992 resultados para superstrings and heterotic strings
Resumo:
Op.1, C minor.--Op.2, F minor.
Resumo:
Entanglement is defined for each vector subspace of the tensor product of two finite-dimensional Hilbert spaces, by applying the notion of operator entanglement to the projection operator onto that subspace. The operator Schmidt decomposition of the projection operator defines a string of Schmidt coefficients for each subspace, and this string is assumed to characterize its entanglement, so that a first subspace is more entangled than a second, if the Schmidt string of the second majorizes the Schmidt string of the first. The idea is applied to the antisymmetric and symmetric tensor products of a finite-dimensional Hilbert space with itself, and also to the tensor product of an angular momentum j with a spin 1/2. When adapted to the subspaces of states of the nonrelativistic hydrogen atom with definite total angular momentum (orbital plus spin), within the space of bound states with a given total energy, this leads to a complete ordering of those subspaces by their Schmidt strings.
Resumo:
We report the performance of a group of adult dyslexics and matched controls in an array-matching task where two strings of either consonants or symbols are presented side by side and have to be judged to be the same or different. The arrays may differ either in the order or identity of two adjacent characters. This task does not require naming – which has been argued to be the cause of dyslexics’ difficulty in processing visual arrays – but, instead, has a strong serial component as demonstrated by the fact that, in both groups, Reaction times (RTs) increase monotonically with position of a mismatch. The dyslexics are clearly impaired in all conditions and performance in the identity conditions predicts performance across orthographic tasks even after age, performance IQ and phonology are partialled out. Moreover, the shapes of serial position curves are revealing of the underlying impairment. In the dyslexics, RTs increase with position at the same rate as in the controls (lines are parallel) ruling out reduced processing speed or difficulties in shifting attention. Instead, error rates show a catastrophic increase for positions which are either searched later or more subject to interference. These results are consistent with a reduction in the attentional capacity needed in a serial task to bind together identity and positional information. This capacity is best seen as a reduction in the number of spotlights into which attention can be split to process information at different locations rather than as a more generic reduction of resources which would also affect processing the details of single objects.
Resumo:
We analyze an approach to a similarity preserving coding of symbol sequences based on neural distributed representations and show that it can be viewed as a metric embedding process.
Resumo:
Battery energy storage systems have traditionally been manufactured using new batteries with a good reliability. The high cost of such a system has led to investigations of using second life transportation batteries to provide an alternative energy storage capability. However, the reliability and performance of these batteries is unclear and multi-modular power electronics with redundancy have been suggested as a means of helping with this issue. This paper reviews work already undertaken on battery failure rate to suggest suitable figures for use in reliability calculations. The paper then uses reliability analysis and a numerical example to investigate six different multi-modular topologies and suggests how the number of series battery strings and power electronic module redundancy should be determined for the lowest hardware cost using a numerical example. The results reveal that the cascaded dc-side modular with single inverter is the lowest cost solution for a range of battery failure rates.
Resumo:
* Supported by projects CCG08-UAM TIC-4425-2009 and TEC2007-68065-C03-02
Resumo:
The result of the distributed computing projectWieferich@Home is presented: the binary periodic numbers of bit pseudo-length j ≤ 3500 obtained by replication of a bit string of bit pseudo-length k ≤ 24 and increased by one are Wieferich primes only for the cases of 1092 or 3510.
Resumo:
Our key contribution is a flexible, automated marking system that adds desirable functionality to existing E-Assessment systems. In our approach, any given E-Assessment system is relegated to a data-collection mechanism, whereas marking and the generation and distribution of personalised per-student feedback is handled separately by our own system. This allows content-rich Microsoft Word feedback documents to be generated and distributed to every student simultaneously according to a per-assessment schedule.
The feedback is adaptive in that it corresponds to the answers given by the student and provides guidance on where they may have gone wrong. It is not limited to simple multiple choice which are the most prescriptive question type offered by most E-Assessment Systems and as such most straightforward to mark consistently and provide individual per-alternative feedback strings. It is also better equipped to handle the use of mathematical symbols and images within the feedback documents which is more flexible than existing E-Assessment systems, which can only handle simple text strings.
As well as MCQs the system reliably and robustly handles Multiple Response, Text Matching and Numeric style questions in a more flexible manner than Questionmark: Perception and other E-Assessment Systems. It can also reliably handle multi-part questions where the response to an earlier question influences the answer to a later one and can adjust both scoring and feedback appropriately.
New question formats can be added at any time provided a corresponding marking method conforming to certain templates can also be programmed. Indeed, any question type for which a programmatic method of marking can be devised may be supported by our system. Furthermore, since the student’s response to each is question is marked programmatically, our system can be set to allow for minor deviations from the correct answer, and if appropriate award partial marks.
Resumo:
Invasive stages of apicomplexan parasites require a host cell to survive, proliferate and advance to the next life cycle stage. Once invasion is achieved, apicomplexans interact closely with the host cell cytoskeleton, but in many cases the different species have evolved distinct mechanisms and pathways to modulate the structural organization of cytoskeletal filaments. The host cell cytoskeleton is a complex network, largely, but not exclusively, composed of microtubules, actin microfilaments and intermediate filaments, all of which are modulated by associated proteins, and it is involved in diverse functions including maintenance of cell morphology and mechanical support, migration, signal transduction, nutrient uptake, membrane and organelle trafficking and cell division. The ability of apicomplexans to modulate the cytoskeleton to their own advantage is clearly beneficial. We here review different aspects of the interactions of apicomplexans with the three main cytoskeletal filament types, provide information on the currently known parasite effector proteins and respective host cell targets involved, and how these interactions modulate the host cell physiology. Some of these findings could provide novel targets that could be exploited for the development of preventive and/or therapeutic strategies.
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
This dissertation project aims to establish Scandinavian trombone solo and chamber works as a major contribution to the trombone repertoire. From the late 19th century to modern day, Scandinavian composers have produced a steady output of trombone works of substantial musical quality. Deep-rooted in the traditions of strong military wind bands, Scandinavia has also produced an unusual number of trombone virtuosos, ranging from those holding positions in leading orchestras, and internationally renowned pedagogues, to trombonists enjoying careers as soloists. In this study I propose that it is the symbiotic relationship between strong performers and traditionally nationalist composers that created the fertile environment for the large number of popular trombone solo and chamber repertoire not seen in any other region besides the Paris Conservatory and its infamous test pieces. I also interpret the selected repertoire through the prism of nationalism and influence of folk music, and convey that the allure of the mystic Nordic folk influences enhances the appeal of the Scandinavian trombone repertoire to world-wide audiences and performers. The dissertation project was realized over three solo recitals, each showcasing the music of Sweden, Norway, and Denmark respectively. For each program, I looked to choose a standard work from the trombone solo repertoire, a work written for or by a native virtuoso, and a lesser-known work that warrants the attention of other performers for its musical qualities. The recital of Swedish music presented Mandrake in the Corner by Christian Lindberg, Subadobe by Frederik Högberg, A Christian Song by Jan Sandström, and Concertino for trombone and strings by Lars-Erik Larsson. The recital of Norwegian music presented Concerto for Trombone op. 76 by Egil Hovland, Ordner Seg by Øystein Baadsvik, Elegi by Magne Amdahl, and Concerto in F major by Ole Olsen. The recital of Danish music presented Rapsodia Borealis by Søren Hyldgaard, Madrigal by Bo Gunge, Romance for trombone and piano by Axel Jørgensen, Concerto for trombone by Launy Grøndahl, and Three Swedish Tunes by Mogens Andresen. Through the performance of works from these three countries, the dissertation establishes Scandinavia as a rich source of solo trombone repertoire perpetuated by nationalist composers and virtuosos, as well as providing a brief survey of Scandinavian trombone works of various instrumentation and difficulty levels to be enjoyed by student, professional, and amateur performers and their audience.
Resumo:
The size of online image datasets is constantly increasing. Considering an image dataset with millions of images, image retrieval becomes a seemingly intractable problem for exhaustive similarity search algorithms. Hashing methods, which encodes high-dimensional descriptors into compact binary strings, have become very popular because of their high efficiency in search and storage capacity. In the first part, we propose a multimodal retrieval method based on latent feature models. The procedure consists of a nonparametric Bayesian framework for learning underlying semantically meaningful abstract features in a multimodal dataset, a probabilistic retrieval model that allows cross-modal queries and an extension model for relevance feedback. In the second part, we focus on supervised hashing with kernels. We describe a flexible hashing procedure that treats binary codes and pairwise semantic similarity as latent and observed variables, respectively, in a probabilistic model based on Gaussian processes for binary classification. We present a scalable inference algorithm with the sparse pseudo-input Gaussian process (SPGP) model and distributed computing. In the last part, we define an incremental hashing strategy for dynamic databases where new images are added to the databases frequently. The method is based on a two-stage classification framework using binary and multi-class SVMs. The proposed method also enforces balance in binary codes by an imbalance penalty to obtain higher quality binary codes. We learn hash functions by an efficient algorithm where the NP-hard problem of finding optimal binary codes is solved via cyclic coordinate descent and SVMs are trained in a parallelized incremental manner. For modifications like adding images from an unseen class, we propose an incremental procedure for effective and efficient updates to the previous hash functions. Experiments on three large-scale image datasets demonstrate that the incremental strategy is capable of efficiently updating hash functions to the same retrieval performance as hashing from scratch.
Resumo:
Grand Unification Theories (GUTs) predict the unification of three of the fundamental forces and are a possible extension of the Standard Model, some of them predict neutrino mass and baryon asymmetry. We consider a minimal non-supersymmetric $SO(10)$ GUT model that can reproduce the observed fermionic masses and mixing parameters of the Standard Model. We calculate the scales of spontaneous symmetry breaking from the GUT to the Standard Model gauge group using two-loop renormalisation group equations. This procedure determines the proton decay rate and the scale of $U(1)_{B-L}$ breaking, which generates cosmic strings, and the right-handed neutrino mass scales. Consequently, the regions of parameter space where thermal leptogenesis is viable are identified and correlated with the fermion masses and mixing, the neutrinoless double beta decay rate, the proton decay rate, and the gravitational wave signal resulting from the network of cosmic strings. We demonstrate that this framework, which can explain the Standard Model fermion masses and mixing and the observed baryon asymmetry, will be highly constrained by the next generation of gravitational wave detectors and neutrino oscillation experiments which will also constrain the proton lifetime
Resumo:
Characterized for the first time in erythrocytes, phosphatidylinositol phosphate kinases (PIP kinases) belong to a family of enzymes that generate various lipid messengers and participate in several cellular processes, including gene expression regulation. Recently, the PIPKIIα gene was found to be differentially expressed in reticulocytes from two siblings with hemoglobin H disease, suggesting a possible relationship between PIPKIIα and the production of globins. Here, we investigated PIPKIIα gene and protein expression and protein localization in hematopoietic-derived cells during their differentiation, and the effects of PIPKIIα silencing on K562 cells. PIPKIIα silencing resulted in an increase in α and γ globins and a decrease in the proliferation of K562 cells without affecting cell cycle progression and apoptosis. In conclusion, using a cell line model, we showed that PIPKIIα is widely expressed in hematopoietic-derived cells, is localized in their cytoplasm and nucleus, and is upregulated during erythroid differentiation. We also showed that PIPKIIα silencing can induce α and γ globin expression and decrease cell proliferation in K562 cells.
Resumo:
Bone marrow is organized in specialized microenvironments known as 'marrow niches'. These are important for the maintenance of stem cells and their hematopoietic progenitors whose homeostasis also depends on other cell types present in the tissue. Extrinsic factors, such as infection and inflammatory states, may affect this system by causing cytokine dysregulation (imbalance in cytokine production) and changes in cell proliferation and self-renewal rates, and may also induce changes in the metabolism and cell cycle. Known to relate to chronic inflammation, obesity is responsible for systemic changes that are best studied in the cardiovascular system. Little is known regarding the changes in the hematopoietic system induced by the inflammatory state carried by obesity or the cell and molecular mechanisms involved. The understanding of the biological behavior of hematopoietic stem cells under obesity-induced chronic inflammation could help elucidate the pathophysiological mechanisms involved in other inflammatory processes, such as neoplastic diseases and bone marrow failure syndromes.