance images of the tongue during…

  6. Teaching as Jesus Making: The Hidden Curriculum of Christ in Schooling

    ERIC Educational Resources Information Center

    Burke, Kevin J.; Segall, Avner

    2015-01-01

    Background/Context: The ideas of teaching as salvation and teacher-as-martyr are not new concepts. Prior research, however, has largely failed to explore the historical and cultural religious roots that continue to inform the ways in which teachers are constructed. That is, though prior work has engaged with thinking about religion and thinking…

  7. The Haskins Optically Corrected Ultrasound System

    ERIC Educational Resources Information Center

    Whalen, D. H.; Iskarous, Khalil; Tiede, Mark K.; Ostry, David J.; Lehnert-LeHouillier, Heike; Vatikiotis-Bateson, Eric; Hailey, Donald S.

    2005-01-01

    The tongue is critical in the production of speech, yet its nature has made it difficult to measure. Not only does its ability to attain complex shapes make it difficult to track, it is also largely hidden from view during speech. The present article describes a new combination of optical tracking and ultrasound imaging that allows for a…

  8. A Gay Immigrant Student's Perspective: Unspeakable Acts in the Language Class

    ERIC Educational Resources Information Center

    Nelson, Cynthia D.

    2010-01-01

    This article focuses on a subset of the student cohort that has, until recently, been largely hidden from view in the literature of language education: gay immigrants. Little is known about what sorts of classroom experiences gay immigrant students find engaging or alienating, or why this sort of knowledge is needed. This case study uses interview…

  9. The Resegregation of Suburban Schools: A Hidden Crisis in American Education

    ERIC Educational Resources Information Center

    Frankenberg, Erica, Ed.; Orfield, Gary, Ed.

    2012-01-01

    "The United States today is a suburban nation that thinks of race as an urban issue, and often assumes that it has been largely solved," write the editors of this groundbreaking and passionately argued book. They show that the locus of racial and ethnic transformation is now clearly suburban and illustrate patterns of demographic change…

  10. Building Communities of Learners. A Collaboration among Teachers, Students, Families, and Community.

    ERIC Educational Resources Information Center

    McCaleb, Sudia Paloma

    This book suggests an approach to education that includes students' family members as valuable citizens in a community of learners which also includes students, teachers, and other members of the community at large. Part 1 examines current trends in parental involvement and the hidden assumptions on which many such programs are based. It is argued…

  11. Educators vs. Entrepreneurs: Traits and Bias in the Teaching of SWOT

    ERIC Educational Resources Information Center

    Clark, Andre

    2011-01-01

    A study of the marks allocated by 10 tutors to 263 students' SWOT (Strengths, Weaknesses, Opportunities, Threats) analyses on a range of business education courses reveals a largely hidden assumption regarding the balance of the four factors. To investigate the significance of this in light of the suggestion in the trait literature that…

  12. Training, Sharing or Cheating? Gamer Strategies to Get a Digital Upper Hand

    ERIC Educational Resources Information Center

    Mortensen, Torill Elvira

    2010-01-01

    Digital game-players devote a large amount of their time to discovering rules hidden in the code and discoverable through empirical study, experiments, and developing or rediscovering the mathematical formulae governing the code. They do this through their own independent play as they test areas, gear and abilities, through data mining using…

  13. A Quantitative Analysis of Organizational Factors That Relate to Data Mining Success

    ERIC Educational Resources Information Center

    Huebner, Richard A.

    2017-01-01

    The ubiquity of data in various forms has fueled the need for advanced data-mining techniques within organizations. The advent of data mining methods used to uncover hidden nuggets of information buried within large data sets has also fueled the need for determining how these unique projects can be successful. There are many challenges associated…

  14. Greater Equality: The Hidden Key to Better Health and Higher Scores

    ERIC Educational Resources Information Center

    Wilkinson, Richard; Pickett, Kate

    2011-01-01

    There are now many studies of income inequality and health that compare countries, American states, or other large regions, and the majority of these studies show that more egalitarian societies tend to be healthier. Inequality is associated with lower life expectancy, higher rates of infant mortality, shorter height, poor self-reported health,…

  15. A new Philautus (Anura: Rhacophoridae) from northern Laos allied to P. abditus Inger, Orlov & Darevsky, 1999.

    PubMed

    Stuart, Bryan L; Phimmachak, Somphouthone; Seateun, Sengvilay; Sheridan, Jennifer A

    2013-12-03

    The small rhacophorid frog Philautus abditus is geographically restricted to central Vietnam and adjacent Cambodia. Our fieldwork in northern Laos resulted in the discovery of a Philautus species that very closely resembles P. abditus, but is at least 330 km from the nearest known locality of that species. The Laos population differs from P. abditus in mitochondrial DNA and coloration, and is described here as a new species. Philautus nianeae sp. nov. is distinguished from its congeners by having the combination of a hidden tympanum; no nuptial pads; smooth skin; large black spots on the hidden surfaces of the hind limbs; light venter with dark spotting; and a bronze iris. A second species of Philautus from northern Laos, P. petilus, is transferred on the basis of morphology to the genus Theloderma. 

  16. Stylistic gait synthesis based on hidden Markov models

    NASA Astrophysics Data System (ADS)

    Tilmanne, Joëlle; Moinet, Alexis; Dutoit, Thierry

    2012-12-01

    In this work we present an expressive gait synthesis system based on hidden Markov models (HMMs), following and modifying a procedure originally developed for speaking style adaptation, in speech synthesis. A large database of neutral motion capture walk sequences was used to train an HMM of average walk. The model was then used for automatic adaptation to a particular style of walk using only a small amount of training data from the target style. The open source toolkit that we adapted for motion modeling also enabled us to take into account the dynamics of the data and to model accurately the duration of each HMM state. We also address the assessment issue and propose a procedure for qualitative user evaluation of the synthesized sequences. Our tests show that the style of these sequences can easily be recognized and look natural to the evaluators.

  17. Improving the performance of extreme learning machine for hyperspectral image classification

    NASA Astrophysics Data System (ADS)

    Li, Jiaojiao; Du, Qian; Li, Wei; Li, Yunsong

    2015-05-01

    Extreme learning machine (ELM) and kernel ELM (KELM) can offer comparable performance as the standard powerful classifier―support vector machine (SVM), but with much lower computational cost due to extremely simple training step. However, their performance may be sensitive to several parameters, such as the number of hidden neurons. An empirical linear relationship between the number of training samples and the number of hidden neurons is proposed. Such a relationship can be easily estimated with two small training sets and extended to large training sets so as to greatly reduce computational cost. Other parameters, such as the steepness parameter in the sigmodal activation function and regularization parameter in the KELM, are also investigated. The experimental results show that classification performance is sensitive to these parameters; fortunately, simple selections will result in suboptimal performance.

  18. --No Title--

    Science.gov Websites

    ;height:auto;overflow:hidden}.poc_table .top_row{background-color:#eee;height:auto;overflow:hidden}.poc_table ;background-color:#FFF;height:auto;overflow:hidden;border-top:1px solid #ccc}.poc_table .main_row .name :200px;padding:5px;height:auto;overflow:hidden}.tli_grey_box{background-color:#eaeaea;text-align:center

  19. Game-theoretic cooperativity in networks of self-interested units

    NASA Astrophysics Data System (ADS)

    Barto, Andrew G.

    1986-08-01

    The behavior of theoretical neural networks is often described in terms of competition and cooperation. I present an approach to network learning that is related to game and team problems in which competition and cooperation have more technical meanings. I briefly describe the application of stochastic learning automata to game and team problems and then present an adaptive element that is a synthesis of aspects of stochastic learning automata and typical neuron-like adaptive elements. These elements act as self-interested agents that work toward improving their performance with respect to their individual preference orderings. Networks of these elements can solve a variety of team decision problems, some of which take the form of layered networks in which the ``hidden units'' become appropriate functional components as they attempt to improve their own payoffs.

  20. Neural architecture design based on extreme learning machine.

    PubMed

    Bueno-Crespo, Andrés; García-Laencina, Pedro J; Sancho-Gómez, José-Luis

    2013-12-01

    Selection of the optimal neural architecture to solve a pattern classification problem entails to choose the relevant input units, the number of hidden neurons and its corresponding interconnection weights. This problem has been widely studied in many research works but their solutions usually involve excessive computational cost in most of the problems and they do not provide a unique solution. This paper proposes a new technique to efficiently design the MultiLayer Perceptron (MLP) architecture for classification using the Extreme Learning Machine (ELM) algorithm. The proposed method provides a high generalization capability and a unique solution for the architecture design. Moreover, the selected final network only retains those input connections that are relevant for the classification task. Experimental results show these advantages. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Natural hidden antibodies reacting with DNA or cardiolipin bind to thymocytes and evoke their death.

    PubMed

    Zamulaeva, I A; Lekakh, I V; Kiseleva, V I; Gabai, V L; Saenko, A S; Shevchenko, A S; Poverenny, A M

    1997-08-18

    Both free and hidden natural antibodies to DNA or cardiolipin were obtained from immunoglobulins of a normal donor. The free antibodies reacting with DNA or cardiolipin were isolated by means of affinity chromatography. Antibodies occurring in an hidden state were disengaged from the depleted immunoglobulins by ion-exchange chromatography and were then affinity-isolated on DNA or cardiolipin sorbents. We used flow cytometry to study the ability of free and hidden antibodies to bind to rat thymocytes. Simultaneously, plasma membrane integrity was tested by propidium iodide (PI) exclusion. The hidden antibodies reacted with 65.2 +/- 10.9% of the thymocytes and caused a fast plasma membrane disruption. Cells (28.7 +/- 7.1%) were stained with PI after incubation with the hidden antibodies for 1 h. The free antibodies bound to a very small fraction of the thymocytes and did not evoke death as compared to control without antibodies. The possible reason for the observed effects is difference in reactivity of the free and hidden antibodies to phospholipids. While free antibodies reacted preferentially with phosphotidylcholine, hidden antibodies reacted with cardiolipin and phosphotidylserine.

  2. Smart aircraft fastener evaluation (SAFE) system: a condition-based corrosion detection system for aging aircraft

    NASA Astrophysics Data System (ADS)

    Schoess, Jeffrey N.; Seifert, Greg; Paul, Clare A.

    1996-05-01

    The smart aircraft fastener evaluation (SAFE) system is an advanced structural health monitoring effort to detect and characterize corrosion in hidden and inaccessible locations of aircraft structures. Hidden corrosion is the number one logistics problem for the U.S. Air Force, with an estimated maintenance cost of $700M per year in 1990 dollars. The SAFE system incorporates a solid-state electrochemical microsensor and smart sensor electronics in the body of a Hi-Lok aircraft fastener to process and autonomously report corrosion status to aircraft maintenance personnel. The long-term payoff for using SAFE technology will be in predictive maintenance for aging aircraft and rotorcraft systems, fugitive emissions applications such as control valves, chemical pipeline vessels, and industrial boilers. Predictive maintenance capability, service, and repair will replace the current practice of scheduled maintenance to substantially reduce operational costs. A summary of the SAFE concept, laboratory test results, and future field test plans is presented.

  3. Hamiltonian dynamics of a quantum of space: hidden symmetries and spectrum of the volume operator, and discrete orthogonal polynomials

    NASA Astrophysics Data System (ADS)

    Aquilanti, Vincenzo; Marinelli, Dimitri; Marzuoli, Annalisa

    2013-05-01

    The action of the quantum mechanical volume operator, introduced in connection with a symmetric representation of the three-body problem and recently recognized to play a fundamental role in discretized quantum gravity models, can be given as a second-order difference equation which, by a complex phase change, we turn into a discrete Schrödinger-like equation. The introduction of discrete potential-like functions reveals the surprising crucial role here of hidden symmetries, first discovered by Regge for the quantum mechanical 6j symbols; insight is provided into the underlying geometric features. The spectrum and wavefunctions of the volume operator are discussed from the viewpoint of the Hamiltonian evolution of an elementary ‘quantum of space’, and a transparent asymptotic picture of the semiclassical and classical regimes emerges. The definition of coordinates adapted to the Regge symmetry is exploited for the construction of a novel set of discrete orthogonal polynomials, characterizing the oscillatory components of torsion-like modes.

  4. Maximum mutual information estimation of a simplified hidden MRF for offline handwritten Chinese character recognition

    NASA Astrophysics Data System (ADS)

    Xiong, Yan; Reichenbach, Stephen E.

    1999-01-01

    Understanding of hand-written Chinese characters is at such a primitive stage that models include some assumptions about hand-written Chinese characters that are simply false. So Maximum Likelihood Estimation (MLE) may not be an optimal method for hand-written Chinese characters recognition. This concern motivates the research effort to consider alternative criteria. Maximum Mutual Information Estimation (MMIE) is an alternative method for parameter estimation that does not derive its rationale from presumed model correctness, but instead examines the pattern-modeling problem in automatic recognition system from an information- theoretic point of view. The objective of MMIE is to find a set of parameters in such that the resultant model allows the system to derive from the observed data as much information as possible about the class. We consider MMIE for recognition of hand-written Chinese characters using on a simplified hidden Markov Random Field. MMIE provides improved performance improvement over MLE in this application.

  5. Utterance independent bimodal emotion recognition in spontaneous communication

    NASA Astrophysics Data System (ADS)

    Tao, Jianhua; Pan, Shifeng; Yang, Minghao; Li, Ya; Mu, Kaihui; Che, Jianfeng

    2011-12-01

    Emotion expressions sometimes are mixed with the utterance expression in spontaneous face-to-face communication, which makes difficulties for emotion recognition. This article introduces the methods of reducing the utterance influences in visual parameters for the audio-visual-based emotion recognition. The audio and visual channels are first combined under a Multistream Hidden Markov Model (MHMM). Then, the utterance reduction is finished by finding the residual between the real visual parameters and the outputs of the utterance related visual parameters. This article introduces the Fused Hidden Markov Model Inversion method which is trained in the neutral expressed audio-visual corpus to solve the problem. To reduce the computing complexity the inversion model is further simplified to a Gaussian Mixture Model (GMM) mapping. Compared with traditional bimodal emotion recognition methods (e.g., SVM, CART, Boosting), the utterance reduction method can give better results of emotion recognition. The experiments also show the effectiveness of our emotion recognition system when it was used in a live environment.

  6. Integrating Decision Tree and Hidden Markov Model (HMM) for Subtype Prediction of Human Influenza A Virus

    NASA Astrophysics Data System (ADS)

    Attaluri, Pavan K.; Chen, Zhengxin; Weerakoon, Aruna M.; Lu, Guoqing

    Multiple criteria decision making (MCDM) has significant impact in bioinformatics. In the research reported here, we explore the integration of decision tree (DT) and Hidden Markov Model (HMM) for subtype prediction of human influenza A virus. Infection with influenza viruses continues to be an important public health problem. Viral strains of subtype H3N2 and H1N1 circulates in humans at least twice annually. The subtype detection depends mainly on the antigenic assay, which is time-consuming and not fully accurate. We have developed a Web system for accurate subtype detection of human influenza virus sequences. The preliminary experiment showed that this system is easy-to-use and powerful in identifying human influenza subtypes. Our next step is to examine the informative positions at the protein level and extend its current functionality to detect more subtypes. The web functions can be accessed at http://glee.ist.unomaha.edu/.

  7. Passive acoustic leak detection for sodium cooled fast reactors using hidden Markov models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Riber Marklund, A.; Kishore, S.; Prakash, V.

    2015-07-01

    Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970's and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), themore » proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control. (authors)« less

  8. Making better decisions in groups

    PubMed Central

    Frith, Chris D.

    2017-01-01

    We review the literature to identify common problems of decision-making in individuals and groups. We are guided by a Bayesian framework to explain the interplay between past experience and new evidence, and the problem of exploring the space of hypotheses about all the possible states that the world could be in and all the possible actions that one could take. There are strong biases, hidden from awareness, that enter into these psychological processes. While biases increase the efficiency of information processing, they often do not lead to the most appropriate action. We highlight the advantages of group decision-making in overcoming biases and searching the hypothesis space for good models of the world and good solutions to problems. Diversity of group members can facilitate these achievements, but diverse groups also face their own problems. We discuss means of managing these pitfalls and make some recommendations on how to make better group decisions. PMID:28878973

  9. Pre-service teachers’ challenges in presenting mathematical problems

    NASA Astrophysics Data System (ADS)

    Desfitri, R.

    2018-01-01

    The purpose of this study was to analyzed how pre-service teachers prepare and assigned tasks or assignments in teaching practice situations. This study was also intended to discuss about kind of tasks or assignments they gave to students. Participants of this study were 15 selected pre-service mathematics teachers from mathematics education department who took part on microteaching class as part of teaching preparation program. Based on data obtained, it was occasionally found that there were hidden errors on questions or tasks assigned by pre-service teachers which might lead their students not to be able to reach a logical or correct answer. Although some answers might seem to be true, they were illogical or unfavourable. It is strongly recommended that pre-service teachers be more careful when posing mathematical problems so that students do not misunderstand the problems or the concepts, since both teachers and students were sometimes unaware of errors in problems being worked on.

  10. What if ? On alternative conceptual models and the problem of their implementation

    NASA Astrophysics Data System (ADS)

    Neuberg, Jurgen

    2015-04-01

    Seismic and other monitoring techniques rely on a set of conceptual models on the base of which data sets can be interpreted. In order to do this on an operational level in volcano observatories these models need to be tested and ready for an interpretation in a timely manner. Once established, scientists in charge advising stakeholders and decision makers often stick firmly to these models to avoid confusion by giving alternative versions of interpretations to non-experts. This talk gives an overview of widely accepted conceptual models to interpret seismic and deformation data, and highlights in a few case studies some of the arising problems. Aspects covered include knowledge transfer between research institutions and observatories, data sharing, the problem of up-taking advice, and some hidden problems which turn out to be much more critical in assessing volcanic hazard than the actual data interpretation.

  11. Learning and optimization with cascaded VLSI neural network building-block chips

    NASA Technical Reports Server (NTRS)

    Duong, T.; Eberhardt, S. P.; Tran, M.; Daud, T.; Thakoor, A. P.

    1992-01-01

    To demonstrate the versatility of the building-block approach, two neural network applications were implemented on cascaded analog VLSI chips. Weights were implemented using 7-b multiplying digital-to-analog converter (MDAC) synapse circuits, with 31 x 32 and 32 x 32 synapses per chip. A novel learning algorithm compatible with analog VLSI was applied to the two-input parity problem. The algorithm combines dynamically evolving architecture with limited gradient-descent backpropagation for efficient and versatile supervised learning. To implement the learning algorithm in hardware, synapse circuits were paralleled for additional quantization levels. The hardware-in-the-loop learning system allocated 2-5 hidden neurons for parity problems. Also, a 7 x 7 assignment problem was mapped onto a cascaded 64-neuron fully connected feedback network. In 100 randomly selected problems, the network found optimal or good solutions in most cases, with settling times in the range of 7-100 microseconds.

  12. Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems

    PubMed Central

    Choi, Sou-Cheng T.; Saunders, Michael A.

    2014-01-01

    We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP. PMID:25328255

  13. Heating up the Galaxy with hidden photons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dubovsky, Sergei; Hernández-Chifflet, Guzmán, E-mail: dubovsky@nyu.edu, E-mail: ghc236@nyu.edu

    2015-12-01

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less

  14. Heating up the Galaxy with hidden photons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dubovsky, Sergei; Hernández-Chifflet, Guzmán; Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less

  15. Weakly supervised visual dictionary learning by harnessing image attributes.

    PubMed

    Gao, Yue; Ji, Rongrong; Liu, Wei; Dai, Qionghai; Hua, Gang

    2014-12-01

    Bag-of-features (BoFs) representation has been extensively applied to deal with various computer vision applications. To extract discriminative and descriptive BoF, one important step is to learn a good dictionary to minimize the quantization loss between local features and codewords. While most existing visual dictionary learning approaches are engaged with unsupervised feature quantization, the latest trend has turned to supervised learning by harnessing the semantic labels of images or regions. However, such labels are typically too expensive to acquire, which restricts the scalability of supervised dictionary learning approaches. In this paper, we propose to leverage image attributes to weakly supervise the dictionary learning procedure without requiring any actual labels. As a key contribution, our approach establishes a generative hidden Markov random field (HMRF), which models the quantized codewords as the observed states and the image attributes as the hidden states, respectively. Dictionary learning is then performed by supervised grouping the observed states, where the supervised information is stemmed from the hidden states of the HMRF. In such a way, the proposed dictionary learning approach incorporates the image attributes to learn a semantic-preserving BoF representation without any genuine supervision. Experiments in large-scale image retrieval and classification tasks corroborate that our approach significantly outperforms the state-of-the-art unsupervised dictionary learning approaches.

  16. Explicit Computations of Instantons and Large Deviations in Beta-Plane Turbulence

    NASA Astrophysics Data System (ADS)

    Laurie, J.; Bouchet, F.; Zaboronski, O.

    2012-12-01

    We use a path integral formalism and instanton theory in order to make explicit analytical predictions about large deviations and rare events in beta-plane turbulence. The path integral formalism is a concise way to get large deviation results in dynamical systems forced by random noise. In the most simple cases, it leads to the same results as the Freidlin-Wentzell theory, but it has a wider range of applicability. This approach is however usually extremely limited, due to the complexity of the theoretical problems. As a consequence it provides explicit results in a fairly limited number of models, often extremely simple ones with only a few degrees of freedom. Few exception exist outside the realm of equilibrium statistical physics. We will show that the barotropic model of beta-plane turbulence is one of these non-equilibrium exceptions. We describe sets of explicit solutions to the instanton equation, and precise derivations of the action functional (or large deviation rate function). The reason why such exact computations are possible is related to the existence of hidden symmetries and conservation laws for the instanton dynamics. We outline several applications of this apporach. For instance, we compute explicitly the very low probability to observe flows with an energy much larger or smaller than the typical one. Moreover, we consider regimes for which the system has multiple attractors (corresponding to different numbers of alternating jets), and discuss the computation of transition probabilities between two such attractors. These extremely rare events are of the utmost importance as the dynamics undergo qualitative macroscopic changes during such transitions.

  17. Spyware.

    PubMed

    Bergren, Martha Dewey

    2004-10-01

    School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it is a problem, how it is transmitted to a personal or business computer, how to prevent spyware infestation, and how to delete it.

  18. Connectionism and Compositional Semantics

    DTIC Science & Technology

    1989-05-01

    can use their hidden layers to learn difficult discriminations. such as panty or the Penzias two clumps/three clumps problem, where the output is...sauce." For novel sentences that are similar to the training sentences (e.g., train on "the girl hit the boy," test on -the boy hit the girl "), the...overridden by semantic considerations. as in this example from Wendy Lehnert (personal communicanon): (5) John saw the girl with the telescope in a red

  19. Eating disorders: a hidden phenomenon in outpatient mental health?

    PubMed

    Fursland, Anthea; Watson, Hunna J

    2014-05-01

    Eating disorders are common but underdiagnosed illnesses. Help-seeking for co-occurring issues, such as anxiety and depression, are common. To identify the prevalence of eating problems, using the SCOFF, and eating disorders when screening positive on the SCOFF (i.e., ≥2), among patients seeking help for anxiety and depression at a community-based mental health service. Patients (N = 260) consecutively referred and assessed for anxiety and depression treatment were administered the SCOFF screening questionnaire and a semi-structured standardized diagnostic interview during routine intake. 18.5% (48/260) scored ≥2 on the SCOFF, indicating eating problems. Of these, 41% (19/48) met criteria for an eating disorder. Thus, overall, 7.3% (19/260) of the sample met criteria for a DSM-IV eating disorder. Those scoring ≥2 on the SCOFF were more likely to: be female (p = 0.001), younger (p = 0.003), and have a history of self-harm (p < 0.001). This study confirms that eating disorders are a hidden phenomenon in general outpatient mental health. By using a standardized diagnostic interview to establish diagnosis rather than self- or staff-report, the study builds on limited previous findings. The naturalistic study setting shows that screening for eating disorders can be easily built into routine intake practice, and successfully identifies treatment need. Copyright © 2013 Wiley Periodicals, Inc.

  20. Improved Leg Tracking Considering Gait Phase and Spline-Based Interpolation during Turning Motion in Walk Tests.

    PubMed

    Yorozu, Ayanori; Moriguchi, Toshiki; Takahashi, Masaki

    2015-09-04

    Falling is a common problem in the growing elderly population, and fall-risk assessment systems are needed for community-based fall prevention programs. In particular, the timed up and go test (TUG) is the clinical test most often used to evaluate elderly individual ambulatory ability in many clinical institutions or local communities. This study presents an improved leg tracking method using a laser range sensor (LRS) for a gait measurement system to evaluate the motor function in walk tests, such as the TUG. The system tracks both legs and measures the trajectory of both legs. However, both legs might be close to each other, and one leg might be hidden from the sensor. This is especially the case during the turning motion in the TUG, where the time that a leg is hidden from the LRS is longer than that during straight walking and the moving direction rapidly changes. These situations are likely to lead to false tracking and deteriorate the measurement accuracy of the leg positions. To solve these problems, a novel data association considering gait phase and a Catmull-Rom spline-based interpolation during the occlusion are proposed. From the experimental results with young people, we confirm   that the proposed methods can reduce the chances of false tracking. In addition, we verify the measurement accuracy of the leg trajectory compared to a three-dimensional motion analysis system (VICON).

  1. Modeling volatility using state space models.

    PubMed

    Timmer, J; Weigend, A S

    1997-08-01

    In time series problems, noise can be divided into two categories: dynamic noise which drives the process, and observational noise which is added in the measurement process, but does not influence future values of the system. In this framework, we show that empirical volatilities (the squared relative returns of prices) exhibit a significant amount of observational noise. To model and predict their time evolution adequately, we estimate state space models that explicitly include observational noise. We obtain relaxation times for shocks in the logarithm of volatility ranging from three weeks (for foreign exchange) to three to five months (for stock indices). In most cases, a two-dimensional hidden state is required to yield residuals that are consistent with white noise. We compare these results with ordinary autoregressive models (without a hidden state) and find that autoregressive models underestimate the relaxation times by about two orders of magnitude since they do not distinguish between observational and dynamic noise. This new interpretation of the dynamics of volatility in terms of relaxators in a state space model carries over to stochastic volatility models and to GARCH models, and is useful for several problems in finance, including risk management and the pricing of derivative securities. Data sets used: Olsen & Associates high frequency DEM/USD foreign exchange rates (8 years). Nikkei 225 index (40 years). Dow Jones Industrial Average (25 years).

  2. "It's Not Always What It Seems": Exploring the Hidden Curriculum within a Doctoral Program

    ERIC Educational Resources Information Center

    Foot, Rachel Elizabeth

    2017-01-01

    The purpose of this qualitative, naturalistic study was to explore the ways in which hidden curriculum might influence doctoral student success. Two questions guided the study: (a) How do doctoral students experience the hidden curriculum? (b) What forms of hidden curricula can be identified in a PhD program? Data were collected from twelve…

  3. The hidden and informal curriculum across the continuum of training: A cross-sectional qualitative study.

    PubMed

    Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary

    2016-04-01

    The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.

  4. The hidden and informal curriculum across the continuum of training: A cross-sectional qualitative study.

    PubMed

    Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary

    2016-01-01

    The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.

  5. Hidden Farmworker Labor Camps in North Carolina: An Indicator of Structural Vulnerability

    PubMed Central

    Summers, Phillip; Quandt, Sara A.; Talton, Jennifer W.; Galván, Leonardo

    2015-01-01

    Objectives. We used geographic information systems (GIS) to delineate whether farmworker labor camps were hidden and to determine whether hidden camps differed from visible camps in terms of physical and resident characteristics. Methods. We collected data using observation, interview, and public domain GIS data for 180 farmworker labor camps in east central North Carolina. A hidden camp was defined as one that was at least 0.15 miles from an all-weather road or located behind natural or manufactured objects. Hidden camps were compared with visible camps in terms of physical and resident characteristics. Results. More than one third (37.8%) of the farmworker labor camps were hidden. Hidden camps were significantly larger (42.7% vs 17.0% with 21 or more residents; P ≤ .001; and 29.4% vs 13.5% with 3 or more dwellings; P = .002) and were more likely to include barracks (50% vs 19.6%; P ≤ .001) than were visible camps. Conclusions. Poor housing conditions in farmworker labor camps often go unnoticed because they are hidden in the rural landscape, increasing farmworker vulnerability. Policies that promote greater community engagement with farmworker labor camp residents to reduce structural vulnerability should be considered. PMID:26469658

  6. Preliminary geologic map of the Sleeping Butte volcanic centers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crowe, B.M.; Perry, F.V.

    1991-07-01

    The Sleeping Butte volcanic centers comprise two, spatially separate, small-volume (<0.1 km{sup 3}) basaltic centers. The centers were formed by mildly explosive Strombolian eruptions. The Little Black Peak cone consists of a main scoria cone, two small satellitic scoria mounds, and associated lobate lava flows that vented from sites at the base of the scoria cone. The Hidden Cone center consists of a main scoria cone that developed on the north-facing slope of Sleeping Butte. The center formed during two episodes. The first included the formation of the main scoria cone, and venting of aa lava flows from radial dikesmore » at the northeast base of the cone. The second included eruption of scoria-fall deposits from the summit crater. The ages of the Little Black Peak and the Hidden Cone are estimated to be between 200 to 400 ka based on the whole-rock K-Ar age determinations with large analytical undertainty. This age assignment is consistent with qualitative observations of the degree of soil development and geomorphic degradation of volcanic landforms. The younger episode of the Hidden Cone is inferred to be significantly younger and probably of Late Pleistocene or Holocene age. This is based on the absence of cone slope rilling, the absence of cone-slope apron deposits, and erosional unconformity between the two episodes, the poor horizon- development of soils, and the presence of fall deposits on modern alluvial surfaces. Paleomagnetic data show that the centers record similar but not identical directions of remanent magnetization. Paleomagnetic data have not been obtained for the youngest deposits of the Hidden Cone center. Further geochronology, soils, geomorphic, and petrology studies are planned of the Sleeping Butte volcanic centers 20 refs., 3 figs.« less

  7. Detection of Objects Hidden in Highly Scattering Media Using Time-Gated Imaging Methods

    NASA Technical Reports Server (NTRS)

    Galland, Pierre A.; Wang, L.; Liang, X.; Ho, P. P.; Alfano, R. R.

    2000-01-01

    Non-intrusive and non-invasive optical imaging techniques has generated great interest among researchers for their potential applications to biological study, device characterization, surface defect detection, and jet fuel dynamics. Non-linear optical parametric amplification gate (NLOPG) has been used to detect back-scattered images of objects hidden in diluted Intralipid solutions. To directly detect objects hidden in highly scattering media, the diffusive component of light needs to be sorted out from early arrived ballistic and snake photons. In an optical imaging system, images are collected in transmission or back-scattered geometry. The early arrival photons in the transmission approach, always carry the direct information of the hidden object embedded in the turbid medium. In the back-scattered approach, the result is not so forth coming. In the presence of a scattering host, the first arrival photons in back-scattered approach will be directly photons from the host material. In the presentation, NLOPG was applied to acquire time resolved back-scattered images under the phase matching condition. A time-gated amplified signal was obtained through this NLOPG process. The system's gain was approximately 100 times. The time-gate was achieved through phase matching condition where only coherent photons retain their phase. As a result, the diffusive photons, which were the primary contributor to the background, were removed. With a large dynamic range and high resolution, time-gated early light imaging has the potential for improving rocket/aircraft design by determining jets shape and particle sizes. Refinements to these techniques may enable drop size measurements in the highly scattering, optically dense region of multi-element rocket injectors. These types of measurements should greatly enhance the design of stable, and higher performing rocket engines.

  8. Clustering Patterns of Engagement in Massive Open Online Courses (MOOCs): The Use of Learning Analytics to Reveal Student Categories

    ERIC Educational Resources Information Center

    Khalil, Mohammad; Ebner, Martin

    2017-01-01

    Massive Open Online Courses (MOOCs) are remote courses that excel in their students' heterogeneity and quantity. Due to the peculiarity of being massiveness, the large datasets generated by MOOC platforms require advanced tools and techniques to reveal hidden patterns for purposes of enhancing learning and educational behaviors. This publication…

  9. Lessons in Leadership: Executive Leadership Programs for Advancing Diversity in Higher Education. Diversity in Higher Education. Volume 5

    ERIC Educational Resources Information Center

    Leon, David, Ed.

    2005-01-01

    A largely unseen phenomenon is shaping the direction of higher education today: the growth of leadership programs. These programs are hidden ladders that help the talented move up toward university presidencies. Their number and importance are rapidly increasing, and they will more and more determine who makes decisions in higher education. More…

  10. Effects of visual silhouette, leaf size and host species on feeding preference by adult emerald ash borer, Agrilus planipennis Fairmaire (Coleoptera: Buprestidae)

    Treesearch

    Deepa S. Pureswaran; Therese M. Poland

    2009-01-01

    The emerald ash borer, Agrilus planipennis Fairmaire (Coleoptera: Buprestidae) is an invasive species recently established in North America. In large arena bioassays, when given a choice among live green ash, Fraxinus pennsylvanica Marsh and artificial ash saplings that were hidden or exposed from view, beetles preferred live...

  11. Uncovering a Hidden Professional Agenda for Teacher Educators: A Mixed Method Study on Flemish Teacher Educators and Their Professional Development

    ERIC Educational Resources Information Center

    Tack, Hanne; Valcke, Martin; Rots, Isabel; Struyven, Katrien; Vanderlinde, Ruben

    2018-01-01

    Taking into account the pressing need to understand more about what teacher educators' professional development characterises, this article adopts a mixed method approach to explore Flemish (Dutch-speaking part of Belgium) teacher educators' professional development needs and opportunities. Analysis results of a large-scale survey study with 611…

  12. Illusions of Compliance: Performing the Public and Hidden Transcripts of Social Justice Education in Neoliberal Times

    ERIC Educational Resources Information Center

    Sonu, Debbie

    2012-01-01

    From a yearlong qualitative study, I propose an explanation for the growing frustration amongst educators and students who find their imaginings for a social justice education largely unmet, if not deliberately crushed, in the public school classroom. I argue that competing conceptions of social justice manifest as public performances as well as…

  13. A Multiscale Vision Model applied to analyze EIT images of the solar corona

    NASA Astrophysics Data System (ADS)

    Portier-Fozzani, F.; Vandame, B.; Bijaoui, A.; Maucherat, A. J.; EIT Team

    2001-07-01

    The large dynamic range provided by the SOHO/EIT CCD (1 : 5000) is needed to observe the large EUV zoom of coronal structures from coronal homes up to flares. Histograms show that often a wide dynamic range is present in each image. Extracting hidden structures in the background level requires specific techniques such as the use of the Multiscale Vision Model (MVM, Bijaoui et al., 1998). This method, based on wavelet transformations optimizes detection of various size objects, however complex they may be. Bijaoui et al. built the Multiscale Vision Model to extract small dynamical structures from noise, mainly for studying galaxies. In this paper, we describe requirements for the use of this method with SOHO/EIT images (calibration, size of the image, dynamics of the subimage, etc.). Two different areas were studied revealing hidden structures: (1) classical coronal mass ejection (CME) formation and (2) a complex group of active regions with its evolution. The aim of this paper is to define carefully the constraints for this new method of imaging the solar corona with SOHO/EIT. Physical analysis derived from multi-wavelength observations will later complete these first results.

  14. Basics of identification measurement technology

    NASA Astrophysics Data System (ADS)

    Klikushin, Yu N.; Kobenko, V. Yu; Stepanov, P. P.

    2018-01-01

    All available algorithms and suitable for pattern recognition do not give 100% guarantee, therefore there is a field of scientific night activity in this direction, studies are relevant. It is proposed to develop existing technologies for pattern recognition in the form of application of identification measurements. The purpose of the study is to identify the possibility of recognizing images using identification measurement technologies. In solving problems of pattern recognition, neural networks and hidden Markov models are mainly used. A fundamentally new approach to the solution of problems of pattern recognition based on the technology of identification signal measurements (IIS) is proposed. The essence of IIS technology is the quantitative evaluation of the shape of images using special tools and algorithms.

  15. How virtue ethics informs medical professionalism.

    PubMed

    McCammon, Susan D; Brody, Howard

    2012-12-01

    We argue that a turn toward virtue ethics as a way of understanding medical professionalism represents both a valuable corrective and a missed opportunity. We look at three ways in which a closer appeal to virtue ethics could help address current problems or issues in professionalism education-first, balancing professionalism training with demands for professional virtues as a prerequisite; second, preventing demands for the demonstrable achievement of competencies from working against ideal professionalism education as lifelong learning; and third, avoiding temptations to dismiss moral distress as a mere "hidden curriculum" problem. As a further demonstration of how best to approach a lifelong practice of medical virtue, we will examine altruism as a mean between the extremes of self-sacrifice and selfishness.

  16. Infrared thermographic detection of buried grave sites

    NASA Astrophysics Data System (ADS)

    Weil, Gary J.; Graf, Richard J.

    1992-04-01

    Since time began, people have been born and people have died. For a variety of reasons grave sites have had to be located and investigated. These reasons have included legal, criminal, religious, construction and even simple curiosity problems. Destructive testing methods such as shovels and backhoes, have traditionally been used to determine grave site locations in fields, under pavements, and behind hidden locations. These existing techniques are slow, inconvenient, dirty, destructive, visually obtrusive, irritating to relatives, explosive to the media and expensive. A new, nondestructive, non-contact technique, infrared thermography has been developed to address these problems. This paper will describe how infrared thermography works and will be illustrated by several case histories.

  17. A hidden curriculum: gambling and problem gambling among high school students in Auckland.

    PubMed

    Sullivan, Sean

    2005-12-01

    Participation in gambling by young people aged 13-18 years. During 2001, prior to the passing of legislation to minimise gambling harm, more than 500 students from six high schools completed a survey of their participation in gambling during the previous 12 months, and completed three problem gambling screens. Gambling, including under-age gambling, was a common event. Up to one in five were identified as at risk for problem gambling on at least one screen. Students who were non-European, or were from low socioeconomic areas, were more likely to be at risk for problem gambling. Help for gambling problems was preferred from friends and family rather than others, while inclusion of information in the education curriculum about risk of gambling problems was supported. The survey provided evidence for pre-legislation baseline gambling behaviour, and risk for problem gambling, of students attending high schools in Auckland. Levels of risk for problem gambling paralleled the elevated risk found for youth in many countries. Raising awareness, through a school curriculum, of risk for gambling problems among adolescents may be explored as a strategy to reduce the high levels of risk for gambling problems identified.

  18. Zipf exponent of trajectory distribution in the hidden Markov model

    NASA Astrophysics Data System (ADS)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  19. Pruning artificial neural networks using neural complexity measures.

    PubMed

    Jorgensen, Thomas D; Haynes, Barry P; Norlund, Charlotte C F

    2008-10-01

    This paper describes a new method for pruning artificial neural networks, using a measure of the neural complexity of the neural network. This measure is used to determine the connections that should be pruned. The measure computes the information-theoretic complexity of a neural network, which is similar to, yet different from previous research on pruning. The method proposed here shows how overly large and complex networks can be reduced in size, whilst retaining learnt behaviour and fitness. The technique proposed here helps to discover a network topology that matches the complexity of the problem it is meant to solve. This novel pruning technique is tested in a robot control domain, simulating a racecar. It is shown, that the proposed pruning method is a significant improvement over the most commonly used pruning method Magnitude Based Pruning. Furthermore, some of the pruned networks prove to be faster learners than the benchmark network that they originate from. This means that this pruning method can also help to unleash hidden potential in a network, because the learning time decreases substantially for a pruned a network, due to the reduction of dimensionality of the network.

  20. Organizing Books and Authors by Multilayer SOM.

    PubMed

    Zhang, Haijun; Chow, Tommy W S; Wu, Q M Jonathan

    2016-12-01

    This paper introduces a new framework for the organization of electronic books (e-books) and their corresponding authors using a multilayer self-organizing map (MLSOM). An author is modeled by a rich tree-structured representation, and an MLSOM-based system is used as an efficient solution to the organizational problem of structured data. The tree-structured representation formulates author features in a hierarchy of author biography, books, pages, and paragraphs. To efficiently tackle the tree-structured representation, we used an MLSOM algorithm that serves as a clustering technique to handle e-books and their corresponding authors. A book and author recommender system is then implemented using the proposed framework. The effectiveness of our approach was examined in a large-scale data set containing 3868 authors along with the 10500 e-books that they wrote. We also provided visualization results of MLSOM for revealing the relevance patterns hidden from presented author clusters. The experimental results corroborate that the proposed method outperforms other content-based models (e.g., rate adapting poisson, latent Dirichlet allocation, probabilistic latent semantic indexing, and so on) and offers a promising solution to book recommendation, author recommendation, and visualization.

  1. Performance of Deep and Shallow Neural Networks, the Universal Approximation Theorem, Activity Cliffs, and QSAR.

    PubMed

    Winkler, David A; Le, Tu C

    2017-01-01

    Neural networks have generated valuable Quantitative Structure-Activity/Property Relationships (QSAR/QSPR) models for a wide variety of small molecules and materials properties. They have grown in sophistication and many of their initial problems have been overcome by modern mathematical techniques. QSAR studies have almost always used so-called "shallow" neural networks in which there is a single hidden layer between the input and output layers. Recently, a new and potentially paradigm-shifting type of neural network based on Deep Learning has appeared. Deep learning methods have generated impressive improvements in image and voice recognition, and are now being applied to QSAR and QSAR modelling. This paper describes the differences in approach between deep and shallow neural networks, compares their abilities to predict the properties of test sets for 15 large drug data sets (the kaggle set), discusses the results in terms of the Universal Approximation theorem for neural networks, and describes how DNN may ameliorate or remove troublesome "activity cliffs" in QSAR data sets. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Enhancing interacting residue prediction with integrated contact matrix prediction in protein-protein interaction.

    PubMed

    Du, Tianchuan; Liao, Li; Wu, Cathy H

    2016-12-01

    Identifying the residues in a protein that are involved in protein-protein interaction and identifying the contact matrix for a pair of interacting proteins are two computational tasks at different levels of an in-depth analysis of protein-protein interaction. Various methods for solving these two problems have been reported in the literature. However, the interacting residue prediction and contact matrix prediction were handled by and large independently in those existing methods, though intuitively good prediction of interacting residues will help with predicting the contact matrix. In this work, we developed a novel protein interacting residue prediction system, contact matrix-interaction profile hidden Markov model (CM-ipHMM), with the integration of contact matrix prediction and the ipHMM interaction residue prediction. We propose to leverage what is learned from the contact matrix prediction and utilize the predicted contact matrix as "feedback" to enhance the interaction residue prediction. The CM-ipHMM model showed significant improvement over the previous method that uses the ipHMM for predicting interaction residues only. It indicates that the downstream contact matrix prediction could help the interaction site prediction.

  3. Modeling and Experimental Validation for 3D mm-wave Radar Imaging

    NASA Astrophysics Data System (ADS)

    Ghazi, Galia

    As the problem of identifying suicide bombers wearing explosives concealed under clothing becomes increasingly important, it becomes essential to detect suspicious individuals at a distance. Systems which employ multiple sensors to determine the presence of explosives on people are being developed. Their functions include observing and following individuals with intelligent video, identifying explosives residues or heat signatures on the outer surface of their clothing, and characterizing explosives using penetrating X-rays, terahertz waves, neutron analysis, or nuclear quadrupole resonance. At present, mm-wave radar is the only modality that can both penetrate and sense beneath clothing at a distance of 2 to 50 meters without causing physical harm. Unfortunately, current mm-wave radar systems capable of performing high-resolution, real-time imaging require using arrays with a large number of transmitting and receiving modules; therefore, these systems present undesired large size, weight and power consumption, as well as extremely complex hardware architecture. The overarching goal of this thesis is the development and experimental validation of a next generation inexpensive, high-resolution radar system that can distinguish security threats hidden on individuals located at 2-10 meters range. In pursuit of this goal, this thesis proposes the following contributions: (1) Development and experimental validation of a new current-based, high-frequency computational method to model large scattering problems (hundreds of wavelengths) involving lossy, penetrable and multi-layered dielectric and conductive structures, which is needed for an accurate characterization of the wave-matter interaction and EM scattering in the target region; (2) Development of combined Norm-1, Norm-2 regularized imaging algorithms, which are needed for enhancing the resolution of the images while using a minimum number of transmitting and receiving antennas; (3) Implementation and experimental validation of new calibration techniques, which are needed for coherent imaging with multistatic configurations; and (4) Investigation of novel compressive antennas, which spatially modulate the wavefield in order to enhance the information transfer efficiency between sampling and imaging regions and use of Compressive Sensing algorithms.

  4. Realistic anomaly-mediated supersymmetry breaking

    NASA Astrophysics Data System (ADS)

    Chacko, Zacharia; Luty, Markus A.; Maksymyk, Ivan; Pontón, Eduardo

    2000-03-01

    We consider supersymmetry breaking communicated entirely by the superconformal anomaly in supergravity. This scenario is naturally realized if supersymmetry is broken in a hidden sector whose couplings to the observable sector are suppressed by more than powers of the Planck scale, as occurs if supersymmetry is broken in a parallel universe living in extra dimensions. This scenario is extremely predictive: soft supersymmetry breaking couplings are completely determined by anomalous dimensions in the effective theory at the weak scale. Gaugino and scalar masses are naturally of the same order, and flavor-changing neutral currents are automatically suppressed. The most glaring problem with this scenario is that slepton masses are negative in the minimal supersymmetric standard model. We point out that this problem can be simply solved by coupling extra Higgs doublets to the leptons. Lepton flavor-changing neutral currents can be naturally avoided by approximate symmetries. We also describe more speculative solutions involving compositeness near the weak scale. We then turn to electroweak symmetry breaking. Adding an explicit μ term gives a value for Bμ that is too large by a factor of ~ 100. We construct a realistic model in which the μ term arises from the vacuum expectation value of a singlet field, so all weak-scale masses are directly related to m3/2. We show that fully realistic electroweak symmetry breaking can occur in this model with moderate fine-tuning.

  5. Directed area search using socio-biological vision algorithms and cognitive Bayesian reasoning

    NASA Astrophysics Data System (ADS)

    Medasani, S.; Owechko, Y.; Allen, D.; Lu, T. C.; Khosla, D.

    2010-04-01

    Volitional search systems that assist the analyst by searching for specific targets or objects such as vehicles, factories, airports, etc in wide area overhead imagery need to overcome multiple problems present in current manual and automatic approaches. These problems include finding targets hidden in terabytes of information, relatively few pixels on targets, long intervals between interesting regions, time consuming analysis requiring many analysts, no a priori representative examples or templates of interest, detecting multiple classes of objects, and the need for very high detection rates and very low false alarm rates. This paper describes a conceptual analyst-centric framework that utilizes existing technology modules to search and locate occurrences of targets of interest (e.g., buildings, mobile targets of military significance, factories, nuclear plants, etc.), from video imagery of large areas. Our framework takes simple queries from the analyst and finds the queried targets with relatively minimum interaction from the analyst. It uses a hybrid approach that combines biologically inspired bottom up attention, socio-biologically inspired object recognition for volitionally recognizing targets, and hierarchical Bayesian networks for modeling and representing the domain knowledge. This approach has the benefits of high accuracy, low false alarm rate and can handle both low-level visual information and high-level domain knowledge in a single framework. Such a system would be of immense help for search and rescue efforts, intelligence gathering, change detection systems, and other surveillance systems.

  6. Hidden baryons: The physics of Compton composites

    NASA Astrophysics Data System (ADS)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  7. Automated Cough Assessment on a Mobile Platform

    PubMed Central

    2014-01-01

    The development of an Automated System for Asthma Monitoring (ADAM) is described. This consists of a consumer electronics mobile platform running a custom application. The application acquires an audio signal from an external user-worn microphone connected to the device analog-to-digital converter (microphone input). This signal is processed to determine the presence or absence of cough sounds. Symptom tallies and raw audio waveforms are recorded and made easily accessible for later review by a healthcare provider. The symptom detection algorithm is based upon standard speech recognition and machine learning paradigms and consists of an audio feature extraction step followed by a Hidden Markov Model based Viterbi decoder that has been trained on a large database of audio examples from a variety of subjects. Multiple Hidden Markov Model topologies and orders are studied. Performance of the recognizer is presented in terms of the sensitivity and the rate of false alarm as determined in a cross-validation test. PMID:25506590

  8. Integrating hidden Markov model and PRAAT: a toolbox for robust automatic speech transcription

    NASA Astrophysics Data System (ADS)

    Kabir, A.; Barker, J.; Giurgiu, M.

    2010-09-01

    An automatic time-aligned phone transcription toolbox of English speech corpora has been developed. Especially the toolbox would be very useful to generate robust automatic transcription and able to produce phone level transcription using speaker independent models as well as speaker dependent models without manual intervention. The system is based on standard Hidden Markov Models (HMM) approach and it was successfully experimented over a large audiovisual speech corpus namely GRID corpus. One of the most powerful features of the toolbox is the increased flexibility in speech processing where the speech community would be able to import the automatic transcription generated by HMM Toolkit (HTK) into a popular transcription software, PRAAT, and vice-versa. The toolbox has been evaluated through statistical analysis on GRID data which shows that automatic transcription deviates by an average of 20 ms with respect to manual transcription.

  9. Search for Hidden Particles: a new experiment proposal

    NASA Astrophysics Data System (ADS)

    De Lellis, G.

    2015-08-01

    Searches for new physics with accelerators are being performed at the LHC, looking for high massive particles coupled to matter with ordinary strength. We propose a new experiment meant to search for very weakly coupled particles in the few GeV mass domain. The existence of such particles, foreseen in different models beyond the Standard Model, is largely unexplored from the experimental point of view. A beam dump facility, built at CERN in the north area, using 400 GeV protons is a copious factory of charmed hadrons and it could be used to probe the existence of such particles. The beam dump is also an ideal source of tau neutrinos, the less known particle in the Standard Model. In particular, tau anti-neutrinos have not been observed so far. We therefore propose an experiment to search for hidden particles and study tau neutrino physics at the same time.

  10. Search for Hidden Particles (SHiP): a new experiment proposal

    NASA Astrophysics Data System (ADS)

    De Lellis, G.

    2015-06-01

    Searches for new physics with accelerators are being performed at the LHC, looking for high massive particles coupled to matter with ordinary strength. We propose a new experimental facility meant to search for very weakly coupled particles in the few GeV mass domain. The existence of such particles, foreseen in different theoretical models beyond the Standard Model, is largely unexplored from the experimental point of view. A beam dump facility, built at CERN in the north area, using 400 GeV protons is a copious factory of charmed hadrons and could be used to probe the existence of such particles. The beam dump is also an ideal source of tau neutrinos, the less known particle in the Standard Model. In particular, tau anti-neutrinos have not been observed so far. We therefore propose an experiment to search for hidden particles and study tau neutrino physics at the same time.

  11. The missing history of Bohm's hidden variables theory: The Ninth Symposium of the Colston Research Society, Bristol, 1957

    NASA Astrophysics Data System (ADS)

    Kožnjak, Boris

    2018-05-01

    In this paper, I analyze the historical context, scientific and philosophical content, and the implications of the thus far historically largely neglected Ninth Symposium of the Colston Research Society held in Bristol at the beginning of April 1957, the first major international event after World War II gathering eminent physicists and philosophers to discuss the foundational questions of quantum mechanics, in respect to the early reception of the causal quantum theory program mapped and defended by David Bohm during the five years preceding the Symposium. As will be demonstrated, contrary to the almost unanimously negative and even hostile reception of Bohm's ideas on hidden variables in the early 1950s, in the close aftermath of the 1957 Colston Research Symposium Bohm's ideas received a more open-minded and ideologically relaxed critical rehabilitation, in which the Symposium itself played a vital and essential part.

  12. Automated Land Cover Change Detection and Mapping from Hidden Parameter Estimates of Normalized Difference Vegetation Index (NDVI) Time-Series

    NASA Astrophysics Data System (ADS)

    Chakraborty, S.; Banerjee, A.; Gupta, S. K. S.; Christensen, P. R.; Papandreou-Suppappola, A.

    2017-12-01

    Multitemporal observations acquired frequently by satellites with short revisit periods such as the Moderate Resolution Imaging Spectroradiometer (MODIS), is an important source for modeling land cover. Due to the inherent seasonality of the land cover, harmonic modeling reveals hidden state parameters characteristic to it, which is used in classifying different land cover types and in detecting changes due to natural or anthropogenic factors. In this work, we use an eight day MODIS composite to create a Normalized Difference Vegetation Index (NDVI) time-series of ten years. Improved hidden parameter estimates of the nonlinear harmonic NDVI model are obtained using the Particle Filter (PF), a sequential Monte Carlo estimator. The nonlinear estimation based on PF is shown to improve parameter estimation for different land cover types compared to existing techniques that use the Extended Kalman Filter (EKF), due to linearization of the harmonic model. As these parameters are representative of a given land cover, its applicability in near real-time detection of land cover change is also studied by formulating a metric that captures parameter deviation due to change. The detection methodology is evaluated by considering change as a rare class problem. This approach is shown to detect change with minimum delay. Additionally, the degree of change within the change perimeter is non-uniform. By clustering the deviation in parameters due to change, this spatial variation in change severity is effectively mapped and validated with high spatial resolution change maps of the given regions.

  13. Fast learning method for convolutional neural networks using extreme learning machine and its application to lane detection.

    PubMed

    Kim, Jihun; Kim, Jonghong; Jang, Gil-Jin; Lee, Minho

    2017-03-01

    Deep learning has received significant attention recently as a promising solution to many problems in the area of artificial intelligence. Among several deep learning architectures, convolutional neural networks (CNNs) demonstrate superior performance when compared to other machine learning methods in the applications of object detection and recognition. We use a CNN for image enhancement and the detection of driving lanes on motorways. In general, the process of lane detection consists of edge extraction and line detection. A CNN can be used to enhance the input images before lane detection by excluding noise and obstacles that are irrelevant to the edge detection result. However, training conventional CNNs requires considerable computation and a big dataset. Therefore, we suggest a new learning algorithm for CNNs using an extreme learning machine (ELM). The ELM is a fast learning method used to calculate network weights between output and hidden layers in a single iteration and thus, can dramatically reduce learning time while producing accurate results with minimal training data. A conventional ELM can be applied to networks with a single hidden layer; as such, we propose a stacked ELM architecture in the CNN framework. Further, we modify the backpropagation algorithm to find the targets of hidden layers and effectively learn network weights while maintaining performance. Experimental results confirm that the proposed method is effective in reducing learning time and improving performance. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Visual one-shot learning as an 'anti-camouflage device': a novel morphing paradigm.

    PubMed

    Ishikawa, Tetsuo; Mogi, Ken

    2011-09-01

    Once people perceive what is in the hidden figure such as Dallenbach's cow and Dalmatian, they seldom seem to come back to the previous state when they were ignorant of the answer. This special type of learning process can be accomplished in a short time, with the effect of learning lasting for a long time (visual one-shot learning). Although it is an intriguing cognitive phenomenon, the lack of the control of difficulty of stimuli presented has been a problem in research. Here we propose a novel paradigm to create new hidden figures systematically by using a morphing technique. Through gradual changes from a blurred and binarized two-tone image to a blurred grayscale image of the original photograph including objects in a natural scene, spontaneous one-shot learning can occur at a certain stage of morphing when a sufficient amount of information is restored to the degraded image. A negative correlation between confidence levels and reaction times is observed, giving support to the fluency theory of one-shot learning. The correlation between confidence ratings and correct recognition rates indicates that participants had an accurate introspective ability (metacognition). The learning effect could be tested later by verifying whether or not the target object was recognized quicker in the second exposure. The present method opens a way for a systematic production of "good" hidden figures, which can be used to demystify the nature of visual one-shot learning.

  15. The Physiological Bases of Hidden Noise-Induced Hearing Loss: Protocol for a Functional Neuroimaging Study.

    PubMed

    Dewey, Rebecca Susan; Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T

    2018-03-09

    Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Our Medical Research Council-funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. ©Rebecca Susan Dewey, Deborah A Hall, Hannah Guest, Garreth Prendergast, Christopher J Plack, Susan T Francis. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 09.03.2018.

  16. A composite model for the 750 GeV diphoton excess

    DOE PAGES

    Harigaya, Keisuke; Nomura, Yasunori

    2016-03-14

    We study a simple model in which the recently reported 750 GeV diphoton excess arises from a composite pseudo Nambu-Goldstone boson — hidden pion — produced by gluon fusion and decaying into two photons. The model only introduces an extra hidden gauge group at the TeV scale with a vectorlike quark in the bifundamental representation of the hidden and standard model gauge groups. We calculate the masses of all the hidden pions and analyze their experimental signatures and constraints. We find that two colored hidden pions must be near the current experimental limits, and hence are probed in the nearmore » future. We study physics of would-be stable particles — the composite states that do not decay purely by the hidden and standard model gauge dynamics — in detail, including constraints from cosmology. We discuss possible theoretical structures above the TeV scale, e.g. conformal dynamics and supersymmetry, and their phenomenological implications. We also discuss an extension of the minimal model in which there is an extra hidden quark that is singlet under the standard model and has a mass smaller than the hidden dynamical scale. This provides two standard model singlet hidden pions that can both be viewed as diphoton/diboson resonances produced by gluon fusion. We discuss several scenarios in which these (and other) resonances can be used to explain various excesses seen in the LHC data.« less

  17. Radio for hidden-photon dark matter detection

    DOE PAGES

    Chaudhuri, Saptarshi; Graham, Peter W.; Irwin, Kent; ...

    2015-10-08

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled “hidden electric field,” oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that the observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Ourmore » “straw man” setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies, there is an upper limit to the useful size of a single resonator set by 1/ν. However, many resonators may be multiplexed within a hidden-photon coherence length to increase the sensitivity in this regime. Hidden-photon dark matter has an enormous range of possible frequencies, but current experiments search only over a few narrow pieces of that range. As a result, we find the potential sensitivity of our proposal is many orders of magnitude beyond current limits over an extensive range of frequencies, from 100 Hz up to 700 GHz and potentially higher.« less

  18. PCSYS: The optimal design integration system picture drawing system with hidden line algorithm capability for aerospace vehicle configurations

    NASA Technical Reports Server (NTRS)

    Hague, D. S.; Vanderburg, J. D.

    1977-01-01

    A vehicle geometric definition based upon quadrilateral surface elements to produce realistic pictures of an aerospace vehicle. The PCSYS programs can be used to visually check geometric data input, monitor geometric perturbations, and to visualize the complex spatial inter-relationships between the internal and external vehicle components. PCSYS has two major component programs. The between program, IMAGE, draws a complex aerospace vehicle pictorial representation based on either an approximate but rapid hidden line algorithm or without any hidden line algorithm. The second program, HIDDEN, draws a vehicle representation using an accurate but time consuming hidden line algorithm.

  19. The reported effects of bullying on burn-surviving children.

    PubMed

    Rimmer, Ruth B; Foster, Kevin N; Bay, Curtis R; Floros, Jim; Rutter, Cindy; Bosch, Jim; Wadsworth, Michelle M; Caruso, Daniel M

    2007-01-01

    There is a trend of increasing childhood aggression in America, which has been tied to bullying. Although there is growing research concerning bullying in the general pediatric population, there are limited data on bullying and its effects on children with disfigurements and physical limitations. This study was conducted to assess burned children's experience with bullying. A pretest was administered regarding experience with bullying and teasing. A curriculum regarding bullying, which incorporated the Harry Potter and the Sorcerer's Stone movie, was presented. After reviewing bullying depicted in the film and participating in a class regarding bullying, children were invited to complete a survey regarding their experience with bullying. A total of 61% of these children reported being bullied at school; 25% reported experiencing headaches or stomachaches due to bullying, and 12% reported staying home from school. Nearly 25% reported bullying as a big problem. Of those with visible scars (55%), a full 68% reported bullying as a problem, versus 54% with hidden scars (P < .05). However, those with visible scars were no more likely to tell an adult (54%) than those without (56%). Children were much more willing to disclose personal bullying experiences after participating in the class (57%) than before (45%) (P < .01). This study revealed that bullying impacts many burn-injured children and has negative effects on their physical and mental well-being. Many children (with visible or hidden scars) did not seek adult intervention for the problem. Participation in a bullying course appears to give children a forum that increases their willingness to disclose personal bullying experiences and can provide them with prevention information and a safe place to seek help.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.

    A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector ismore » cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.« less

Top