990 resultados para Channel selection
Resumo:
In the present study we are using multi variate analysis techniques to discriminate signal from background in the fully hadronic decay channel of ttbar events. We give a brief introduction to the role of the Top quark in the standard model and a general description of the CMS Experiment at LHC. We have used the CMS experiment computing and software infrastructure to generate and prepare the data samples used in this analysis. We tested the performance of three different classifiers applied to our data samples and used the selection obtained with the Multi Layer Perceptron classifier to give an estimation of the statistical and systematical uncertainty on the cross section measurement.
Resumo:
Bargaining is the building block of many economic interactions, ranging from bilateral to multilateral encounters and from situations in which the actors are individuals to negotiations between firms or countries. In all these settings, economists have been intrigued for a long time by the fact that some projects, trades or agreements are not realized even though they are mutually beneficial. On the one hand, this has been explained by incomplete information. A firm may not be willing to offer a wage that is acceptable to a qualified worker, because it knows that there are also unqualified workers and cannot distinguish between the two types. This phenomenon is known as adverse selection. On the other hand, it has been argued that even with complete information, the presence of externalities may impede efficient outcomes. To see this, consider the example of climate change. If a subset of countries agrees to curb emissions, non-participant regions benefit from the signatories’ efforts without incurring costs. These free riding opportunities give rise to incentives to strategically improve ones bargaining power that work against the formation of a global agreement. This thesis is concerned with extending our understanding of both factors, adverse selection and externalities. The findings are based on empirical evidence from original laboratory experiments as well as game theoretic modeling. On a very general note, it is demonstrated that the institutions through which agents interact matter to a large extent. Insights are provided about which institutions we should expect to perform better than others, at least in terms of aggregate welfare. Chapters 1 and 2 focus on the problem of adverse selection. Effective operation of markets and other institutions often depends on good information transmission properties. In terms of the example introduced above, a firm is only willing to offer high wages if it receives enough positive signals about the worker’s quality during the application and wage bargaining process. In Chapter 1, it will be shown that repeated interaction coupled with time costs facilitates information transmission. By making the wage bargaining process costly for the worker, the firm is able to obtain more accurate information about the worker’s type. The cost could be pure time cost from delaying agreement or cost of effort arising from a multi-step interviewing process. In Chapter 2, I abstract from time cost and show that communication can play a similar role. The simple fact that a worker states to be of high quality may be informative. In Chapter 3, the focus is on a different source of inefficiency. Agents strive for bargaining power and thus may be motivated by incentives that are at odds with the socially efficient outcome. I have already mentioned the example of climate change. Other examples are coalitions within committees that are formed to secure voting power to block outcomes or groups that commit to different technological standards although a single standard would be optimal (e.g. the format war between HD and BlueRay). It will be shown that such inefficiencies are directly linked to the presence of externalities and a certain degree of irreversibility in actions. I now discuss the three articles in more detail. In Chapter 1, Olivier Bochet and I study a simple bilateral bargaining institution that eliminates trade failures arising from incomplete information. In this setting, a buyer makes offers to a seller in order to acquire a good. Whenever an offer is rejected by the seller, the buyer may submit a further offer. Bargaining is costly, because both parties suffer a (small) time cost after any rejection. The difficulties arise, because the good can be of low or high quality and the quality of the good is only known to the seller. Indeed, without the possibility to make repeated offers, it is too risky for the buyer to offer prices that allow for trade of high quality goods. When allowing for repeated offers, however, at equilibrium both types of goods trade with probability one. We provide an experimental test of these predictions. Buyers gather information about sellers using specific price offers and rates of trade are high, much as the model’s qualitative predictions. We also observe a persistent over-delay before trade occurs, and this mitigates efficiency substantially. Possible channels for over-delay are identified in the form of two behavioral assumptions missing from the standard model, loss aversion (buyers) and haggling (sellers), which reconcile the data with the theoretical predictions. Chapter 2 also studies adverse selection, but interaction between buyers and sellers now takes place within a market rather than isolated pairs. Remarkably, in a market it suffices to let agents communicate in a very simple manner to mitigate trade failures. The key insight is that better informed agents (sellers) are willing to truthfully reveal their private information, because by doing so they are able to reduce search frictions and attract more buyers. Behavior observed in the experimental sessions closely follows the theoretical predictions. As a consequence, costless and non-binding communication (cheap talk) significantly raises rates of trade and welfare. Previous experiments have documented that cheap talk alleviates inefficiencies due to asymmetric information. These findings are explained by pro-social preferences and lie aversion. I use appropriate control treatments to show that such consideration play only a minor role in our market. Instead, the experiment highlights the ability to organize markets as a new channel through which communication can facilitate trade in the presence of private information. In Chapter 3, I theoretically explore coalition formation via multilateral bargaining under complete information. The environment studied is extremely rich in the sense that the model allows for all kinds of externalities. This is achieved by using so-called partition functions, which pin down a coalitional worth for each possible coalition in each possible coalition structure. It is found that although binding agreements can be written, efficiency is not guaranteed, because the negotiation process is inherently non-cooperative. The prospects of cooperation are shown to crucially depend on i) the degree to which players can renegotiate and gradually build up agreements and ii) the absence of a certain type of externalities that can loosely be described as incentives to free ride. Moreover, the willingness to concede bargaining power is identified as a novel reason for gradualism. Another key contribution of the study is that it identifies a strong connection between the Core, one of the most important concepts in cooperative game theory, and the set of environments for which efficiency is attained even without renegotiation.
Resumo:
Several methods to improve multiple distant microphone (MDM) speaker diarization based on Time Delay of Arrival (TDOA) features are evaluated in this paper. All of them avoid the use of a single reference channel to calculate the TDOA values and, based on different criteria, select among all possible pairs of microphones a set of pairs that will be used to estimate the TDOA's. The evaluated methods have been named the "Dynamic Margin" (DM), the "Extreme Regions" (ER), the "Most Common" (MC), the "Cross Correlation" (XCorr) and the "Principle Component Analysis" (PCA). It is shown that all methods improve the baseline results for the development set and four of them improve also the results for the evaluation set. Improvements of 3.49% and 10.77% DER relative are obtained for DM and ER respectively for the test set. The XCorr and PCA methods achieve an improvement of 36.72% and 30.82% DER relative for the test set. Moreover, the computational cost for the XCorr method is 20% less than the baseline.
Resumo:
We recently cloned an inward-rectifying K channel (Kir) cDNA, CCD-IRK3 (mKir 2.3), from a cortical collecting duct (CCD) cell line. Although this recombinant channel shares many functional properties with the “small-conductance” basolateral membrane Kir channel in the CCD, its precise subcellular localization has been difficult to elucidate by conventional immunocytochemistry. To circumvent this problem, we studied the targeting of several different epitope-tagged CCD-IRK3 in a polarized renal epithelial cell line. Either the 11-amino acid span of the vesicular stomatitis virus (VSV) G glycoprotein (P5D4 epitope) or a 6-amino acid epitope of the bovine papilloma virus capsid protein (AU1) was genetically engineered on the extreme N terminus of CCD-IRK3. As determined by patch-clamp and two-microelectrode voltage-clamp analyses in Xenopus oocytes, neither tag affected channel function; no differences in cation selectivity, barium block, single channel conductance, or open probability could be distinguished between the wild-type and the tagged constructs. MDCK cells were transfected with tagged CCD-IRK3, and several stable clonal cell lines were generated by neomycin-resistance selection. Immunoprecipitation studies with anti-P5D4 or anti-AU1 antibodies readily detected the predicted-size 50-kDa protein in the transfected cells lines but not in wild-type or vector-only (PcB6) transfected MDCK cells. As visualized by indirect immunofluorescence and confocal microscopy, both the tagged CCD-IRK3 forms were exclusively detected on the basolateral membrane. To assure that the VSV G tag was not responsible for the targeting, the P5D4 epitope modified by a site-directed mutagenesis (Y2F) to remove a potential basolateral targeting signal contained in this tag. VSV(Y2F) was also detected exclusively on the basolateral membrane, confirming bona fide IRK3 basolateral expression. These observations, with our functional studies, suggest that CCD-IRK3 may encode the small-conductance CCD basolateral K channel.
Resumo:
The nicotinic acetylcholine receptor (AChR) controls signal transmission between cells in the nervous system. Abused drugs such as cocaine inhibit this receptor. Transient kinetic investigations indicate that inhibitors decrease the channel-opening equilibrium constant [Hess, G. P. & Grewer, C. (1998) Methods Enzymol. 291, 443–473]. Can compounds be found that compete with inhibitors for their binding site but do not change the channel-opening equilibrium? The systematic evolution of RNA ligands by exponential enrichment methodology and the AChR in Torpedo californica electroplax membranes were used to find RNAs that can displace inhibitors from the receptor. The selection of RNA ligands was carried out in two consecutive steps: (i) a gel-shift selection of high-affinity ligands bound to the AChR in the electroplax membrane, and (ii) subsequent use of nitrocellulose filters to which both the membrane-bound receptor and RNAs bind strongly, but from which the desired RNA can be displaced from the receptor by a high-affinity AChR inhibitor, phencyclidine. After nine selection rounds, two classes of RNA molecules that bind to the AChR with nanomolar affinities were isolated and sequenced. Both classes of RNA molecules are displaced by phencyclidine and cocaine from their binding site on the AChR. Class I molecules are potent inhibitors of AChR activity in BC3H1 muscle cells, as determined by using the whole-cell current-recording technique. Class II molecules, although competing with AChR inhibitors, do not affect receptor activity in this assay; such compounds or derivatives may be useful for alleviating the toxicity experienced by millions of addicts.
Resumo:
A phytotoxicity assay based on the ToxY-PAM dual-channel yield analyser has been developed and successfully incorporated into field assessments for the detection of phytotoxicants in water. As a means of further exploring the scope of the assay application and of selecting a model biomaterial to complement the instrument design, nine algal species were exposed to four chemical substances deemed of priority for water quality monitoring purposes (chlorpyrifos, copper, diuron and nonylphenol ethoxylate). Inter-species differences in sensitivity to the four toxicants varied by a factor of 1.9-100. Measurements of photosystem-II quantum yield using these nine single-celled microalgae as biomaterial corroborated previous studies which have shown that the ToxY-PAM dual-channel yield analyser is a highly sensitive method for the detection of PS-II impacting herbicides. Besides Phaeodactylum tricornutum, the previously applied biomaterial, three other species consistently performed well (Nitzschia closterium, Chlorella vulgaris and Dunaliella tertiolecta) and will be used in further test optimisation experiments. In addition to sensitivity, response time was evaluated and revealed a high degree of variation between species and toxicants. While most species displayed relatively weak and slow responses to copper, C. vulgaris demonstrated an IC10 of 51 μ g L-1, with maximum response measured within 25 minutes and inhibition being accompanied by a large decrease in fluorescence yield. The potential for this C vulgaris-based bioassay to be used for the detection of copper is discussed. There was no evidence that the standard ToxY-PAM protocol, using these unicellular algae species, could be used for the detection of chlorpyrifos or nonylphenol ethoxylate at environmentally relevant levels. © 2005 Elsevier B.V. All rights reserved.
Resumo:
Currently, wireless technology is revolutionizing the way we share information and communicate. The demands for mobility have made wireless technology the primary source for voice communication. Code-division multiple-access (CDMA) is a very popular spread spectrum application due to its claims of low transmission power, higher system capacity, ability to mitigate multipath fading and user interference. In that case, frequency-hopping code-division multiple access (FH-CDMA) has received considerable attention over the past few years. This technique will allow a better performance over a fading channel, message privacy, and immunity to narrowband interference. This paper addresses the characteristics of FH-CDMA in WPAN networks, with an emphasis on frequency-hopped Bluetooth systems. A performance evaluation of FH-CDMA is discussed and simulated. The analysis shows the interaction between the designed parameters and their effect on the network system. Most specifically, the FH-CDMA scheme provides frequency and temporal diversity to combat the effects of interference.
Resumo:
Relay selection has been considered as an effective method to improve the performance of cooperative communication. However, the Channel State Information (CSI) used in relay selection can be outdated, yielding severe performance degradation of cooperative communication systems. In this paper, we investigate the relay selection under outdated CSI in a Decode-and-Forward (DF) cooperative system to improve its outage performance. We formulize an optimization problem, where the set of relays that forwards data is optimized to minimize the probability of outage conditioned on the outdated CSI of all the decodable relays’ links. We then propose a novel multiple-relay selection strategy based on the solution of the optimization problem. Simulation results show that the proposed relay selection strategy achieves large improvement of outage performance compared with the existing relay selection strategies combating outdated CSI given in the literature.
Resumo:
In this paper, we investigate the secrecy performance of an energy harvesting relay system, where a legitimate source communicates with a legitimate destination via the assistance of multiple trusted relays. In the considered system, the source and relays deploy the time-switching-based radio frequency energy harvesting technique to harvest energy from a multi-antenna beacon. Different antenna selection and relay selection schemes are applied to enhance the security of the system. Specifically, two relay selection schemes based on the partial and full knowledge of channel state information, i.e., optimal relay selection and partial relay selection, and two antenna selection schemes for harvesting energy at source and relays, i.e., maximizing energy harvesting channel for the source and maximizing energy harvesting channel for the selected relay, are proposed. The exact and asymptotic expressions of secrecy outage probability in these schemes are derived. We demonstrate that applying relay selection approaches in the considered energy harvesting system can enhance the security performance. In particular, optimal relay selection scheme outperforms partial relay selection scheme and achieves full secrecy diversity order, regardless of energy harvesting scenarios.
Resumo:
In this paper, we investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels. In particular, the outdated channel state information is considered at the process of antenna selection due to feedback delay. Considering a practical passive eavesdropper scenario, we derive the exact and asymptotic closed-form expressions of secrecy outage probability, which enable us to evaluate the secrecy performance with high efficiency and present a new design insight into the impact of key parameters on the secrecy performance. In addition, the analytical results demonstrate that the achievable secrecy diversity order is only determined by the parameters of the secondary network, while other parameters related to primary or eavesdropper’s channels have a significantly impact on the secrecy coding gain.
Resumo:
We investigate the impact of co-channel interference on the security performance of multiple amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data transmission from the source to the destination. The relays are corrupted by multiple co-channel interferers, and the information transmitted from the relays to destination can be overheard by the eavesdropper. In order to deal with the interference and wiretap, the best out of N relays is selected for security enhancement. To this end, we derive a novel lower bound on the secrecy outage probability (SOP), which is then utilized to present two best relay selection criteria, based on the instantaneous and statistical channel information of the interfering links. For these criteria and the conventional maxmin criterion, we quantify the impact of co-channel interference and relay selection by deriving the lower bound on the SOP. Furthermore, we derive the asymptotic SOP for each criterion, to explicitly reveal the impact of transmit power allocation among interferers on the secrecy performance, which offers valuable insights into practical design. We demonstrate that all selection criteria achieve full secrecy diversity order N, while the proposed in this paper two criteria outperform the conventional max-min scheme.
Resumo:
Two dimensional flow of a micropolar fluid in a porous channel is investigated. The flow is driven by suction or injection at the channel walls, and the micropolar model due to Eringen is used to describe the working fluid. An extension of Berman's similarity transform is used to reduce the governing equations to a set of non-linear coupled ordinary differential equations. The latter are solved for large mass transfer via a perturbation analysis where the inverse of the cross-flow Reynolds number is used as the perturbing parameter. Complementary numerical solutions for strong injection are also obtained using a quasilinearisation scheme, and good agreement is observed between the solutions obtained from the perturbation analysis and the computations.
Resumo:
The specific mechanisms by which selective pressures affect individuals are often difficult to resolve. In tephritid fruit flies, males respond strongly and positively to certain plant derived chemicals. Sexual selection by female choice has been hypothesized as the mechanism driving this behaviour in certain species, as females preferentially mate with males that have fed on these chemicals. This hypothesis is, to date, based on studies of only very few species and its generality is largely untested. We tested the hypothesis on different spatial scales (small cage and seminatural field-cage) using the monophagous fruit fly, Bactrocera cacuminata. This species is known to respond to methyl eugenol (ME), a chemical found in many plant species and one upon which previous studies have focused. Contrary to expectation, no obvious female choice was apparent in selecting ME-fed males over unfed males as measured by the number of matings achieved over time, copulation duration, or time of copulation initiation. However, the number of matings achieved by ME-fed males was significantly greater than unfed males 16 and 32 days after exposure to ME in small cages (but not in a field-cage). This delayed advantage suggests that ME may not influence the pheromone system of B. cacuminata but may have other consequences, acting on some other fitness consequence (e.g., enhancement of physiology or survival) of male exposure to these chemicals. We discuss the ecological and evolutionary implications of our findings to explore alternate hypotheses to explain the patterns of response of dacine fruit flies to specific plant-derived chemicals.