url
stringlengths 14
1.76k
| text
stringlengths 100
1.02M
| metadata
stringlengths 1.06k
1.1k
|
---|---|---|
https://www.physicsforums.com/threads/damped-oscillator-problem-very-hard.270446/ | # Damped Oscillator Problem - Very Hard
1. Nov 8, 2008
### Dillio
1. The problem statement, all variables and given/known data
I have read the chapter twice and I have read through the notes several times to help me with the homework assignment. It deals with damped Harmonic Oscillations.
Problem:
You have a mass submerged horizontally in oil and a spring with a k of 85 N/m pulls on a mass of 250g in oil with a b = 0.07 Kg/s
1. What is the period of oscillation?
I found the angular frequency of the system and then used the 2(pi) / omega to find the period. I found this to be around 0.3407 seconds. Is this correct?
2. How long does it take for the amplitude to die down to 0.5 amplitude of the max? There seems to be nothing in the book or the notes that helps with solving this unless I am missing something. I do not know a distance (or position), Amplitude, or phase angle to use the equation found in the book.
I found an answer of 4.95 seconds but I am not sure if that is correct since no equation in the book solves something like this. I took the Amplitude term of the damped harmonic oscillator equation and set it equal to 0.5A and solved for t.
3. How long until the total energy is 0.5 the initial value? The book just gives the rate of energy loss in terms of a velocity value and a b value, which was not given.
Absolutely no clue here....
I appreciate ANY help! Thanks.
2. Nov 9, 2008
### alphysicist
Hi Dillio,
That looks right to me.
That looks right to me.
In #2 you found the time for the amplitude to reach half of its starting value.
For #3, when the energy is half of its value, what is the amplitude (compared to the original amplitude)? Once you answer that you can follow the same procedure you used in #2.
3. Nov 9, 2008
### Dillio
I used E = 0.5kA^2 and found A to be equal to sqrt([2E]/k). To solve for the energy when it is one half of its original value. I made the second energy equation: 05E = 0.5kA^2. I solved for this amplitude and found sqrt(E/k). That means the second amplitude is related to the initial energy by: E/sqrt(2)
I solved this for t in the amplitude equation and actually found 2.4 seconds, which is about half the time value I found in part 2. Does this make sense?
Similar Discussions: Damped Oscillator Problem - Very Hard | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8543029427528381, "perplexity": 419.107197738967}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00839.warc.gz"} |
http://wiki.math.toronto.edu/TorontoMathWiki/index.php?title=Topology_of_Algebraic_Varieties_Learning_Seminar&oldid=3953 | # Topology of Algebraic Varieties Learning Seminar
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
A learning seminar on topology of algebraic varieties. We meet on Tuesdays 9:30-11:00 in BA 6180.
Topics We will cover some subset of the following topics: Lefschetz theorems, Hodge decomposition, intersection homology, decomposition theorem, perverse sheaves, mixed Hodge structures, with applications to toric varieties, geometric Satake correspondence, and Ngo's proof of the fundamental Lemma.
References
1. Our main reference is the survey paper "The decomposition theorem, perverse sheaves, and the topology of algebraic maps" by Cataldo and Migliorini, recently published in the Bulletin of the AMS and available here: http://front.math.ucdavis.edu/0712.0349
2. "Intersection homology theory" by Goresky and MacPherson.
3. Introduction to intersection homology theory by Kirwan.
4. Notes on Perverse Sheaves and Vanishing Cycles by David B. Massey http://arxiv.org/abs/math/9908107v2
5. Algebraic Geometry over the complex numbers by Arapura http://www.math.purdue.edu/~dvb/book.html
6. Intersection homology II, by Goresky and MacPherson.
Schedule
1. Jan 12, Smooth projective varieties, cohomology, and Lefschetz theorems (1.1), Joel
2. Jan 19, Families of projective varieties, monodromy, and degeneration of Leray-Serre spectral sequence (1.2) Stephen
3. Jan 26, Intersection homology (topological approach), decomposition and examples (1.3, 1.4) Misha M
4. Feb 2, Intersection homology (topological approach), decomposition and examples #2 (1.3, 1.4) Misha M
5. Feb 9, Cohomology of Sheaves and Derived Categories (1.5) Arthur
6. Feb 23, Cohomology of Sheaves and Derived Categories / IC Sheaves + Perverse Sheaves - Arthur/Omar
7. Mar 2, IC Sheaves + Perverse Sheaves (2.1, 2.2) Omar
8. Mar 9, Perverse Sheaves + Decomposition theorem - Omar/Chris (1.6, 1.8)
9. Mar 16, Decomposition theorem examples - Chris
10. Mar 23, Semismall maps and Springer theory I (4.2) Sergey
11. Mar 30, Semismall maps and Springer theory II (4.2) Sergey
12. April 13, Sheaf to functions and Kazhdan-Lusztig polynomial (4.3,4.4) Brad
13. April 15, Geometric Satake isomorphism (4.5) Bruce
14. April 20, Riemann-Hilbert Correspondence, Dan
Also it would be nice to have a couple of talks on Hodge theory at some point. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8784677982330322, "perplexity": 4033.164972127705}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704253666/warc/CC-MAIN-20130516113733-00010-ip-10-60-113-184.ec2.internal.warc.gz"} |
https://www.physicsforums.com/threads/commutator-of-4-momentum-and-position.263707/ | # Commutator of 4-momentum and position
1. Oct 12, 2008
### kilokhan
Is there a commutation relation between $x^{\mu}$ and $\partial^{\nu}$ if you treat them as operators? I think I will need that to prove this
$[J J^{\mu \nu}, J^{\rho \sigma}] = i (g^{\nu \rho} J^{\mu \sigma} - g^{\mu \rho} J^{\nu \sigma} - g^{\nu \sigma} J^{\mu \rho} + g^{\mu \sigma} J^{\nu \rho})$
Where the generators are defined as
$J J^{\mu \nu} = i (x^{\mu} \partial^{\nu} - x^{\nu} \partial^{\mu})$
Last edited: Oct 12, 2008
2. Oct 12, 2008
### kilokhan
Never mind, I found the appropriate relation, $\partial_{\mu}x^{\nu}=g^{\mu \nu}$
But I'm not entirely sure why this is true. If someone could explain that would be great. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9837374687194824, "perplexity": 648.4650176813099}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719564.4/warc/CC-MAIN-20161020183839-00357-ip-10-171-6-4.ec2.internal.warc.gz"} |
https://danmackinlay.name/notebook/point_processes.html | # Point processes
Another intermittent obsession, tentatively placemarked. Discrete-state random fields/processes with a continuous index. In general I also assume they are non-lattice and simple, which terms I will define if I need them.
The most interesting class for me are the branching processes.
I’ve just spent 6 months thinking about nothing else, so I won’t write much here.
There are comprehensive introductions.
A curious thing is that much point process estimation theory concerns estimating statistics from a single realisation of the point process. But in fact you may have many point process realisations. This is not news per se, just a new emphasis.
## Temporal point processes
Sometimes including spatiotemporal point processes, depending on mood.
In these, one has an arrow of time which simplifies things because you know that you “only need to consider the past of a process to understand its future”, which potentially simplifies many calculations about the conditional intensity processes; We consider only interactions from the past to the future, rather than some kind of mutual interaction.
In particular, for nice processes you can do fairly cheap likelihood calculations to estimate process parameters etc.
Using the regular point process representation of the probability density of the occurrences, we have the following joint log likelihood for all the occurrences
\begin{aligned} L_\theta(t_{1:N}) &:= -\int_0^T\lambda^*_\theta(t)dt + \int_0^T\log \lambda^*_\theta(t) dN_t\\ &= -\int_0^T\lambda^*_\theta(t)dt + \sum_{j} \log \lambda^*_\theta(t_j) \end{aligned}
I do a lot of this, for example, over at the branching processes notebook, and I have no use at the moment for other types of process, so I won’t say much about other cases for the moment.
## Spatial point processes
Processes without an arrow of time arise naturally, say as processes where you observe only snaphosts of the dynamics, or where whatever dynamics that gave rise to the process being too slow to be considered as anything but static (forests).
## References
Aalen, Odd. 1978. “Nonparametric Inference for a Family of Counting Processes.” The Annals of Statistics 6 (4): 701–26. https://doi.org/10.1214/aos/1176344247.
Aalen, Odd O. 1989. “A Linear Regression Model for the Analysis of Life Times.” Statistics in Medicine 8 (8): 907–25. https://doi.org/10.1002/sim.4780080803.
Achab, Massil, Emmanuel Bacry, Stéphane Gaïffas, Iacopo Mastromatteo, and Jean-Francois Muzy. 2017. “Uncovering Causality from Multivariate Hawkes Integrated Cumulants.” In PMLR. http://arxiv.org/abs/1607.06333.
Adams, Ryan Prescott, Iain Murray, and David J. C. MacKay. 2009. “Tractable Nonparametric Bayesian Inference in Poisson Processes with Gaussian Process Intensities.” In, 1–8. ACM Press. https://doi.org/10.1145/1553374.1553376.
Adelfio, Giada, and Frederic Paik Schoenberg. 2009. “Point Process Diagnostics Based on Weighted Second-Order Statistics and Their Asymptotic Properties.” Annals of the Institute of Statistical Mathematics 61 (4): 929–48. https://doi.org/10.1007/s10463-008-0177-1.
Andersen, Per Kragh, Ornulf Borgan, Richard D. Gill, and Niels Keiding. 1997. Statistical Models Based on Counting Processes. Corr. 2. print. Springer Series in Statistics. New York, NY: Springer.
Anselin, Luc, Jacqueline Cohen, David Cook, Wilpen Gorr, and George Tita. 2000. “Spatial Analyses of Crime.” http://dds.cepal.org/infancia/guide-to-estimating-child-poverty/bibliografia/capitulo-IV/Anselin.
Arora, Sanjeev, Rong Ge, Tengyu Ma, and Ankur Moitra. 2015. “Simple, Efficient, and Neural Algorithms for Sparse Coding.” In Proceedings of The 28th Conference on Learning Theory, 40:113–49. Paris, France: PMLR. http://proceedings.mlr.press/v40/Arora15.html.
Arribas-Gil, Ana, and Hans-Georg Müller. 2014. “Pairwise Dynamic Time Warping for Event Data.” Computational Statistics & Data Analysis 69 (January): 255–68. https://doi.org/10.1016/j.csda.2013.08.011.
Azizpour, Shariar, Kay Giesecke, and others. 2008. “Self-Exciting Corporate Defaults: Contagion Vs. Frailty.” Stanford University working paper series. http://web.stanford.edu/dept/MSandE/cgi-bin/people/faculty/giesecke/pdfs/selfexciting.pdf.
Bacry, Emmanuel, Martin Bompaire, Stéphane Gaïffas, and Jean-Francois Muzy. 2020. “Sparse and Low-Rank Multivariate Hawkes Processes.” Journal of Machine Learning Research 21 (50): 1–32. http://jmlr.org/papers/v21/15-114.html.
Bacry, Emmanuel, and Jean-François Muzy. 2014. “Hawkes Model for Price and Trades High-Frequency Dynamics.” Quantitative Finance 14 (7): 1147–66. https://doi.org/10.1080/14697688.2014.897000.
———. 2016. “First- and Second-Order Statistics Characterization of Hawkes Processes and Non-Parametric Estimation.” IEEE Transactions on Information Theory 62 (4, 4): 2184–2202. https://doi.org/10.1109/TIT.2016.2533397.
Baddeley, A. J., and Marie-Colette NM Van Lieshout. 1995. “Area-Interaction Point Processes.” Annals of the Institute of Statistical Mathematics 47 (4): 601–19. https://doi.org/10.1007/BF01856536.
Baddeley, A. J., Marie-Colette NM Van Lieshout, and J. Møller. 1996. “Markov Properties of Cluster Processes.” Advances in Applied Probability 28 (2): 346–55. https://doi.org/10.2307/1428060.
Baddeley, A., R. Turner, J. Møller, and M. Hazelton. 2005. “Residual Analysis for Spatial Point Processes (with Discussion).” Journal of the Royal Statistical Society: Series B (Statistical Methodology) 67 (5): 617–66. https://doi.org/10.1111/j.1467-9868.2005.00519.x.
Baddeley, Adrian. 2007. “Spatial Point Processes and Their Applications.” In Stochastic Geometry, edited by Wolfgang Weil, 1–75. Lecture Notes in Mathematics 1892. Springer Berlin Heidelberg. http://ahvaz.ist.unomaha.edu/azad/temp/sac/07-baddeley-point-process-poisson-coverage-sensor-simulation.pdf.
Baddeley, Adrian J, Jesper Møller, and Rasmus Plenge Waagepetersen. 2000. “Non- and Semi-Parametric Estimation of Interaction in Inhomogeneous Point Patterns.” Statistica Neerlandica 54 (3): 329–50. https://doi.org/10.1111/1467-9574.00144.
Baddeley, Adrian, Pablo Gregori, Jorge Mateu, Radu Stoica, and Dietrich Stoyan. 2006. Case Studies in Spatial Point Process Modeling. Vol. 185. Springer. http://link.springer.com/content/pdf/10.1007/0-387-31144-0.pdf.
Baddeley, Adrian, and Jesper Møller. 1989. “Nearest-Neighbour Markov Point Processes and Random Sets.” International Statistical Review / Revue Internationale de Statistique 57 (2): 89–121. https://doi.org/10.2307/1403381.
Baddeley, Adrian, Jesper Møller, and Anthony G. Pakes. 2008. “Properties of Residuals for Spatial Point Processes.” Annals of the Institute of Statistical Mathematics 60 (3): 627–49. http://link.springer.com/article/10.1007/s10463-007-0116-6.
Baddeley, Adrian, and Rolf Turner. 2000. “Practical Maximum Pseudolikelihood for Spatial Point Patterns.” Australian & New Zealand Journal of Statistics 42 (3): 283–322. https://doi.org/10.1111/1467-842X.00128.
———. 2006. “Modelling Spatial Point Patterns in R.” In Case Studies in Spatial Point Process Modeling, edited by Adrian Baddeley, Pablo Gregori, Jorge Mateu, Radu Stoica, and Dietrich Stoyan, 23–74. Lecture Notes in Statistics 185. Springer New York. http://link.springer.com/chapter/10.1007/0-387-31144-0_2.
Bai, Fangfang, Feng Chen, and Kani Chen. 2015. “Semiparametric Estimation of a Self-Exciting Regression Model with an Appication in Recurrent Event Data Analysis.” Statistica Sinica. https://doi.org/10.5705/ss.2013.217.
Barbieri, Riccardo, Michael C Quirk, Loren M Frank, Matthew A Wilson, and Emery N Brown. 2001. “Construction and Analysis of Non-Poisson Stimulus-Response Models of Neural Spiking Activity.” Journal of Neuroscience Methods 105 (1): 25–37. https://doi.org/10.1016/S0165-0270(00)00344-7.
Barbour, A. D. 1988/ed. “Stein’s Method and Poisson Process Convergence.” Journal of Applied Probability 25 (A): 175–84. https://doi.org/10.2307/3214155.
Barbour, A. D., and T. C. Brown. 1992. “Stein’s Method and Point Process Approximation.” Stochastic Processes and Their Applications 43 (1): 9–31. https://doi.org/10.1016/0304-4149(92)90073-Y.
Barron, A. R., and T. M. Cover. 1991. “Minimum Complexity Density Estimation.” IEEE Transactions on Information Theory 37 (4): 1034–54. https://doi.org/10.1109/18.86996.
Basawa, Ishwar. 1980. Statistical Inference for Stochastic Processes. Academic Press.
Bashtannyk, David M., and Rob J. Hyndman. 2001. “Bandwidth Selection for Kernel Conditional Density Estimation.” Computational Statistics & Data Analysis 36 (3): 279–98. https://doi.org/10.1016/S0167-9473(00)00046-3.
Bauwens, Luc, and Nikolaus Hautsch. 2006. “Stochastic Conditional Intensity Processes.” Journal of Financial Econometrics 4 (3): 450–93. https://doi.org/10.1093/jjfinec/nbj013.
Benichoux, Alexis, Emmanuel Vincent, and Rémi Gribonval. 2013. “A Fundamental Pitfall in Blind Deconvolution with Sparse and Shift-Invariant Priors.” In ICASSP-38th International Conference on Acoustics, Speech, and Signal Processing-2013. https://hal.inria.fr/hal-00800770/.
Berman, Mark, and Peter Diggle. 1989. “Estimating Weighted Integrals of the Second-Order Intensity of a Spatial Point Process.” Journal of the Royal Statistical Society. Series B (Methodological) 51 (1): 81–92. https://publications.csiro.au/rpr/pub?list=BRO&pid=procite:d5b7ecd7-435c-4dab-9063-f1cf2fbdf4cb.
Berman, Mark, and T. Rolf Turner. 1992. “Approximating Point Process Likelihoods with GLIM.” Journal of the Royal Statistical Society. Series C (Applied Statistics) 41 (1): 31–38. https://doi.org/10.2307/2347614.
Besag, Julian. 1977. “Efficiency of Pseudolikelihood Estimation for Simple Gaussian Fields.” Biometrika 64 (3): 616–18. https://doi.org/10.2307/2345341.
Bowsher, Clive G. 2007. “Modelling Security Market Events in Continuous Time: Intensity Based, Multivariate Point Process Models.” Journal of Econometrics 141 (2): 876–912. https://doi.org/10.1016/j.jeconom.2006.11.007.
Brémaud, P., and L. Massoulié. 2002. “Power Spectra of General Shot Noises and Hawkes Point Processes with a Random Excitation.” Advances in Applied Probability 34 (1): 205–22. https://doi.org/10.1239/aap/1019160957.
Brémaud, Pierre. 1972. “A Martingale Approach to Point Processes.” University of California, Berkeley.
Brémaud, Pierre, Laurent Massoulié, and Andrea Ridolfi. 2005. “Power Spectra of Random Spike Fields and Related Processes.” Advances in Applied Probability 37 (4): 1116–46. https://doi.org/10.1239/aap/1134587756.
Brix, Anders, and Wilfrid S. Kendall. 2002. “Simulation of Cluster Point Processes Without Edge Effects.” Advances in Applied Probability 34 (2): 267–80. https://doi.org/10.1239/aap/1025131217.
Brown, Lawrence D., T. Tony Cai, and Harrison H. Zhou. 2010. “Nonparametric Regression in Exponential Families.” The Annals of Statistics 38 (4): 2005–46. https://doi.org/10.1214/09-AOS762.
Buckley, M. J., G. K. Eagleson, and B. W. Silverman. 1988. “The Estimation of Residual Variance in Nonparametric Regression.” Biometrika 75 (2): 189–99. https://doi.org/10.1093/biomet/75.2.189.
Chang, C., and F. P. Schoenberg. 2008. “Testing Separability in Multi-Dimensional Point Processes with Covariates.” Annals of the Institute of Statistical Mathematics.
Chang, Yi-Ping. 2001. “Estimation of Parameters for Nonhomogeneous Poisson Process: Software Reliability with Change-Point Model.” Communications in Statistics - Simulation and Computation 30 (3): 623–35. https://doi.org/10.1081/SAC-100105083.
Chaudhuri, Probal. 1991. “Nonparametric Estimates of Regression Quantiles and Their Local Bahadur Representation.” The Annals of Statistics 19 (2): 760–77. https://doi.org/10.1214/aos/1176348119.
Chen, Feng, and Peter Hall. 2013. “Inference for a Nonstationary Self-Exciting Point Process with an Application in Ultra-High Frequency Financial Data Modeling.” Journal of Applied Probability 50 (4): 1006–24. https://doi.org/10.1239/jap/1389370096.
Chen, Feng, Richard M. Huggins, Paul S. F. Yip, and K. F. Lam. 2008. “Local Polynomial Estimation of Poisson Intensities in the Presence of Reporting Delays.” Journal of the Royal Statistical Society: Series C (Applied Statistics) 57 (4): 447–59. https://doi.org/10.1111/j.1467-9876.2008.00624.x.
Chen, Feng, and Tom Stindl. 2017. “Direct Likelihood Evaluation for the Renewal Hawkes Process.” Journal of Computational and Graphical Statistics 27 (1): 1–13. https://doi.org/10.1080/10618600.2017.1341324.
Chen, Feng, Paul S. F. Yip, and K. F. Lam. 2011. “On the Local Polynomial Estimators of the Counting Process Intensity Function and Its Derivatives.” Scandinavian Journal of Statistics 38 (4): 631–49. https://doi.org/10.1111/j.1467-9469.2011.00733.x.
Chen, Louis H. Y., and Aihua Xia. 2011. “Poisson Process Approximation for Dependent Superposition of Point Processes.” Bernoulli 17 (2): 530–44. https://doi.org/10.3150/10-BEJ290.
Cheng, Tao, and Thomas Wicks. 2014. “Event Detection Using Twitter: A Spatio-Temporal Approach.” PLoS ONE 9 (6): e97807. https://doi.org/10.1371/journal.pone.0097807.
Chilinski, Pawel, and Ricardo Silva. 2020. “Neural Likelihoods via Cumulative Distribution Functions.” June 6, 2020. http://arxiv.org/abs/1811.00974.
Claeskens, Gerda, Tatyana Krivobokova, and Jean D. Opsomer. 2009. “Asymptotic Properties of Penalized Spline Estimators.” Biometrika 96 (3): 529–44. https://doi.org/10.1093/biomet/asp035.
Cox, D. R. 1965. “On the Estimation of the Intensity Function of a Stationary Point Process.” Journal of the Royal Statistical Society: Series B (Methodological) 27 (2): 332–37. https://doi.org/10.1111/j.2517-6161.1965.tb01500.x.
Cox, Dennis D., and Finbarr O’Sullivan. 1990. “Asymptotic Analysis of Penalized Likelihood and Related Estimators.” The Annals of Statistics 18 (4): 1676–95. https://doi.org/10.1214/aos/1176347872.
Crisan, Dan, and Joaquín Míguez. 2014. “Particle-Kernel Estimation of the Filter Density in State-Space Models.” Bernoulli 20 (4): 1879–929. https://doi.org/10.3150/13-BEJ545.
Cronie, O., and M. N. M. van Lieshout. 2016. “Bandwidth Selection for Kernel Estimators of the Spatial Intensity Function.” November 30, 2016. http://arxiv.org/abs/1611.10221.
Cucala, Lionel. 2008. “Intensity Estimation for Spatial Point Processes Observed with Noise.” Scandinavian Journal of Statistics 35 (2): 322–34. https://doi.org/10.1111/j.1467-9469.2007.00583.x.
Cui, Yunwei, and Robert Lund. 2009. “A New Look at Time Series of Counts.” Biometrika 96 (4): 781–92. https://doi.org/10.1093/biomet/asp057.
Cunningham, John P., Krishna V. Shenoy, and Maneesh Sahani. 2008. “Fast Gaussian Process Methods for Point Process Intensity Estimation.” In Proceedings of the 25th International Conference on Machine Learning, 192–99. ICML ’08. New York, NY, USA: ACM Press. https://doi.org/10.1145/1390156.1390181.
Dahlhaus, Rainer, and Michael Eichler. 2003. “Causality and Graphical Models in Time Series Analysis.” Oxford Statistical Science Series, 115–37. http://galton.uchicago.edu/ eichler/hsss.pdf.
Dahlhaus, Rainer, and Wolfgang Polonik. 2009. “Empirical Spectral Processes for Locally Stationary Time Series.” Bernoulli 15 (1): 1–39. https://doi.org/10.3150/08-BEJ137.
Daley, Daryl J., and David Vere-Jones. 2003. An Introduction to the Theory of Point Processes. 2nd ed. Vol. 1. Elementary theory and methods. New York: Springer. http://ebooks.springerlink.com/UrlApi.aspx?action=summary&v=1&bookid=108085.
———. 2008. An Introduction to the Theory of Point Processes. 2nd ed. Vol. 2. General theory and structure. Probability and Its Applications. New York: Springer. http://link.springer.com/chapter/10.1007/978-0-387-49835-5_7.
Daneshmand, Hadi, Manuel Gomez-Rodriguez, Le Song, and Bernhard Schölkopf. 2014. “Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-Thresholding Algorithm.” In ICML. http://arxiv.org/abs/1405.2936.
Das, Sanjiv R., Darrell Duffie, Nikunj Kapadia, and Leandro Saita. 2007. “Common Failings: How Corporate Defaults Are Correlated.” The Journal of Finance 62 (1): 93–117. https://doi.org/10.1111/j.1540-6261.2007.01202.x.
Diaconis, Persi, and David Freedman. 1984. “Asymptotics of Graphical Projection Pursuit.” The Annals of Statistics 12 (3): 793–815. http://www.jstor.org/stable/2240961.
Diggle, Peter. 1985. “A Kernel Method for Smoothing Point Process Data.” Journal of the Royal Statistical Society. Series C (Applied Statistics) 34 (2): 138–47. https://doi.org/10.2307/2347366.
Diggle, Peter J. 1979. “On Parameter Estimation and Goodness-of-Fit Testing for Spatial Point Patterns.” Biometrics 35 (1): 87–101. https://doi.org/10.2307/2529938.
Díaz-Avalos, Carlos, P. Juan, and J. Mateu. 2012. “Similarity Measures of Conditional Intensity Functions to Test Separability in Multidimensional Point Processes.” Stochastic Environmental Research and Risk Assessment 27 (5): 1193–1205. https://doi.org/10.1007/s00477-012-0654-1.
Drovandi, Christopher C., Anthony N. Pettitt, and Roy A. McCutchan. 2016. “Exact and Approximate Bayesian Inference for Low Integer-Valued Time Series Models with Intractable Likelihoods.” Bayesian Analysis 11 (2): 325–52. https://doi.org/10.1214/15-BA950.
Eden, U, L Frank, R Barbieri, V Solo, and E Brown. 2004. “Dynamic Analysis of Neural Encoding by Point Process Adaptive Filtering.” Neural Computation 16 (5): 971–98. https://doi.org/10.1162/089976604773135069.
Eichler, Michael, Rainer Dahlhaus, and Johannes Dueck. 2016. “Graphical Modeling for Multivariate Hawkes Processes with Nonparametric Link Functions.” Journal of Time Series Analysis, January, n/a–. https://doi.org/10.1111/jtsa.12213.
Ellis, Steven P. 1991. “Density Estimation for Point Processes.” Stochastic Processes and Their Applications 39 (2): 345–58. https://doi.org/10.1016/0304-4149(91)90087-S.
Embrechts, Paul, Thomas Liniger, and Lu Lin. 2011. “Multivariate Hawkes Processes: An Application to Financial Data.” Journal of Applied Probability 48A (August): 367–78. https://doi.org/10.1239/jap/1318940477.
Fan, Jianqing, and Runze Li. 2001. “Variable Selection via Nonconcave Penalized Likelihood and Its Oracle Properties.” Journal of the American Statistical Association 96 (456): 1348–60. https://doi.org/10.1198/016214501753382273.
Fatalov, V. R. 2012. “Integral Functionals for the Exponential of the Wiener Process and the Brownian Bridge: Exact Asymptotics and Legendre Functions.” Mathematical Notes 92 (1-2): 79–98. https://doi.org/10.1134/S0001434612070103.
Feigin, Paul David. 1976. “Maximum Likelihood Estimation for Continuous-Time Stochastic Processes.” Advances in Applied Probability 8 (4): 712–36. https://doi.org/10.2307/1425931.
Filimonov, Vladimir, and Didier Sornette. 2013. “Apparent Criticality and Calibration Issues in the Hawkes Self-Excited Point Process Model: Application to High-Frequency Financial Data.” SSRN Scholarly Paper ID 2371284. Rochester, NY: Social Science Research Network. http://arxiv.org/abs/1308.6756.
Flaxman, Seth, Yee Whye Teh, and Dino Sejdinovic. 2016. “Poisson Intensity Estimation with Reproducing Kernels.” October 27, 2016. http://arxiv.org/abs/1610.08623.
Gaïffas, Stéphane, and Agathe Guilloux. 2012. “High-Dimensional Additive Hazards Models and the Lasso.” Electronic Journal of Statistics 6: 522–46. https://doi.org/10.1214/12-EJS681.
Geer, Sara van de. 1995. “Exponential Inequalities for Martingales, with Application to Maximum Likelihood Estimation for Counting Processes.” The Annals of Statistics 23 (5): 1779–1801. https://doi.org/10.1214/aos/1176324323.
Geer, Sara van de, Peter Bühlmann, Ya’acov Ritov, and Ruben Dezeure. 2014. “On Asymptotically Optimal Confidence Regions and Tests for High-Dimensional Models.” The Annals of Statistics 42 (3): 1166–1202. https://doi.org/10.1214/14-AOS1221.
Geyer, Charles J., and Jesper Møller. 1994. “Simulation Procedures and Likelihood Inference for Spatial Point Processes.” Scandinavian Journal of Statistics, 359–73. http://www.jstor.org/stable/4616323.
Giesecke, K., H. Kakavand, and M. Mousavi. 2008. “Simulating Point Processes by Intensity Projection.” In Simulation Conference, 2008. WSC 2008. Winter, 560–68. https://doi.org/10.1109/WSC.2008.4736114.
———. 2011. “Exact Simulation of Point Processes with Stochastic Intensities.” Operations Research 59 (5): 1233–45. https://doi.org/10.1287/opre.1110.0962.
Giesecke, Kay, and Gustavo Schwenkler. 2011. “Filtered Likelihood for Point Processes.” SSRN Scholarly Paper ID 1898344. Rochester, NY: Social Science Research Network. http://www.stanford.edu/~gschwenk/pdf/filtered_rev3.pdf.
Goulard, Michel, Aila Särkkä, and Pavel Grabarnik. 1996. “Parameter Estimation for Marked Gibbs Point Processes Through the Maximum Pseudo-Likelihood Method.” Scandinavian Journal of Statistics, 365–79. http://www.jstor.org/stable/4616410.
Green, Peter J. 1987. “Penalized Likelihood for General Semi-Parametric Regression Models.” International Statistical Review / Revue Internationale de Statistique 55 (3): 245–59. https://doi.org/10.2307/1403404.
Guan, Yongtao. 2008a. “Variance Estimation for Statistics Computed from Inhomogeneous Spatial Point Processes.” Journal of the Royal Statistical Society: Series B (Statistical Methodology) 70 (1): 175–90. http://moya.bus.miami.edu/ yguan/Papers/Papers.
———. 2008b. “A Goodness-of-Fit Test for Inhomogeneous Spatial Poisson Processes.” Biometrika 95 (4): 831–45. https://doi.org/10.1093/biomet/asn045.
Guan, Yongtao, and Michael Sherman. 2007. “On Least Squares Fitting for Stationary Spatial Point Processes.” Journal of the Royal Statistical Society: Series B (Statistical Methodology) 69 (1): 31–49. https://doi.org/10.1111/j.1467-9868.2007.00575.x.
Gui, Jiang, and Hongzhe Li. 2005. “Penalized Cox Regression Analysis in the High-Dimensional and Low-Sample Size Settings, with Applications to Microarray Gene Expression Data.” Bioinformatics 21 (13): 3001–8. https://doi.org/10.1093/bioinformatics/bti422.
Hansen, Niels Richard. 2010. “Penalized Maximum Likelihood Estimation for Generalized Linear Point Processes.” March 3, 2010. http://arxiv.org/abs/1003.0848.
Hansen, Niels Richard, Patricia Reynaud-Bouret, and Vincent Rivoirard. 2015. “Lasso and Probabilistic Inequalities for Multivariate Point Processes.” Bernoulli 21 (1): 83–143. https://doi.org/10.3150/13-BEJ562.
Hardiman, Stephen J., and Jean-Philippe Bouchaud. 2014. “Branching-Ratio Approximation for the Self-Exciting Hawkes Process.” Physical Review E 90 (6): 062807. https://doi.org/10.1103/PhysRevE.90.062807.
Harte, David. 2010. PtProcess: An R Package for Modelling Marked Point Processes Indexed by Time.” Journal of Statistical Software 35 (8): 1–32. http://www.jstatsoft.org/v35/i08.
Haslinger, Robert, Gordon Pipa, and Emery Brown. 2010. “Discrete Time Rescaling Theorem: Determining Goodness of Fit for Discrete Time Statistical Models of Neural Spiking.” Neural Computation 22 (10): 2477–2506. https://doi.org/10.1162/NECO_a_00015.
Hawe, S., M. Kleinsteuber, and K. Diepold. 2013. “Analysis Operator Learning and Its Application to Image Reconstruction.” IEEE Transactions on Image Processing 22 (6): 2138–50. https://doi.org/10.1109/TIP.2013.2246175.
Hawkes, Alan G. 1971a. “Point Spectra of Some Mutually Exciting Point Processes.” Journal of the Royal Statistical Society. Series B (Methodological) 33 (3): 438–43. https://www.researchgate.net/profile/Alan_Hawkes2/publication/266241162_Point_spectra_of_some_mutually_exciting_point_process/links/56bb0ffa08ae0a6bc955f936.pdf.
———. 1971b. “Spectra of Some Self-Exciting and Mutually Exciting Point Processes.” Biometrika 58 (1): 83–90. https://doi.org/10.1093/biomet/58.1.83.
Häggström, Olle, Marie-Colette N. M. van Lieshout, and Jesper Møller. 1999. “Characterization Results and Markov Chain Monte Carlo Algorithms Including Exact Simulation for Some Spatial Point Processes.” Bernoulli 5 (4): 641–58. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1330.
Helmers, Roelof, and I. Wayan Mangku. 1999. “Statistical Estimation of Poisson Intensity Functions.” ANN. INST. STAT. MATH 51: 265–80.
Hosmer, David W. 2011. Applied Survival Analysis: Regression Modeling of Time-To-Event Data. Wiley-Interscience.
Huang, Fuchun, and Yosihiko Ogata. 1999. “Improvements of the Maximum Pseudo-Likelihood Estimators in Various Spatial Statistical Models.” Journal of Computational and Graphical Statistics 8 (3): 510–30. https://doi.org/10.1080/10618600.1999.10474829.
Hurvich, Clifford M., Jeffrey S. Simonoff, and Chih-Ling Tsai. 1998. “Smoothing Parameter Selection in Nonparametric Regression Using an Improved Akaike Information Criterion.” Journal of the Royal Statistical Society. Series B (Statistical Methodology) 60 (2): 271–93. http://www.jstor.org/stable/2985940.
Iribarren, José Luis, and Esteban Moro. 2011. “Branching Dynamics of Viral Information Spreading.” Physical Review E 84 (4): 046116. https://doi.org/10.1103/PhysRevE.84.046116.
Jensen, Jens Ledet, and Hans R. Künsch. 1994. “On Asymptotic Normality of Pseudo Likelihood Estimates for Pairwise Interaction Processes.” Annals of the Institute of Statistical Mathematics 46 (3): 475–86. https://doi.org/10.1007/BF00773511.
Jensen, Jens Ledet, and Jesper Møller. 1991. “Pseudolikelihood for Exponential Family Models of Spatial Point Processes.” The Annals of Applied Probability 1 (3): 445–61. https://doi.org/10.1214/aoap/1177005877.
Jovanović, Stojan, John Hertz, and Stefan Rotter. 2015. “Cumulants of Hawkes Point Processes.” Physical Review E 91 (4): 042802. https://doi.org/10.1103/PhysRevE.91.042802.
Juban, Jérémie, Lionel Fugon, and Georges Kariniotakis. 2007. “Probabilistic Short-Term Wind Power Forecasting Based on Kernel Density Estimators.” In. https://hal-mines-paristech.archives-ouvertes.fr/hal-00526011/document.
Karr, Alan F. 1986. Point Processes and Their Statistical Inference. New York: Marcel Dekker Inc. http://books.google.com?id=Gdgx6RPp40EC.
Kass, Robert E., Shun-Ichi Amari, Kensuke Arai, Emery N. Brown, Casey O. Diekman, Markus Diesmann, Brent Doiron, et al. 2018. “Computational Neuroscience: Mathematical and Statistical Perspectives.” Annual Review of Statistics and Its Application 5 (1): 183–214. https://doi.org/10.1146/annurev-statistics-041715-033733.
Koenker, Roger, and Kevin F. Hallock. 2001. “Quantile Regression.” The Journal of Economic Perspectives 15 (4): 143–56. http://ajbuckeconbikesail.net/Econ616/Quantile/Koenker-Hallock.pdf.
Koenker, Roger, and José A. F. Machado. 1999. “Goodness of Fit and Related Inference Processes for Quantile Regression.” Journal of the American Statistical Association 94 (448): 1296–1310. https://doi.org/10.1080/01621459.1999.10473882.
Koenker, Roger, and Ivan Mizera. 2006. “Density Estimation by Total Variation Regularization.” Advances in Statistical Modeling and Inference, 613–34. http://ysidro.econ.uiuc.edu/ roger/research/densiles/Doksum.pdf.
Konishi, Sadanori, and Genshiro Kitagawa. 1996. “Generalised Information Criteria in Model Selection.” Biometrika 83 (4): 875–90. https://doi.org/10.1093/biomet/83.4.875.
Kroese, Dirk P., and Zdravko I. Botev. 2013. “Spatial Process Generation.” August 1, 2013. http://arxiv.org/abs/1308.0399.
Kroll, Martin. 2016. “Concentration Inequalities for Poisson Point Processes with Application to Adaptive Intensity Estimation.” December 23, 2016. http://arxiv.org/abs/1612.07901.
Kvitkovičová, Andrea, and Victor M. Panaretos. 2011. “Asymptotic Inference for Partially Observed Branching Processes.” Advances in Applied Probability 43 (4): 1166–90. https://doi.org/10.1239/aap/1324045703.
Kwieciński, Andrzej, and Ryszard Szekli. 1996. “Some Monotonicity and Dependence Properties of Self-Exciting Point Processes.” The Annals of Applied Probability 6 (4): 1211–31. http://www.jstor.org/stable/2245152.
Lewis, Erik, George Mohler, P. Jeffrey Brantingham, and Andrea L. Bertozzi. 2012. “Self-Exciting Point Process Models of Civilian Deaths in Iraq.” Security Journal 25 (3): 244–64. https://doi.org/10.1057/sj.2011.21.
Lieshout, Marie-Colette N. M. van. 2011. “On Estimation of the Intensity Function of a Point Process.” Methodology and Computing in Applied Probability 14 (3): 567–78. https://doi.org/10.1007/s11009-011-9244-9.
Lieshout, Marie-Colette NM van. 2000. Markov Point Processes and Their Applications. London: Imperial College Press.
Lindsey, J. K. 1995. “Fitting Parametric Counting Processes by Using Log-Linear Models.” Journal of the Royal Statistical Society. Series C (Applied Statistics) 44 (2): 201–12. https://doi.org/10.2307/2986345.
Mairal, Julien, Francis Bach, Jean Ponce, and Guillermo Sapiro. 2009. “Online Dictionary Learning for Sparse Coding.” In Proceedings of the 26th Annual International Conference on Machine Learning, 689–96. ICML ’09. New York, NY, USA: ACM. https://doi.org/10.1145/1553374.1553463.
Marcus, Gary, Adam Marblestone, and Thomas Dean. 2014. “The Atoms of Neural Computation.” Science 346 (6209): 551–52. https://doi.org/10.1126/science.1261661.
Martin, James S., Ajay Jasra, and Emma McCoy. 2013. “Inference for a Class of Partially Observed Point Process Models.” Annals of the Institute of Statistical Mathematics 65 (3): 413–37. https://doi.org/10.1007/s10463-012-0375-8.
Marzen, S. E., and J. P. Crutchfield. 2020. “Inference, Prediction, and Entropy-Rate Estimation of Continuous-Time, Discrete-Event Processes.” May 7, 2020. http://arxiv.org/abs/2005.03750.
Matsumoto, Hiroyuki, and Marc Yor. 2005. “Exponential Functionals of Brownian Motion, I: Probability Laws at Fixed Time.” Probability Surveys 2: 312–47. https://doi.org/10.1214/154957805100000159.
———. 2005. “Exponential Functionals of Brownian Motion, I: Probability Laws at Fixed Time.” Probability Surveys 2: 312–47. https://doi.org/10.1214/154957805100000159.
McCullagh, Peter, and Jesper Møller. 2006. “The Permanental Process.” Advances in Applied Probability 38 (4): 873–88. https://doi.org/10.1017/S0001867800001361.
Micchelli, Charles A., and Peder Olsen. 2000. “Penalized Maximum-Likelihood Estimation, the BaumWelch Algorithm, Diagonal Balancing of Symmetric Matrices and Applications to Training Acoustic Data.” Journal of Computational and Applied Mathematics 119 (1–2): 301–31. https://doi.org/10.1016/S0377-0427(00)00385-X.
Mishra, Swapnil, Marian-Andrei Rizoiu, and Lexing Xie. 2016. “Feature Driven and Point Process Approaches for Popularity Prediction.” In Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 1069–78. CIKM ’16. New York, NY, USA: ACM. https://doi.org/10.1145/2983323.2983812.
Mohler, G. O., M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita. 2011. “Self-Exciting Point Process Modeling of Crime.” Journal of the American Statistical Association 106 (493): 100–108. https://doi.org/10.1198/jasa.2011.ap09546.
Morimoto, Tetsuzo. 1963. “Markov Processes and the H-Theorem.” Journal of the Physical Society of Japan 18 (3): 328–31. https://doi.org/10.1143/JPSJ.18.328.
Møller, Jesper, and Kasper K. Berthelsen. 2012. “Transforming Spatial Point Processes into Poisson Processes Using Random Superposition.” Advances in Applied Probability 44 (1): 42–62. https://doi.org/10.1239/aap/1331216644.
Møller, Jesper, and Jakob G. Rasmussen. 2006. “Approximate Simulation of Hawkes Processes.” Methodology and Computing in Applied Probability 8 (1): 53–64. https://doi.org/10.1007/s11009-006-7288-z.
Møller, Jesper, and Rasmus Waagepetersen. 2017. “Some Recent Developments in Statistics for Spatial Point Patterns.” Annual Review of Statistics and Its Application 4 (1): 317–42. https://doi.org/10.1146/annurev-statistics-060116-054055.
Møller, Jesper, and Rasmus Plenge Waagepetersen. 2003. Statistical Inference and Simulation for Spatial Point Processes. Chapman and Hall/CRC. https://doi.org/10.1201/9780203496930.
———. 2007. “Modern Statistics for Spatial Point Processes.” Scandinavian Journal of Statistics 34 (4): 643–84. https://doi.org/10.1111/j.1467-9469.2007.00569.x.
Neustifter, Benjamin, Stephen L. Rathbun, and Saul Shiffman. 2012. “Mixed-Poisson Point Process with Partially-Observed Covariates: Ecological Momentary Assessment of Smoking.” Journal of Applied Statistics 39 (4): 883–99. https://doi.org/10.1080/02664763.2011.626848.
Oakes, David. 1975. “The Markovian Self-Exciting Process.” Journal of Applied Probability 12 (1): 69. https://doi.org/10.2307/3212408.
Ogata, Y. 1981. “On Lewis’ Simulation Method for Point Processes.” IEEE Transactions on Information Theory 27 (1): 23–31. https://doi.org/10.1109/TIT.1981.1056305.
———. 1999. “Seismicity Analysis Through Point-Process Modeling: A Review.” Pure and Applied Geophysics 155 (2-4): 471–507. https://doi.org/10.1007/s000240050275.
Ogata, Yoshiko. 1978. “The Asymptotic Behaviour of Maximum Likelihood Estimators for Stationary Point Processes.” Annals of the Institute of Statistical Mathematics 30 (1): 243–61. https://doi.org/10.1007/BF02480216.
Ogata, Yosihiko. 1988. “Statistical Models for Earthquake Occurrences and Residual Analysis for Point Processes.” Journal of the American Statistical Association 83 (401): 9–27. https://doi.org/10.1080/01621459.1988.10478560.
Ogata, Yosihiko, and Hirotugu Akaike. 1982. “On Linear Intensity Models for Mixed Doubly Stochastic Poisson and Self-Exciting Point Processes.” Journal of the Royal Statistical Society, Series B 44: 269–74. https://doi.org/10.1007/978-1-4612-1694-0_20.
Ogata, Yosihiko, Ritsuko S. Matsu’ura, and Koichi Katsura. 1993. “Fast Likelihood Computation of Epidemic Type Aftershock-Sequence Model.” Geophysical Research Letters 20 (19): 2143–46. https://doi.org/10.1029/93GL02142.
Olshausen, B. A., and D. J. Field. 1996. “Natural Image Statistics and Efficient Coding.” Network (Bristol, England) 7 (2): 333–39. https://doi.org/10.1088/0954-898X/7/2/014.
Omi, Takahiro, Naonori Ueda, and Kazuyuki Aihara. 2020. “Fully Neural Network Based Model for General Temporal Point Processes.” January 10, 2020. http://arxiv.org/abs/1905.09690.
Ozaki, T. 1979. “Maximum Likelihood Estimation of Hawkes’ Self-Exciting Point Processes.” Annals of the Institute of Statistical Mathematics 31 (1): 145–55. https://doi.org/10.1007/BF02480272.
Panaretos, Victor M., and Yoav Zemel. 2016. “Separation of Amplitude and Phase Variation in Point Processes.” The Annals of Statistics 44 (2): 771–812. https://doi.org/10.1214/15-AOS1387.
Paninski, Liam. 2004. “Maximum Likelihood Estimation of Cascade Point-Process Neural Encoding Models.” Network: Computation in Neural Systems 15 (4): 243–62. https://doi.org/10.1088/0954-898X/15/4/002.
Pnevmatikakis, Eftychios A. 2017. “Compressed Sensing and Optimal Denoising of Monotone Signals.” In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 4740–44. https://doi.org/10.1109/ICASSP.2017.7953056.
Pouget-Abadie, Jean, and Thibaut Horel. 2015. “Inferring Graphs from Cascades: A Sparse Recovery Framework.” In Proceedings of The 32nd International Conference on Machine Learning. http://arxiv.org/abs/1505.05663.
Puri, Madan L., and Pham D. Tuan. 1986. “Maximum Likelihood Estimation for Stationary Point Processes.” Proceedings of the National Academy of Sciences of the United States of America 83 (3): 541–45. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC322899/.
Rasmussen, Jakob G. 2011. “Temporal Point Processes the Conditional Intensity Function.” http://people.math.aau.dk/ jgr/teaching/punktproc11/tpp.pdf.
Rasmussen, Jakob Gulddahl. 2013. “Bayesian Inference for Hawkes Processes.” Methodology and Computing in Applied Probability 15 (3): 623–42. https://doi.org/10.1007/s11009-011-9272-5.
Rasmussen, Jakob Gulddahl, Jesper Møller, B. H. Aukema, K. F. Raffa, and J. Zhu. 2006. “Bayesian Inference for Multivariate Point Processes Observed at Sparsely Distributed Times.” Department of Mathematical Sciences, Aalborg University. http://vbn.aau.dk/ws/files/4751438/R-2006-24.pdf.
Ravanbakhsh, Siamak, Jeff Schneider, and Barnabas Poczos. 2016. “Deep Learning with Sets and Point Clouds.” In. http://arxiv.org/abs/1611.04500.
Reynaud-Bouret, Patricia. 2003. “Adaptive Estimation of the Intensity of Inhomogeneous Poisson Processes via Concentration Inequalities.” Probability Theory and Related Fields 126 (1). https://doi.org/10.1007/s00440-003-0259-1.
Reynaud-Bouret, Patricia, Vincent Rivoirard, Franck Grammont, and Christine Tuleau-Malot. 2014. “Goodness-of-Fit Tests and Nonparametric Adaptive Estimation for Spike Train Analysis.” The Journal of Mathematical Neuroscience 4 (1): 3. https://doi.org/10.1186/2190-8567-4-3.
Reynaud-Bouret, Patricia, and Emmanuel Roy. 2007. “Some Non Asymptotic Tail Estimates for Hawkes Processes.” Bulletin of the Belgian Mathematical Society - Simon Stevin 13 (5): 883–96.
Reynaud-Bouret, Patricia, and Sophie Schbath. 2010. “Adaptive Estimation for Hawkes Processes; Application to Genome Analysis.” The Annals of Statistics 38 (5): 2781–2822. https://doi.org/10.1214/10-AOS806.
Riabiz, Marina, Tohid Ardeshiri, and Simon Godsill. 2016. “A Central Limit Theorem with Application to Inference in α-Stable Regression Models.” In, 70–82. http://jmlr.org/proceedings/papers/v55/riabiz16.html.
Ridolfi, Andrea. 2005. “Power Spectra of Random Spikes and Related Complex Signals.” Institut de systèmes de communication SECTION DES SYSTÈMES DE COMMUNICATION POUR L’OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR laurea di dottore in ingegneria elettronica, Politecnico di Milano. http://icwww.epfl.ch/~ridolfi/research/thesis_andrea.pdf.
Ripley, B. D., and F. P. Kelly. 1977. “Markov Point Processes.” Journal of the London Mathematical Society s2-15 (1): 188–92. https://doi.org/10.1112/jlms/s2-15.1.188.
Rizoiu, Marian-Andrei, Lexing Xie, Scott Sanner, Manuel Cebrian, Honglin Yu, and Pascal Van Hentenryck. 2017. “Expecting to Be HIP: Hawkes Intensity Processes for Social Media Popularity.” In World Wide Web 2017, International Conference on, 1–9. WWW ’17. Perth, Australia: International World Wide Web Conferences Steering Committee. https://doi.org/10.1145/3038912.3052650.
Rosser, G., and T. Cheng. 2014. “A Self-Exciting Point Process Model for Predictive Policing: Implementation and Evaluation.” http://leeds.gisruk.org/abstracts/GISRUK2015_submission_33.pdf.
Rubin, Izhak. 1972. “Regular Point Processes and Their Detection.” IEEE Transactions on Information Theory 18 (5): 547–57. https://doi.org/10.1109/TIT.1972.1054897.
Saichev, A., and D. Sornette. 2011. “Generating Functions and Stability Study of Multivariate Self-Excited Epidemic Processes.” January 28, 2011. http://arxiv.org/abs/1101.5564.
Schelldorfer, Jürg, Lukas Meier, and Peter Bühlmann. 2014. GLMMLasso: An Algorithm for High-Dimensional Generalized Linear Mixed Models Using ℓ1-Penalization.” Journal of Computational and Graphical Statistics 23 (2): 460–77. https://doi.org/10.1080/10618600.2013.773239.
Schoenberg, Frederic. 1999. “Transforming Spatial Point Processes into Poisson Processes.” Stochastic Processes and Their Applications 81 (2): 155–64. https://doi.org/10.1016/S0304-4149(98)00098-2.
Schoenberg, Frederic Paik. 2002. “On Rescaled Poisson Processes and the Brownian Bridge.” Annals of the Institute of Statistical Mathematics 54 (2): 445–57. https://doi.org/10.1023/A:1022494523519.
———. 2004. “Testing Separability in Spatial-Temporal Marked Point Processes.” Biometrics 60 (2): 471–81. http://www.stat.ucla.edu/ frederic/papers/sep133.pdf.
———. 2005. “Consistent Parametric Estimation of the Intensity of a Spatial–Temporal Point Process.” Journal of Statistical Planning and Inference 128 (1): 79–93. https://doi.org/10.1016/j.jspi.2003.09.027.
Sevast’yanov, B. A. 1968. “Renewal Equations and Moments of Branching Processes.” Mathematical Notes of the Academy of Sciences of the USSR 3 (1): 3–10. https://doi.org/10.1007/BF01386956.
Silverman, B. W. 1982. “On the Estimation of a Probability Density Function by the Maximum Penalized Likelihood Method.” The Annals of Statistics 10 (3): 795–810. https://doi.org/10.1214/aos/1176345872.
———. 1984. “Spline Smoothing: The Equivalent Variable Kernel Method.” The Annals of Statistics 12 (3): 898–916. https://doi.org/10.1214/aos/1176346710.
Simon, Noah, Jerome Friedman, Trevor Hastie, and Rob Tibshirani. 2011. “Regularization Paths for Cox’s Proportional Hazards Model via Coordinate Descent.” Journal of Statistical Software 39 (5). http://www.jstatsoft.org/v39/i05/paper.
Simpson, Daniel, Janine Illian, Finn Lindgren, Sigrunn Sørbye, and Håvard Rue. 2011. “Going Off Grid: Computationally Efficient Inference for Log-Gaussian Cox Processes.” November 1, 2011. http://arxiv.org/abs/1111.0641.
Smith, A, and E Brown. 2003. “Estimating a State-Space Model from Point Process Observations.” Neural Computation 15 (5): 965–91. https://doi.org/10.1162/089976603765202622.
Städler, Nicolas, and Sach Mukherjee. 2013. “Penalized Estimation in High-Dimensional Hidden Markov Models with State-Specific Graphical Models.” The Annals of Applied Statistics 7 (4): 2157–79. https://doi.org/10.1214/13-AOAS662.
Stefanski, Leonard A., and Raymond J. Carroll. 1990. “Deconvolving Kernel Density Estimators.” Statistics 21 (2): 169–84. https://doi.org/10.1080/02331889008802238.
Thrampoulidis, Chrtistos, Ehsan Abbasi, and Babak Hassibi. 2015. LASSO with Non-Linear Measurements Is Equivalent to One With Linear Measurements.” In Advances in Neural Information Processing Systems 28, edited by C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, R. Garnett, and R. Garnett, 3402–10. Curran Associates, Inc. http://papers.nips.cc/paper/5739-lasso-with-non-linear-measurements-is-equivalent-to-one-with-linear-measurements.pdf.
Tria, F., V. Loreto, V. D. P. Servedio, and S. H. Strogatz. 2013. “The Dynamics of Correlated Novelties.” October 7, 2013. https://doi.org/10.1038/srep05890.
Turlach, Berwin A. 1993. “Bandwidth Selection in Kernel Density Estimation: A Review.” http://www.stat.washington.edu/courses/stat527/s13/readings/Turlach.pdf.
Vacarescu. 2011. Filtering and Parameter Estimation for Partially Observed Point Processes.
Veen, Alejandro, and Frederic P Schoenberg. 2008. “Estimation of SpaceTime Branching Process Models in Seismology Using an EMType Algorithm.” Journal of the American Statistical Association 103 (482): 614–24. https://doi.org/10.1198/016214508000000148.
Vere-Jones, David, and Frederic Paik Schoenberg. 2004. “Rescaling Marked Point Processes.” Australian & New Zealand Journal of Statistics 46 (1): 133–43. https://doi.org/10.1111/j.1467-842X.2004.00319.x.
Wheatley, Spencer. 2013. “Quantifying Endogeneity in Market Prices with Point Processes: Methods & Applications.” Masters Thesis. ETH Zürich: Masters Thesis.
Willett, R. M., and R. D. Nowak. 2007. “Multiscale Poisson Intensity and Density Estimation.” IEEE Transactions on Information Theory 53 (9): 3171–87. https://doi.org/10.1109/TIT.2007.903139.
Witten, Daniela M., Robert Tibshirani, and Trevor Hastie. 2009. “A Penalized Matrix Decomposition, with Applications to Sparse Principal Components and Canonical Correlation Analysis.” Biostatistics, January, kxp008. https://doi.org/10.1093/biostatistics/kxp008.
Wörmann, Julian, Simon Hawe, and Martin Kleinsteuber. 2013. “Analysis Based Blind Compressive Sensing.” IEEE Signal Processing Letters 20 (5): 491–94. https://doi.org/10.1109/LSP.2013.2252900.
Wu, Shuang, Hans-Georg Müller, and Zhen Zhang. 2013. “Functional Data Analysis for Point Processes with Rare Events.” Statistica Sinica 23 (1): 1–23. http://www3.stat.sinica.edu.tw/sstest/oldpdf/A23n11.pdf.
Zarezade, Ali, Utkarsh Upadhyay, Hamid R. Rabiee, and Manuel Gomez-Rodriguez. 2017. RedQueen: An Online Algorithm for Smart Broadcasting in Social Networks.” In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 51–60. WSDM ’17. New York, NY, USA: ACM Press. https://doi.org/10.1145/3018661.3018684.
Zhang, Cun-Hui, and Stephanie S. Zhang. 2014. “Confidence Intervals for Low Dimensional Parameters in High Dimensional Linear Models.” Journal of the Royal Statistical Society: Series B (Statistical Methodology) 76 (1): 217–42. https://doi.org/10.1111/rssb.12026.
Zhang, Rui, Christian Walder, and Marian-Andrei Rizoiu. 2020. “Variational Inference for Sparse Gaussian Process Modulated Hawkes Process.” In Proceedings of the AAAI Conference on Artificial Intelligence, 34:6803–10. 04. https://doi.org/10.1609/aaai.v34i04.6160.
Zhou, Ke, Hongyuan Zha, and Le Song. 2013. “Learning Triggering Kernels for Multi-Dimensional Hawkes Processes.” In Proceedings of the 30th International Conference on Machine Learning (ICML-13), 1301–9. http://proceedings.mlr.press/v28/zhou13.pdf.
Warning! Experimental comments system! If is does not work for you, let me know via the contact form. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7358961701393127, "perplexity": 14460.238239104641}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038887646.69/warc/CC-MAIN-20210419142428-20210419172428-00007.warc.gz"} |
http://aclweb.org/adminwiki/index.php?title=***_student_session_policies&redirect=no | *** student session policies
Jump to: navigation, search
Student Sessions at ACL Conferences
Conference Handbook - Student Session
The Student Session is an established feature of ACL conferences. However, there is no accepted format for this part of the conference. This report outlines a new policy for the operation of the student sessions, the aim being to:
• set out a common standard, thereby ensuring that the status of the Student Session is kept consistently high
• provide guidelines for future organisers of the student session.
Goal of the Student Sessions
The Student Session provides a valuable opportunity for the next generation of computational linguists to enter the CL community. It allows the best students in the field to take their first important step towards becoming professional computational linguists by:
• receiving critical feedback on their work from experts outside their advisory team;
• making contact with other students and key researchers in their field;
• presenting their work formally in a professional setting;
• reviewing the work of others and assisting in the organisation of the session.
For the ACL Student Sessions to achieve this goal consistently, we need to ensure that we attract papers from the best students internationally, provide professional reviews that (a) help the students to develop their work and (b) assist the programme committee in selecting the best papers. We also need to provide a suitable venue for their presentation. Finally, we need to ensure that the student session is very well attended by the participants of the main conference. Over the years the student session has taken a variety of forms: as sessions like any other within the main conference, as special lunchtime sessions, as poster sessions during breaks, and as a 1-day pre-conference workshop. They have not been equally sucessful. The chosen format has, to a large extent, been guided by the number of submissions to the Student Session, but also by the number of paper accepted in the main conference and thus the number of session slots available for student presentations. Funding considerations also have a role to play; for example, at ANLP/NAACL'2000 a substantial amount of funding came from the NSF, but this brought with it the condition that the student session be run as a Workshop separate from the main conference.
The following table shows the available statistics from 1991:
Year Submitted Accepted Format 1991 unknown 14 4 sessions, 2 at a time, 20 mins per student 1992 48 20 6 sessions, 2 at a time, 20 mins per student 1993 30 11 1 session, 18 minutes per student 1994 41 10 2 sessions in parallel, 20 minutes per student 1995 48 19 poster session, 2 hours and 30 minutes \ 1996 32 14 poster session, 1 hour and 45 minutes 1997 42 10 2 sessions, 20 minutes per student \ 1998 46 12 4 lunch-time sessions, 20 minutes per student \ 1999 30 10 4 sessions, 2 at a time, 25 minutes per student \ 2000(ANLP/NAACL) 18 8 pre-conference workshop, 25 min presentation, 15 min discussion led by 2 senior researchers 2000 36 10 4 sessions, 2 at a time, 18 min presentation, 12 min discussion led by 2 senior researchers
While recognising the need to build some flexibility into the process, the picture above makes it difficult for outsiders to judge the status of a paper in an ACL student session. In general, papers presented in sessions that are interleaved with the main conference sessions, or in a dedicated pre-conference Workshop, are viewed more favourably than poster presentations. A related problem arises with the form of the publication. Student papers and posters generally appear within the main conference proceedings. These are often indistinguishable from papers in the main sessions, and even in cases where they are not (e.g., identified by a different page numbering system), there is a general tendency for authors and others to cite them as though they were regular ACL papers (The same is true of the extended abstracts for the Demo Session). This practice has the potential to lower the perceived quality of ACL papers. The attendance at the student session tends to be unaffected by the format of the presentations. However, the quality of the feedback to the students tends to be much lower for poster sessions.
ACL Policy for Student Sessions
Format
The organising committee will be co-chaired by two doctoral students in Computational Linguistics, and will be coordinated by a Faculty Advisor. The members of the organising committee will be appointed by the General Chair, who will consult the co-chairs of the most recent Student Workshop for recommendations on the new student co-chairs.
The process of reviewing and selecting papers will conform to the standard ACL policy on programme committees, with the exception that each paper should be reviewed by a combination of students and established figures in the field.
In order to maintain a consistent status, the student session, will be run as either a workshop alongside the other workshops of the conference, or as a special session interleaved within the main conference. The final choice of format from among these for any given meeting will be determined by the programme chair of the main conference in consultation with the co-chairs of the student session, based on the number of available slots in the main conference, the number of accepted papers for the student session, and any other constraining considerations (e.g., the requirements of external funders).
The recent innovation of appointing panelists for each paper is a good idea. At the very least, it guarantees a good discussion on each paper. We recommend that this be continued, although the amount of time allocated to each panelist will obviously be much more limited when the session is interleaved with the main conference.
Scheduling
If the session is run with the conference workshops, the length of slots for each presenter can be anywhere from 25 -- 45 minutes, depending on the preferred format of the organisers. However, if it is interleaved with the main sessions of the conference, then the length of presentations slots will be no longer than those of the main conference.
Title
The title of the session will be Student Research Workshop. As an indicator of a separate existence, but closely linked to the main conference, this title clearly distinguishes between papers accepted for the main conference and the student session, and provides more opportunities for external funding (e.g., from NSF and the European Commission).
Publication
At the meeting of the ACL executive committe in May, 2000 in Seattle, it was decided that future proceedings will be composed of two parts:
• main proceedings: containing only those papers accepted to the main session
• companion volume: containing the papers from the student session, together with the tutorial abstracts and descriptions of presentations at the demo session. This could also include the panel descriptions and any other additional information (e.g., exhibitor pages).
These two parts will be distributed as an integral set of volumes, both at the conference itself and for any post-conference sales.
This policy has already been put into effect for the ACL'2000 meeting. The title of the companion volume will replace Proceedings of the Conference with:
Companion Volume to the Proceedings of the Conference
including the
Proceedings of the Student Research Workshop
Tutorial Abstracts and Demonstration Notes
Qualifications
The student session will be dedicated to the presentation of graduate work in progress or significant undergraduate research. It will therefore normally be open only to 1) graduate students who have settled on their thesis direction but who still have significant research left to do, and 2) undergraduate students who have pursued an undergraduate research project. Those graduate students in the final stages of their thesis should be submitting instead to the main conference. To enforce this, submissions must be accompanied by a curriculum vitae and/or a letter from the thesis advisor confirming the current state of the thesis and giving an estimated date of submission.
A student who has already presented at an ACL/EACL/NAACL student session will not be allowed to present again at the student session of any of these conferences, but encouraged to submit instead to the main conference.
Roles and Responsibilites of the Organising Committee
What follows is a non-exhaustive list outlining the main responsibilites of the organising committee.
The Faculty Advisor:
• advise the student co-chairs on all aspects of the running of the student session;
• ensure that the above policy is adhered to;
• ensure that the organisational schedule for the student session is adhered to;
• apply for external funding to support the student session, liasing where necessary with the conference committee;
• assist the co-chairs in procuring reviewers for the submitted papers and panelists for the accepted papers;
• attend the student session and oversee its smooth running.
The co-chairs:
• in consultation with the Faculty Advisor, and the PC chair of the main conference, compose a schedule for the organisation of the student workshop;
• compose the Call for Papers and make it available for distribution;
• in consultation with the Faculty Advisor, select reviewers;
• receive the submissions, distribute them to reviewers, collect the reviews and collate the results; \item in consultation with the Faculty Advisor, select the papers for presentation;
• in consultation with the Programme Chair for the main conference, decide on the format of the session;
• collect and assemble the camera-ready hard copies (adding the preface, TOC, etc.) and forward them to the Publication Chair;
• make recommendations to the ACL Treasurer on the distribution of any available funding;
• prepare for the ACL executive a written report on the student session, and present it at the Executive Dinner and the Business Meeting;
• attend and chair the sessions, making sure that the time limits are strictly adhered to;
• in consultation with the local organiser, arrange the Student Lunch; \item hand over to the ACL secretary copies of the main records of the student session, including spreadsheets on the submissions, acceptances and recommendations for funding.
• after the conference, forward recommendations to the General Chair of the upcoming meeting for the next set of student co-chairs.
Approved by ACL Exec: October 2000 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.22239673137664795, "perplexity": 1818.7577642801427}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699632815/warc/CC-MAIN-20130516102032-00004-ip-10-60-113-184.ec2.internal.warc.gz"} |
https://hhsprings.bitbucket.io/docs/programming/examples/ffmpeg/audio_visualization/use_of_audio_visualization_as_a_visual_effect.html | # Use of audio visualization as a visual effect¶
doc
ffmpeg does not provide a way to use sound data itself directly as a visual effect. However, as there are several sound visualization methods, using visualization of them will make it a visual effect.
I will show you a few examples of that. Things that can withstand professional use are probably difficult to achieve with only ffmpeg, but if your needs are simple, it can be realized as in the example to show from now.
## with alphamerge’ (1)¶
00:00:45
The first example uses “alphamerge” for visualized video by “showsqt”.
#! /bin/sh
ifn="Air on the G String (from Orchestral Suite no. 3, BWV 1068).mp3"
ofn="out_01.mp4"
bgi1="beach-dawn-dusk-274053.jpg"
bgi2="art-backlit-beach-256807.jpg"
#
ffmpeg -y -i "${ifn}" -i "${bgi1}" -i "${bgi2}" -filter_complex " [0:a]showcqt=s=1280x720:basefreq=27.5:endfreq=4186.0[alpha]; [1:v]scale=-1:720,pad='1280:720:(ow-iw)/2:(oh-ih)/2',loop=size=2:loop=-1[1v]; [2:v]scale=-1:720,pad='1280:720:(ow-iw)/2:(oh-ih)/2',loop=size=2:loop=-1[bg]; [1v][alpha]alphamerge[fg]; [bg][fg]overlay,setsar=1[v] " -map '[v]' -map '0:a' -c:a copy -shortest "${ofn}"
## with alphamerge’ (2)¶
00:01:45
It is essentially the same as the first example. It visualizes each stereo channel with “showcqt” and “vflip” on the right channel. (We have a redundant “scale” due to a bug in “vflip.” If you omit this extra “scale”, ffmpeg will crash.)
#! /bin/sh
ifn="Air on the G String (from Orchestral Suite no. 3, BWV 1068).mp3"
ofn="out_02.mp4"
bgi1="beach-dawn-dusk-274053.jpg"
bgi2="art-backlit-beach-256807.jpg"
#
ffmpeg -y -i "${ifn}" -i "${bgi1}" -i "${bgi2}" -filter_complex " [0:a] pan=stereo|c0=c0|c1=c0,showcqt=s=1280x360:basefreq=27.5:endfreq=4186.0 [vcqt_L]; [0:a] pan=stereo|c0=c1|c1=c1,showcqt=s=1280x360:basefreq=27.5:endfreq=4186.0 ,scale=1280:720,vflip,scale=1280:360 [vcqt_R]; [vcqt_L][vcqt_R]vstack[alpha]; [1:v]scale=-1:720,pad='1280:720:(ow-iw)/2:(oh-ih)/2',loop=size=2:loop=-1[1v]; [2:v]scale=-1:720,pad='1280:720:(ow-iw)/2:(oh-ih)/2',loop=size=2:loop=-1[bg]; [1v][alpha]alphamerge[fg]; [bg][fg]overlay,setsar=1[v] " -map '[v]' -map '0:a' -c:a copy -shortest "${ofn}"
## with alphamerge’ (3)¶
00:02:45
It is almost the same as the previous example, but here we use only one picture, not two pictures.
#! /bin/sh
ifn="Air on the G String (from Orchestral Suite no. 3, BWV 1068).mp3"
ofn="out_03.mp4"
bgi="beach-dawn-dusk-274053.jpg"
#
ffmpeg -y -i "${ifn}" -i "${bgi}" -filter_complex "
[0:a]showcqt=s=1280x720:basefreq=27.5:endfreq=4186.0,split[alpha][bgbase];
[1v][alpha]alphamerge[fg];
[bgbase]geq=r=0:g=0:b=0[bg];
[bg][fg]overlay,setsar=1[v]
## with geq’ (2)¶
00:04:45
It is essentially the same as the previous example. We use the average of three points of “showcqt” result.
#! /bin/sh
ifn="Air on the G String (from Orchestral Suite no. 3, BWV 1068).mp3"
ofn="out_05.mp4"
bgi="art-backlit-beach-256807.jpg"
#
ffmpeg -y -i "${ifn}" -i "${bgi}" -filter_complex "
[0:a]
showcqt=s=1280x720:basefreq=27.5:endfreq=4186.0
,geq='p(240,355)/3 + p(400,355)/3 + p(560,355)/3'
[vcqt];
[1:v] | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3294553756713867, "perplexity": 6261.62493804858}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104676086.90/warc/CC-MAIN-20220706182237-20220706212237-00552.warc.gz"} |
http://mathoverflow.net/questions/98993/torsion-in-cuspidal-cohomology | # Torsion in cuspidal cohomology
Following Lemma 2.7 from Vogtmann's Rational Homology of Bianchi Groups, I want to define cuspidal cohomology as $$H_{\mathrm{cusp}}(M)=\frac{H_1(M)}{i_*(H_1(\partial M))}$$ where $i:\partial M\to M$ is the inclusion and I take integral coefficients. The motivation is that Abelian covering spaces such that the preimage of a cusp consists of disjoint copies of the same cusp are corresponding to exactly those holonomies $\pi_1(M)\to G$ that factor through the cuspidal cohomology.
I verified for all hyperbolic cusped 3-manifolds in the SnapPea census that if $H_1(M)=\mathbb{Z}^n\oplus T$ where $T$ is torsion, then $H_\mathrm{cusp}(M)=\mathbb{Z}^{n-\mbox{number of cusps}}\oplus T$. This is to be expected rationally by half-lives-half-dies. It seems to also hold integrally for hyperbolic 3-manifolds.
Is there an argument that this holds for all hyperbolic cusped 3-manifolds? (And maybe a counterexample if you take a non-hyperbolic manifold)
-
Vogtmann's name is spelled with two n's. – Jim Conant Jun 6 '12 at 23:11
Consider the long exact sequence on homology (coefficients in $\mathbb{Z}$) $$\to H_1(\partial M)\overset{i}{\to} H_1(M)\to H_1(M,\partial M) \to H_0(\partial M) \to$$ You are looking for $H_1(M)/i_\ast(H_1(\partial M)) \cong im\{ H_1(M)\to H_1(M,\partial M)\} \cong ker \{ H_1(M,\partial M)\to H_0(\partial M)\}$ by the exactness of the sequence. If $H_1(M)\cong \mathbb{Z}^n\oplus T$, $T$ torsion, then $H_2(M)\cong \mathbb{Z}^{n-1}$ (the rank $n-1$ follows from Euler characteristic). By universal coefficients, we have a short exact sequence $$0\to Ext(H_1(M),\mathbb{Z})\to H^2(M) \to Hom(H_2(M),\mathbb{Z})\to 0.$$ One computes $Ext(H_1(M),\mathbb{Z})\cong T$, $Hom(H_2(M),\mathbb{Z})\cong \mathbb{Z}^{n-1}$ (see p. 195 of Hatcher), so that $H^2(M)\cong \mathbb{Z}^{n-1} \oplus T$. By Lefschetz duality, $H^2(M)\cong H_1(M,\partial M) \cong \mathbb{Z}^{n-1}\oplus T$. So you are looking for the torsion in $$ker\{ H_1(M,\partial M)\to H_0(\partial M) \} \cong ker\{ \mathbb{Z}^{n-1}\oplus T \to \mathbb{Z}^c\},$$ which is clearly isomorphic to $T$.
-
One can make some progress on this by using half-lives--half-dies with coefficients in $\mathbb{F}_p$. Suppose the cuspidal homology is $\mathbb{Z}^{n - c} \oplus S$. If $p$ is coprime to the order of $T$, then the dimension of $H_1(M; \mathbb{F}_p)$ is just $n$ and the mod $p$ cuspidal homology has dimension $n - c$; hence the order of $S$ must also be coprime to $p$. Indeed, this argument shows that if the order of $T$ is square-free then your claim holds. Perhaps some more sophisticated argument with universal coefficients is enough to prove it in general? (If this is true, it's surely not because the manifolds are hyperbolic but rather a general fact about 3-manifolds with torus boundary.)
-
I can't vote my own answer down, but Ian's answer (currently below this one) is complete. – Nathan Dunfield Jun 12 '12 at 13:18
It is worth pointing out that $T$ may lie in the image of $i_*$:
There is an $M$ such that $H_1(M) \cong \mathbb{Z}^{n} \oplus T$ and $H_{\mathrm{cusp}}(M) \cong \mathbb{Z}^{n-\mathrm{number\ of\ cusps}} \oplus T$ but $T$ dies under the quotient map $H_1(M) \to H_\mathrm{cusp}(M)$.
Let $N$ be an orientable $I$-bundle over the Klein bottle. Then the "cuspidal homology" of $N$ is $\mathbb{Z}/2\mathbb{Z}$, but the torsion in $H_1(M)$ dies under $H_1(M) \to H_\mathrm {cusp}(M)$.
To find a hyperbolic example, note that a theorem of R. Myers (Excellent 1-manifolds in compact 3-manifolds. Topology Appl., 49(2):115–127, 1993.) produces a null-homotopic hyperbolic knot $K$ in $N$. Thurston's Hyperbolic Dehn Surgery Theorem allows us to perform surgery on $K$ to obtain a hyperbolic $M$ where all the maps on homology are as above.
-
@Richard, it seems you are saying A and not A in your answer. – Misha Jun 7 '12 at 16:30
@Misha: The answer is an attempt to emphasize the difference between isomorphism and equality. As the question asks for equality, I think this is relevant. – Richard Kent Jun 7 '12 at 16:41
Edited to clarify. – Richard Kent Jun 7 '12 at 16:54
@Richard, I understand what you are saying now. However, it seems to me that in the context of the question, equality would not make much sense since $H_{cusp}$ is the quotient of $H_1$, not a subgroup. I think the equality sign in question is just the (common) abuse of notation. Nevertheless, you have a very nice example which shows that torsion part of $H_1$ could lie in the image of $i_*$. It also suggests that one should check what happens in the case of other Seifert manifolds. – Misha Jun 7 '12 at 17:15
@Misha: Yeah, my interpretation of equality as meaning that T survives is psychological, I guess. One more edit to further clarify. – Richard Kent Jun 7 '12 at 17:27 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9742176532745361, "perplexity": 307.3061981933337}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928780.77/warc/CC-MAIN-20150521113208-00247-ip-10-180-206-219.ec2.internal.warc.gz"} |
http://support.markedapp.com/discussions/problems/136390-document-opens-2-times | # Document opens 2 times
#### Nicolai
11 Mar, 2017 09:43 AM
If Marked isn't running and I open a file, Marked opens it 2 times.
1. Support Staff Posted by Brett on 11 Mar, 2017 04:12 PM
Hi Nicolai
This has been reported before but I've been completely unable to
replicate. Could you provide me with the following info?
1. The output you get from Help->Report an Issue
2. Are you opening via double click, right click, or drag to dock icon?
3. When Marked opens, are other documents open, or is the file you're
4. Do you have your system preferences set to save and restore open
windows?
5. Does this happen every time, and do you ever see the issue if Marked
Thanks,
Brett
2. Posted by ncl bch on 11 Mar, 2017 04:41 PM
Hi Brett,
1. See attached file. 2. I tried all methods to open a file. Happens independently of the method. 3. It’s the only file loading. If I open more than one at the same time, only one of them opens twice. 4. No, I have set Close windows when quitting an app in system preferences. 5. Yes. Happens every time and only if marked isn’t already open.
I tried the demo version of Marked 2 before I installed the App Store version. Maybe that’s a thing?
3. Posted by Nicolai on 17 Mar, 2017 07:16 AM
Here's the output from Help->Report an Issue:
// Configuration (do not edit)
Marked 2 930 (Mac App Store)
OS X Version: 10.12.3
---
allowPageBreakInCode: 0
bookTxtIsLeanpub: 0
summaryMdIsGitBook: 0
codeIsPoetry: 0
convertGithubCheckboxes: 1
convertYAMLToMMD: 0
defaultMathJaxConfig: TeX-AMS-MML_HTMLorMML
defaultPreviewStyle: 0
defaultProcessor: MultiMarkdown
enableMiniMap: 0
excludeBlockQuotesFromCounts: 0
excludeFootnotesFromCounts: 0
excludeVerbatimFromCounts: 0
excludeCaptionsFromCounts: 0
folderPreviewExtensionsArray: md, markdown, txt, mdown, html, opml
githubNewlines: 1
h1IsPageBreak: 0
h2IsPageBreak: 0
hrIsPageBreak: 0
includeMathJax: 0
limitTextWidth: 0
minimalJavaScript: 0
outlineModeExtensions:
permissionGranted: 0
processHTMLFiles: 1
scrollToEdit: 1
shouldDetectCritic: 1
shouldHighlightMarkupErrors: 1
syntaxHighlight: 1
Formatting help / Preview (switch to plain text) No formatting (switch to Markdown)
### »
#### Attached Files
You can attach files up to 10MB
If you don't have an account yet, we need to confirm you're human and not a machine trying to post spam.
# Keyboard shortcuts
### Generic
? Show this help Blurs the current field
### Comment Form
r Focus the comment reply box Submit the comment
You can use Command ⌘ instead of Control ^ on Mac
## Recent Discussions
28 Mar, 2017 03:55 PM Terminal launcher for Marked (2) 27 Mar, 2017 05:01 PM Zooming in/out in preview mode changes font size in exported pdf 24 Mar, 2017 06:43 PM Problem with Custom processor 24 Mar, 2017 03:39 PM Over 700% CPU Usage 23 Mar, 2017 10:48 PM Previewing Without Double-square-brackets | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.19502948224544525, "perplexity": 16160.793773975704}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00069-ip-10-233-31-227.ec2.internal.warc.gz"} |
http://math.stackexchange.com/questions/279465/how-to-evaluate-the-following-integral-using-hypergeometric-function | # How to evaluate the following integral using hypergeometric function?
May I know how this integral was evaluated using hypergeometric function? $$\int \sin^n x\ dx$$
Wolframalpha showed this result but with no steps
-
You can prove using integration by parts that these integrals (as a sequence of functions) satisfy a recurrence relation. Similarly, hypergeometric series satisfy lots of similar relations (which is one of the main reasons they are special, actually). This is why they often pop up when doing integrals. – Marek Jan 15 '13 at 20:28
@Marek, thanks for your highlights. – Tariq Jan 16 '13 at 17:47
Assuming $n$ is a non-negative integer, you could use binomial theorem: $$\begin{eqnarray} \sin^n(x) &=& \left( \frac{\exp(i x) - \exp(-i x)}{2i}\right)^n = \frac{1}{2^n i^n} \sum_{m=0}^n \binom{n}{m} (-1)^m \exp\left( i \left(n-2m\right)x \right) \\ &=& \frac{1}{2^n i^n} \sum_{m=0}^n \binom{n}{m} (-1)^m \left(\cos\left(\left(n-2m\right)x \right) + i \sin\left( \left(n-2m\right)x \right) \right) \end{eqnarray}$$ Since the left-hand-side is real we only keep cosines for even $n$: $$\begin{eqnarray} \sin^{2n}(x) &=& \frac{1}{2^{2n}} \sum_{m=0}^{2n} \binom{2n}{m}\left(-1\right)^{n-m} \cos\left(\left(2n-2m\right)x\right) \\ &\stackrel{\text{symmetry}}{=}& \frac{1}{2^{2n}} \binom{2n}{n} + \frac{1}{2^{2n-1}} \sum_{m=0}^{n-1} \binom{2n}{m}\left(-1\right)^{n-m} \cos\left(2 \left(n-m\right)x\right) \\ &\stackrel{m\to n-m} =& \frac{1}{2^{2n}} \binom{2n}{n} + \frac{1}{2^{2n-1}} \sum_{m=1}^n \binom{2n}{n+m} (-1)^n \cos(2 m x) \tag{1} \end{eqnarray}$$ and, likewise, only sines for odd $n$: $$\sin^{2n+1}(x) = \frac{1}{2^{2n}} \sum_{m=0}^n \binom{2n+1}{n+1+m} (-1)^m \sin\left((2m+1)x\right) \tag{2}$$ We can now integrate element-wise: $$\int \sin^{2n}(x) \, \mathrm{d}x = \frac{1}{2^{2n}} \binom{2n}{n} x + \frac{1}{2^{2n-1}} \sum_{m=1}^n \binom{2n}{n+m} (-1)^n \frac{\sin(2 m x)}{2m} + \text{const.}$$ $$\int \sin^{2n+1}(x) \, \mathrm{d}x = -\frac{1}{2^{2n}} \sum_{m=0}^n \binom{2n+1}{n+1+m} (-1)^m \frac{\cos\left((2m+1)x\right)}{2m+1} + \text{const.}$$
To obtain a hypergeometric function, let $u = \sin(x)$. Then $$\int \sin^n(x)\, \mathrm{d}x = \int \frac{u^n}{\sqrt{1-u^2}} \mathrm{d}u$$ Now see this answer of mine on how to find the anti-derivative of $\int u^a (1-u)^b \mathrm{d} u$. Applying the same principles, we find: $$\int \frac{u^n}{\sqrt{1-u^2}} \mathrm{d}u =\int u^n \cdot {}_1F_0\left(\left.\begin{array}{c} \frac{1}{2} \\ - \end{array} \right| u^2 \right) \mathrm{d} u = \int \frac{\mathrm{d}}{\mathrm{d}u} \left( \frac{u^{n+1}}{n+1} \cdot {}_2F_1\left(\left.\begin{array}{cc} \frac{1}{2} & \frac{n+1}{2} \\ & \frac{n+3}{2} \end{array} \right| u^2 \right) \right) \mathrm{d} u$$ Thus, we have: $$\int \sin^n(x) \, \mathrm{d}x = \frac{\sin^{n+1}(x)}{n+1} \cdot {}_2F_1\left(\left.\begin{array}{cc} \frac{1}{2} & \frac{n+1}{2} \\ & \frac{n+3}{2} \end{array} \right| \sin^2(x) \right) + \text{const.} \tag{3}$$ This works where $u = \sin(x)$ is invertible. To extend validity of the answer, differentiate it. We would get $$\frac{\mathrm{d}}{\mathrm{d}x} \left( \frac{\sin^{n+1}(x)}{n+1} \cdot {}_2F_1\left(\left.\begin{array}{cc} \frac{1}{2} & \frac{n+1}{2} \\ & \frac{n+3}{2} \end{array} \right| \sin^2(x) \right) \right) = \frac{\sqrt{\cos^2(x)}}{\cos(x)} \sin^{n} (x)$$ and since the pre-factor $\frac{\sqrt{\cos^2(x)}}{\cos(x)}$ is a differential constant, i.e. its derivative is zero, we arrive at: $$\int \sin^n(x) \, \mathrm{d}x = \frac{\cos(x)}{\sqrt{\cos^2(x)}} \frac{\sin^{n+1}(x)}{n+1} \cdot {}_2F_1\left(\left.\begin{array}{cc} \frac{1}{2} & \frac{n+1}{2} \\ & \frac{n+3}{2} \end{array} \right| \sin^2(x) \right) + \text{const.} \tag{4}$$ This can be related to the answer provided by Wolfram|Alpha, and thus by Mathematica, using Kummer's relations.
@J.M. Thanks! $\ \$ – Sasha Jan 16 '13 at 17:53 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.980557918548584, "perplexity": 316.2933593555279}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776435465.20/warc/CC-MAIN-20140707234035-00077-ip-10-180-212-248.ec2.internal.warc.gz"} |
https://physics.stackexchange.com/questions/41439/when-we-define-the-s-matrix-what-are-in-and-out-states | # When we define the S-matrix, what are “in” and “out” states?
I have seen the scattering matrix defined using initial ("in") and final ("out") eigenstates of the free hamiltonian, with
$$\left| \vec{p}_1 \cdots \vec{p}_n \; \text{out} \right\rangle = S^{-1} \left| \vec{p}_1 \cdots \vec{p}_n \; \text{in} \right\rangle$$
so that
$$\left\langle \vec{p}_1 \cdots \vec{p}_n \; \text{out} \mid \vec{q}_1 \cdots \vec{q}_m \; \text{in} \right\rangle = \left\langle \vec{p}_1 \cdots \vec{p}_n \; \text{in} \mid S \mid \vec{q}_1 \cdots \vec{q}_m \; \text{in} \right\rangle.$$
1) What are "in" and "out" states?
2) Are they Fock states?
3) In Schrödinger or Heisenberg or interaction representation?
4) How are they related? (I believe that I see what they handwavily represent physically, but not formally.)
My main issue is that, if "in" and "out" states are one-particle eigenstates of the free hamiltonian, i.e. if $\left| \vec{p}_1 \text{out} \right\rangle$ describes a free particle with momentum $\vec{p}_1$, and $\left| \vec{p}_1 \text{in} \right\rangle$ also describes a free particle with momentum $\vec{p}_1$, then $\left| \vec{p}_1 \text{out} \right\rangle = \left| \vec{p}_1 \text{in} \right\rangle$ ... which is false. Still, books (some at least) describe these "in" and "out" states like that.
Moreover, I have seen (e.g. in Wikipedia, but also on this answer) that the scattering matrix is a map between two different Fock states, and I don't understand that.
5) Do states of the interacting system live in the same Fock space that asymptotic free states?
6) And if not, where do they live?
Understandable references would be appreciated.
*1/2. In and out states (of massive theories) are joint energy-momentum eigenstates (spanning asymptotic in and out Fock spaces) of asymptotic, free Hamiltonians (and momentum operators) associated with the bound states of a theory.
These Hamiltonians are not identical with the Hamiltonian defining the finite-time dynamics of the theory; in simple cases (ordinary quantum mechanics without bound states) they are just the Hamiltonians obtained by discarding the interaction terms. (For a rigorous discussion of this well understood situation see Chapter 3 in Volume 3 of Thirring's treatise on mathematical physics.)
*3. The representation (Schrödinger or Heisenberg or interaction) doesn't change the meaning of the states; it just changes where the dynamics is recorded.
*4. In and out states are related by the S-matrix, through the formula in your original question. For a single particle in an external potential (which is equivalent to two particles with a translation-invariant interaction, viewed in the rest frame of their center of mass), this is usually handled via the Lippman-Schwinger equation, treated in most textbooks.
The relation $|p_1,in\rangle=|p_1,out\rangle$ (which you believe to be false) is in fact true, as single bound states do not scatter. The S-matrix is the identity on (dressed) single-particle states of a translation invartiant theory. Things get interesting when there are at least two particles around. Since only the total momentum is conserved, there is typically an exchange of momentum, and the amount is determined by the S-matrix. (The classical analogue is the change of direction when playing a golf ball across an uneven lawn - in the analogy the unevenness would be due to the influence of the second particle.)
*5. In a relativistic quantum field theory, the asymptotic Fock spaces are not equivalent to the Hilbert space in which the dynamics happens. The latter is never a Fock space (which means that the commutation relations are realized in an inequivalent manner). This is called Haag's theorem, and is the main reason for the UV divergences in perturbative QFT, where one tries to ignore this fact. See, e.g.,
Haag's theorem and practical QFT computations
Renormalization scheme independence of beta function
*6. The asymptotic spaces are obtained by a limiting procedure from the space where the finite-time dynamics happens, via Haag-Ruelle theory. In the nonrelativistic case, there is a somewhat less technical construction due to Sandhas
http://projecteuclid.org/euclid.cmp/1103839514
• Thanks ! I have lots of things to read, but a first more question : for (4), I am tempted to say that n free particles with momenta $p_1$ ... $p_n$ long before or long after interaction are the same thing, so that $\left| p_1, p_2, \cdots p_n \; \text{in} \right\rangle = \left| p_1, p_2, \cdots p_n \; \text{out} \right\rangle$, thus leading to $S = \mathbb{I}$ without additional terms ... This is probably false, and I fail to see why it is. Perhaps after understanding what you said it will be more clear. – A. Zerkof Oct 22 '12 at 20:01
• @A.Zerkof: I added something to 4. – Arnold Neumaier Oct 22 '12 at 20:28
• Another time, thanks for your answer. I'll allow myself one more naive question : is it correct to say that we begin form asymptotic Fock states $\left|p_1, p_2, \cdots \right\rangle$ and somehow map them to interacting states in an Hilbert space where they evolve (with some evolution operator $U$), and "after" the interaction, we map them back to Fock states $\left|p_1, p_2, \cdots \right\rangle$, so that, at the end, we have something like $B U A \left|p_1, p_2, \cdots \right\rangle$, with $B$ and $A$ the operators that map between asymptotic and interacting spaces. [cf. next comment] – A. Zerkof Nov 12 '12 at 14:07
• @A.Zerkof: The asymptotic plane-wave states are already smeared out over infinite volume and are "noninteracting" in the sense that the scattering is a subleading correction to their behavior. This is why the Fock space is already in the theory. – Ron Maimon Aug 29 '14 at 17:14
• @ArnordNeumaier Accroding to Bjorken and Drell, if I understand correctly, they show that in and out states are eigenstates of the full Hamiltonian of the interacting theory. They show that in and out states are eigenstates of $P^mu$ of the full theory. Peskin and Schroeder, too, tend to say something similar. But I'm throughly confused. – SRS Jun 1 '17 at 4:24 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8850976228713989, "perplexity": 458.5123865679382}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256887.36/warc/CC-MAIN-20190522163302-20190522185302-00025.warc.gz"} |
https://socratic.org/questions/how-do-you-find-the-square-root-of-52 | Algebra
Topics
# How do you find the square root of 52?
Sep 12, 2015
$\sqrt{52} = 2 \sqrt{13} \approx 7.21110$
#### Explanation:
If $a , b \ge 0$ then $\sqrt{a b} = \sqrt{a} \sqrt{b}$, so:
$\sqrt{52} = \sqrt{{2}^{2} \cdot 13} = \sqrt{{2}^{2}} \sqrt{13} = 2 \sqrt{13}$
If you want to calculate an approximation by hand, you could follow the advice I gave for $\sqrt{28}$ in http://socratic.org/questions/how-do-you-find-the-square-root-28
Using the method described there:
Let $n = 52$, ${p}_{0} = 7$, ${q}_{0} = 1$
Then:
${p}_{1} = {7}^{2} + 52 \cdot {1}^{2} = 49 + 52 = 101$
${q}_{1} = 2 \cdot 7 \cdot 1 = 14$
${p}_{2} = {101}^{2} + 52 \cdot {14}^{2} = 10201 + 10192 = 20393$
${q}_{2} = 2 \cdot 101 \cdot 14 = 2828$
Stopping at this point, we get a result accurate to $5$ decimal places:
$\sqrt{52} \approx \frac{20393}{2828} \approx 7.21110$
##### Impact of this question
4671 views around the world | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 14, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9348986744880676, "perplexity": 901.351219630923}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540499439.6/warc/CC-MAIN-20191207132817-20191207160817-00456.warc.gz"} |
https://circa.cs.ualberta.ca/index.php?title=CIRCA:User_Testing&action=getLaTeX | # LaTeX code for User Testing
\documentclass[a4paper,11pt]{article}
\usepackage{ulem}
\usepackage{a4wide}
\usepackage[dvipsnames,svgnames]{xcolor}
\usepackage[pdftex]{graphicx}
\usepackage{hyperref}
% commands generated by html2latex
\begin{document}
While it is tempting to think you know what users want when developing a web site or application, you may be the worst person to define needs. For this reason it is important to both design for anticipated users (other than yourself) and to test with users. Here are some methods for doing that:
\begin{itemize}
\item Developing Personas and Scenarios is one way to design an interface in a structured fashion.
\item The \href{/index.php/CIRCA:Thinking_Aloud}{ Thinking Aloud} method is a way to get feedback from users.
\item Journaling is a way of keeping track of the your (the developer/researcher) ideas about what is happening.
\item Card testing is a way of testing vocabulary choices.
\end{itemize}
\end{document} | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.2858807444572449, "perplexity": 1388.8541345699357}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704799711.94/warc/CC-MAIN-20210126073722-20210126103722-00218.warc.gz"} |
https://events.berkeley.edu/?event_ID=111591&date=2017-09-25&tab=academic | ## Arithmetic Geometry and Number Theory RTG Seminar: Rational motivic path spaces
Seminar | September 25 | 3:10-5 p.m. | 891 Evans Hall
Ishai Dan-Cohen, Ben-Gurion University
Department of Mathematics
A central ingredient in Kim's work on integral points of hyperbolic curves is the “unipotent Kummer map” which goes from integral points to certain torsors for the prounipotent completion of the fundamental group, and which, roughly speaking, sends an integral point to the torsor of homotopy classes of paths connecting it to a fixed base-point. In joint work with Tomer Schlank, we introduce a space Ω of rational motivic loops, and we construct a double factorization of the unipotent Kummer map which may be summarized schematically as $\mbox {points} \to \mbox {rational motivic points} \to \Omega \mbox {-torsors} \to \pi _1\mbox {-torsors}.$ Our “connectedness theorem” says that any two motivic points are connected by a non-empty torsor. Our “concentration theorem” says that for an affine curve, Ω is actually equal to $\pi _1$.
Seminar Format: The seminar consists of two 50-minute talks, a pre-talk (3:10-4:00) and an advanced talk (4:10-5:00), with a 10-minute break (4:00-4:10) between them. The advanced talk is a regular formal presentation about recent research results to general audiences in arithmetic geometry and number theory; the pre-talk (3:10-4:00) is to introduce some prerequisites or background for the advanced talk to audiences consisting of graduate students.
[email protected] | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9021678566932678, "perplexity": 2468.483519870456}, "config": {"markdown_headings": true, "markdown_code": false, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573052.26/warc/CC-MAIN-20190917040727-20190917062727-00057.warc.gz"} |
https://johnmayhk.wordpress.com/2013/06/20/just-a-q/ | # Quod Erat Demonstrandum
## 2013/06/20
### just-a-q
Filed under: NSS — johnmayhk @ 3:10 下午
Tags:
Just set a so-called senior form core mathematics question:
Q.1 Find the general term $T_n$.
Solution
$T_1=1$
$T_2=1+6$
$T_3=1+6+6\times 2$
$T_4=1+6+6\times 2+6\times 3$
$\dots$
Observe the pattern,
$T_n$
$=1+6+6\times 2+6\times 3+\dots+6\times (n-1)$
$=1+6(1+2+3+\dots +(n-1))$
$=1+3n(n-1)$
Q.2 Observe the following pattern, guess the ongoing patterns and prove it.
$T_{101}=30301$
$T_{1001}=3003001$
$T_{10001}=300030001$
$T_{100001}=30000300001$
$\dots$
$T_{201}=120601$
$T_{2001}=12006001$
$T_{20001}=1200060001$
$T_{200001}=120000600001$
$\dots$
Solution
Not difficult to obtain something like $3a^2(10^{2n})+3a(10^n)+1$
Q.3 Explore more patterns about $T_n$.
Solution
Urm, try something like $T_{66...67}$, $T_{166...67}$ etc. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 24, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7947009205818176, "perplexity": 14740.24543796563}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863834.46/warc/CC-MAIN-20180620182802-20180620202802-00056.warc.gz"} |
https://www.ias.ac.in/describe/article/sadh/045/0076 | • Optimizing warehouse network reliability under intentional disruption by increasing network ambiguity: a multi objective optimization model
• # Keywords
Network reliability; warehouse location; ambiguity; intentional disruption; interdiction
• # Abstract
In today’s world, intentional disruptions in networks are expanding and the impacts are seen in many parts of the world. An effective approach for reducing the impact of such disruptions is to confuse invaders. Increasing ambiguity in the network is one of the effective ways which may confuse the invaders. Toattain this goal, dummy facilities are added to the network. Dummy facilities are the facilities which are exactly the same as the real ones thus making it hard for the invader to make the distinction. In this paper, a new multiobjectivemathematical model is presented to suitably design a network consisting of real and dummy warehouses. One objective is to minimize the total cost and the other is set to maximize reliability. An index for assessing network reliability is also introduced and used. The model is solved using AUGMECON and NSGAII.Results demonstrate that establishing dummy facilities in the network will increase reliability while no significant cost is imposed. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9198442697525024, "perplexity": 1666.003995648978}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519600.31/warc/CC-MAIN-20210119170058-20210119200058-00693.warc.gz"} |
https://docs.utopia-project.org/html/models/Geomorphology.html | Geomorphology Model#
This is a basic implementation of a geomorphology model, combining erosion due to rainfall and toppling with tectonic uplift. It is implemented as a stochastic cellular automaton grid, where the state of each cell $$i$$ consists of the topological height $$h_{t,i}$$ (double), the drainage area to a cell, and the watercolumn $$w_{t,i}$$ (double). In the beginning, the heights of the cells represent a (discretized) inclined plane. Rainfall is encapsulated in the drainage network representing a river system. Drainage is always passed from one cell to its lowest grid neighbor; sinks are filled with water (watercolumn) and the overflow receives the drainage upstream from the lake. The higher the drainage area to a cell, the more water flows over this cell. Stream power erodes sediments over time. Additionally, a stochastic process of toppling is considered.
Initial Configuration#
In order to observe the formation of a river network, the cell heights are initialized as an inclined plane. Denoting the coordinates of a cell $$i$$ as $$x_i, y_i$$, its initial height is given by
$h_{0,i} = \Delta h + s \cdot y_i.$
Negative topological heights are forbidden here and set to 0, i.e. the normal distribution is cut at 0.
The drainage network is a fictional construct, integrating continuous rainfall over time. It translates to the size and stream power of a river at the cell.
Algorithm#
The erosion process is implemented by asynchronously updating all the cells (in one time step $$t$$) according to the following steps:
1. Uplift:
The height of each cell is incremented by the normally distributed $$u$$ that represents uplift.
2. Set drainage network:
1. Map all cells to their lowest neighbor; if none is lower than the cell itself, the cell is mapped to itself.
2. Fill sinks (no lower neighbor) with water, such that a lake forms and one of the lake cells has a lower neighbor or is an outflow boundary. All lake cells point to this cell.
3. Set drainage area. For every cell, pass the cells assigned drainage area (default 1., cummulated with that receved from other already called cells) downstream through the already initialized network (adding the drainage area to every cell on the way) and dump it on any cell passed by, that was not yet called or is an outflow boundary.
3. Stream power erosion:
$\frac{dz}{dt} = c * \Delta z * \sqrt{A}$
with the rock heigth z, the stream power constant c, and the drainage area A.
4. Toppling:
With a frequency f per cell evaluate the failure probability for slope:
$p = s / h_c$
with the critial height $$h_c$$. If toppling occurs, the slope is reduced to 1/3 of its initial value.
Default configuration parameters#
Below are the default configuration parameters for the Geomorphology model.
# --- Space
space:
periodic: false
# --- CellManager and cell initialization
cell_manager:
grid:
structure: square
resolution: 64 # cells per unit length of space's extent
neighborhood:
mode: Moore # can be: empty, vonNeumann, Moore
# Initialization parameters for each cell
cell_params:
initial_height_mean: 10. # choose large enough to don't get negative values
initial_height_var: 0.1
initial_slope: 0.0001
# Quantities related to soil
uplift_mean: 1.
uplift_var: .01 # must be > 1e-10
erodibility: .01
stream_power_coef: 1.e-3
toppling_frequency: 1.e-3
toppling_critical_height: 45.
toppling_slope_reduction_factor: 3.
Available plots#
The following plot configurations are available for the Geomorphology model:
Default Plot Configuration#
ca:
based_on: ca
ca_snapshot:
based_on:
- ca
- .plot.ca.snapshot
Base Plot Configuration#
.variables:
base_path: &base_path data/Geomorphology
# =============================================================================
# ╔╦╗╔═╗╔╦╗╔═╗╦ ╔═╗╔╦╗╔═╗╔═╗
# ║ ║╣ ║║║╠═╝║ ╠═╣ ║ ║╣ ╚═╗
# ╩ ╚═╝╩ ╩╩ ╩═╝╩ ╩ ╩ ╚═╝╚═╝
# =============================================================================
# Overload some configs to insert model-specific settings
# Model-specific defaults
.defaults:
based_on: .defaults
# Can define something here ...
# .. Creators .................................................................
.creator.universe:
based_on:
- .creator.universe
- .defaults
dag_options:
select_path_prefix: *base_path
.creator.multiverse:
based_on:
- .creator.multiverse
- .defaults
select_and_combine:
base_path: *base_path
# =============================================================================
# ╔═╗╦ ╔═╗╔╦╗╔═╗
# ╠═╝║ ║ ║ ║ ╚═╗
# ╩ ╩═╝╚═╝ ╩ ╚═╝
# =============================================================================
# The spatial development in the CA
ca:
based_on:
- .creator.universe
- .plot.ca
# Select the data and process it
select:
height: height
watercolumn: watercolumn
# In the drainage area calculation, log10 leads to container attributes
# being dropped; need to manually add them back to not lose information
_array_attrs:
path: drainage_area
transform: [.attrs]
log10_drainage_area:
path: drainage_area
transform:
- log10
- .assign_attrs: [!dag_prev , !dag_tag _array_attrs]
# Select the properties to plot
to_plot:
height:
title: Rock Height
cmap: gist_earth
log10_drainage_area:
title: $log_{10}$ Drainage Area
cmap: Blues
vmin: 0
vmax: max
watercolumn:
title: Water Column
cmap: Blues
For available base plots, see Base Plot Configuration Pool. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6984542012214661, "perplexity": 10262.408765233493}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00255.warc.gz"} |
https://www.groundai.com/project/the-close-t-tauri-binary-system-v4046-sgr-rotationally-modulated-x-ray-emission-from-accretion-shocks/ | Rotationally modulated X-rays from accretion
# The close T Tauri binary system V4046 Sgr: Rotationally modulated X-ray emission from accretion shocks
## Abstract
We report initial results from a quasi-simultaneous X-ray/optical observing campaign targeting V4046 Sgr, a close, synchronous-rotating classical T Tauri star (CTTS) binary in which both components are actively accreting. V4046 Sgr is a strong X-ray source, with the X-rays mainly arising from high-density () plasma at temperatures of MK. Our multiwavelength campaign aims to simultaneously constrain the properties of this X-ray emitting plasma, the large scale magnetic field, and the accretion geometry. In this paper, we present key results obtained via time-resolved X-ray grating spectra, gathered in a 360 ks XMM-Newton observation that covered 2.2 system rotations. We find that the emission lines produced by this high-density plasma display periodic flux variations with a measured period, d, that is precisely half that of the binary star system ( d). The observed rotational modulation can be explained assuming that the high-density plasma occupies small portions of the stellar surfaces, corotating with the stars, and that the high-density plasma is not azimuthally symmetrically distributed with respect to the rotational axis of each star. These results strongly support models in which high-density, X-ray-emitting CTTS plasma is material heated in accretion shocks, located at the base of accretion flows tied to the system by magnetic field lines.
Accretion, accretion disks — Stars: individual: (catalog V4046 Sgr) — Stars: magnetic field — Stars: pre-main sequence — Stars: variables: T Tauri, Herbig Ae/Be — X-rays: stars
## 1 Introduction
In the context of star formation and evolution, understanding the physics of young low-mass stars is essential. Such stars possess strong magnetic fields that regulate the transfer of mass and angular momentum to and from the circumstellar disk, via accretion and outflow phenomena. Young low-mass stars are also intense sources of high-energy emission (UV and X-rays) that ionizes, heats, and photoevaporates material in the circumstellar disk, thus affecting its physical and chemical evolution and, eventually, the disk lifetime (Ercolano et al., 2008; Gorti & Hollenbach, 2009).
Low-mass pre-main sequence stars are classified as classical T Tauri stars (CTTS) when they still accrete mass from the circumstellar disk. They become weak-line T Tauri stars (WTTS) when the accretion process ends. Both CTTS and WTTS are bright in X-rays due to the presence of hot coronal plasmas, heated and confined by the intense stellar magnetic fields (Feigelson & Montmerle, 1999; Favata & Micela, 2003; Preibisch et al., 2005; Güdel & Nazé, 2009). It was suggested that in CTTS also the accretion process, beside the coronal magnetic activity, can provide a further X-ray emission mechanism (Ulrich, 1976; Gullbring, 1994; Lamzin, 1999). Magnetospheric accretion models predict that in CTTS mass transfer from the inner disk onto the star occurs via accretion streams funneled by magnetic flux tubes (e.g. Königl, 1991; Hartmann et al., 1994; Bouvier et al., 2007), where material moves in a almost free fall with typical velocities of . The impact with the stellar atmosphere, usually involving small fractions of the stellar surface, generates shock fronts that heat the infalling material up to temperatures of a few MK, and therefore should yield significant emission in the soft X-ray band ( keV). Numerical modeling predicts high () even for low accretion rates (), indicating that X-ray emission related to the accretion process can rival or exceed coronal emission (Günther et al., 2007; Sacco et al., 2008) at least in principle.
Strong evidence of accretion-driven X-rays from CTTS has been provided by the observed high densities of the X-ray emitting plasma at MK (, Kastner et al., 2002; Schmitt et al., 2005; Günther et al., 2006; Argiroffi et al., 2007; Huenemoerder et al., 2007; Robrade & Schmitt, 2007; Argiroffi et al., 2011). These densities, considering the typical accretion rates and surface filling factors, are compatible with predictions of shock-heated material, and are significantly higher than that of typical quiescent coronal plasmas at temperatures of a few MK (, Ness et al., 2004; Testa et al., 2004). Moreover Güdel & Telleschi (2007) observed a soft X-ray excess in CTTS with respect to WTTS, compatible with the scenario of a further plasma component at a few MK produced by accretion. However other results are discrepant with predictions: the observed of the high-density cool-plasma component in CTTS is lower than that predicted from the accretion rate by more than a factor 10 (Argiroffi et al., 2009; Curran et al., 2011), leaving the coronal component the major contributor to the X-ray emission in CTTS; furthermore in the cool plasma of CTTS the density increases for increasing temperature, at odds with predictions based on a single accretion stream (Brickhouse et al., 2010). Because of these apparent discrepancies different scenarios were proposed, suggesting that the high-density cool plasma in CTTS could be coronal plasma, confined into magnetic loops, that is somehow modified by the accretion process (Güdel et al., 2007; Brickhouse et al., 2010; Dupree et al., 2012).
In addition to containing plasma at a few MK, the shock region is known to be associated with material at K or more, significantly hotter than the surrounding unperturbed photosphere, as a consequence of the energy locally deposited by the accretion process. This photospheric hot spot produces excess emission in the UV and optical band, which is often rotationally modulated because of the very small filling factor of the accretion-shock region and because accretion streams are usually not symmetric with respect to the rotation axis (Bouvier et al., 1993; Herbst et al., 1994; Petrov et al., 2001). Therefore, if the observed high-density X-ray emitting plasma also originates in the accretion shock, then, its X-ray emission might display rotational modulation. Specifically plasma heated in the accretion-shock, observed in the X-rays, could display periodic variations in density, emission measure, average temperatures, absorption, and source optical depth, as a consequence of stellar rotation. First hints of accretion driven X-rays that vary because of the stellar rotation were provided by Argiroffi et al. (2011) for the star V2129 Oph.
Understanding the origin of this high-density plasma is important, both for constraining the total amount of X-rays emitted in CTTS, and setting the energy balance of the accretion-shock region (Sacco et al., 2010). Eventually, a definitive confirmation that this plasma component is material heated in the accretion shock, would make its X-ray radiation an insightful tool to probe the physical properties (i.e. density and velocity) of the accretion stream, and to measure the chemical composition of the inner disk material (Drake et al., 2005).
To search for such X-ray modulation effects we planned and carried out X-ray monitoring of V4046 Sgr, a close binary CTTS system in which both components are actively accreting from a circumbinary disk (see § 3).
In this work we describe the first results from an XMM-Newton Large Program (LP) focused on V4046 Sgr, based on time-resolved high-resolution X-ray spectroscopy on timescales down to 1/10 of the system orbital period. To constrain the large-scale magnetic field and the accretion geometry, we also carried out a coordinated multi-wavelength campaign involving photometry, spectroscopy, and spectropolarimetry of V4046 Sgr.
In § 2 we summarize the project focused on V4046 Sgr, whose properties are described in § 3. Details of the data processing and analysis are reported in § 4. The observing results are presented in § 5, and then discussed in § 6.
## 2 The V4046 Sgr project
The XMM-Newton observation of V4046 Sgr consists of a 360 ks exposure performed on 2009 September 15-19 (Obs-id: 0604860201, 0604860301, and 0604860401). This observation is part of a quasi-simultaneous multi-wavelength campaign (optical photometry with REM/ROSS, 2009 September 1-30; optical spectroscopy with TNG/SARG, 2009 September 10-17; optical spectropolarimetry with CFHT/ESPADONS, 2009 September 2-8), aimed at studying simultaneously the properties of coronal plasmas, stellar magnetic field structure, photospheric spots (both cool spots and hot spots), and the accretion process.
Here we present the results obtained with the XMM-Newton/RGS specifically aimed at searching for rotational modulation in the accretion-driven X-rays. The results of the entire observing campaign are presented in a series of papers describing, among other results, the properties of the X-ray emitting plasma (A. Maggio et al., in preparation), maps of the large-scale magnetic field structure and accretion geometry as inferred from optical spectropolarimetry (Donati et al., 2011, G. A. J. Hussain et al., in preparation, S. G. Gregory et al., in preparation), variations in the accretion process over a range of timescales (G. G. Sacco et al., in preparation), detection and identification of a distant comoving WTTS system (Kastner et al., 2011).
## 3 V4046 Sgr properties
V4046 Sgr is a close CTTS binary system composed of two solar-like mass stars (masses of 0.91 and , radii of 1.12 and Donati et al., 2011), separated by . The two components are synchronously rotating with a period of 2.42 d, in circularized orbits (Stempels & Gahm, 2004). V4046 Sgr is estimated to lie at a distance of 73 pc (Torres et al., 2008) and it is viewed with an inclination of (the angle between the rotation axis and the line of sight, Stempels & Gahm, 2004; Kastner et al., 2008), with the orbital axis of the binary likely aligned with the individual stellar rotation axes (Donati et al., 2011). At an age of Myr (Torres et al., 2008; Donati et al., 2011) and classified as a CTTS, V4046 Sgr is still surrounded by a dusty, molecule-rich circumbinary disk (Rodriguez et al., 2010) from which both the components are actively accreting (Stempels & Gahm, 2004).
A previous Chandra observation (Günther et al., 2006) showed that V4046 Sgr has a cool plasma component ( MK) at high density (), interpreted as material heated in the accretion shock.
At the time of the XMM-Newton observation, the spectroscopic optical monitoring demonstrated that both components were accreting with a constant rate of (inferred from the analysis of the Ca ii IRT, Donati et al., 2011). Both components displayed complex magnetic fields (average surface intensity of G, Donati et al., 2011), significantly weaker than that of younger solar-like CTTS (e.g. Donati et al., 2010). These magnetic fields are not strong enough to disrupt local disks farther than above stellar surface, thus the formation of circumstellar stellar disks around each component, distinct from the circumbinary disk, may be possible (de Val-Borro et al., 2011). The accretion process, based on Ca ii IRT, did not show significant rotational modulation, suggesting that post shock material contributing to these lines is symmetrically distributed with respect to stellar poles.
The optical monitoring campaign confirmed the orbital/rotational period (), and determined the conjunction and quadrature epochs at the time of the XMM-Newton observation17. In this work we adopt the phase reference defined in Stempels & Gahm (2004, , with phase indicating the quadrature with primary receding). However our optical monitoring revealed a phase shift of 0.069 with respect to that ephemeris, with quadratures occurring at phases 0.93 and 0.43, and conjunctions at phases 0.18 and 0.68 (Donati et al., 2011).
## 4 Observations
The XMM-Newton observation of V4046 Sgr, composed of three observing segments of ks each separated by gaps of ks, covered 2.2 system rotations. X-ray emitting material heated in the accretion shock is expected to have temperatures of a few MK at most. Therefore to search for X-ray variability possibly produced in the accretion shock we analyzed the XMM-Newton/RGS spectra, that contain emission lines that specially probe the coolest plasma components.
The RGS spectrograph, composed of two nominally identical gratings (RGS1 and RGS2), covers the Å wavelength range. The first order spectrum, embracing the Å band, has a resolution FWHM of 0.06 Å, while the second order provides a resolution FWHM of 0.03 Å in the Å range. We extracted RGS spectra using the standard rgsproc task. Data were filtered discarding time segments affected by high background count rates. The final net exposures of the three observing segments were of 115, 122, 120 ks, respectively. We then applied the rgscombine task to add the RGS1 and RGS2 spectra of the same order. Totally 34800 and 8200 net counts were registered in the first and second order RGS spectra, respectively.
We analyzed the RGS spectra using the IDL package PINTofALE v2.0 (Kashyap & Drake, 2000) and the XSPEC v12.5 (Arnaud, 1996) software. We measured individual line fluxes by fitting simultaneously first and second18 order RGS spectra. Fit procedure was performed in small wavelength intervals ( Å). The adopted best fit function takes into account the RGS line spread function (determined by the matrix response fuction), and the continuum contribution (determined by adding a constant to the line emission, and leaving this constant as a free parameter in the fit).
## 5 Results
The RGS spectra collected during the entire observation (see details in A. Maggio et al., in preparation) indicate that the main properties of the X-ray emitting plasma of V4046 Sgr are similar to those observed during the previous Chandra observation (Günther et al., 2006): the plasma at MK has high density, , as determined by the line ratio of He-like triplets of N vi, O vii, and Ne ix19.
### 5.1 Time resolved RGS spectra
To investigate variability on short timescales, we analyzed RGS spectra gathered in time intervals of ks (i.e. bins of 0.12 in rotational phase). Totally nine lines have fluxes detected at 1 level in all the time intervals. These lines, and their fluxes at different time intervals, are reported in Table LABEL:t1. Significant variability on the explored timescales is observed for all the listed lines.
To check for variations in the coolest plasma components we considered lines with peak formation temperature MK among the lines reported in Table LABEL:t1. This sample of lines, named cool lines, is composed of: the Ne ix triplet (13.45, 13.55, and 13.70 Å), O viii Ly20 and Ly (16.00 and 18.98 Å), O vii resonance line (21.60 Å), and N vii Ly (24.78 Å). Among the lines reported in Table LABEL:t1, the Ne x and Fe xvii lines stay out of the cool line sample, because of their higher than 5 MK. Therefore their flux likely includes significant contributions from hot plasma. These two lines compose the hot line sample.
To maximize the of the coolest plasma emission we added the measured fluxes of the cool lines for each time interval. This total line flux, plotted in Fig. 1, is variable and the observed modulation is clearly linked to the stellar rotation: the flux is higher near phases 0.0 and 0.5, i.e. quadrature phases, and lower near phases 0.25 and 0.75, i.e. conjunction phases. To confirm this variability pattern we fitted these observed flux variations with a sinusoid plus a constant. We left all the best-fit function parameters (period, phase, amplitude, and the additive constant) free to vary. We obtained a best-fit period of d, and an amplitude of with respect to the mean value (Table LABEL:t2). The inferred period is exactly half the rotational period of the system. As guessed maximum and minimum phases occur approximately at quadrature and conjunction, respectively. To check whether this observed modulation is effectively linked to the cool plasma emission, and not to a given line emission, we performed the same fit by separately considering the total flux obtained from different and independent cool line subsets. In all the inspected cases (see Table LABEL:t2) we found the same periodic variability (period, phase, amplitude).
We checked whether this modulation is present also in the emission of hotter plasma by applying the same fit procedure to the total flux of the hot lines, Ne x and Fe xvii. Fit results are reported in Table 2, in this case the periodic modulation is not detected. The observed variability is instead likely dominated by hot (coronal) plasma. Figure 2 shows a comparison between Ne x+Fe xvii line variability with modulation observed for the cool lines. The detected X-ray rotational modulation is also not visible in the EPIC lightcurves (A. Maggio et al., in preparation), even considering only a soft band. The substantial continuum contribution mostly due to the highly variable hot plasma likely masks the rotationally modulated signal. Hence we conclude that the observed X-ray line flux modulation is due to the high-density, cool plasma component.
To understand the nature of the observed variability we searched for variations in the average temperature by considering ratios of lines originating from the same element. All the inspected ratios display significant variability, but are not correlated among themselves, and are not related to the rotational phase. We also searched for variations in the plasma density, probed by the ratio of the Ne ix triplet. This line ratio is approximately constant (, indicating ) during the entire observation, except for a lower value measured during the third interval of the second segment (, corresponding to ), and a higher value observed during the fourth interval of the third segment (, corresponding to ). These variations appear to be associated with episodic events, like clumpy accretion flows, and not with a rotational modulation effect.
### 5.2 RGS spectra at different phases
The total flux of the cool lines from V4046 Sgr displayed variations in time linked to the stellar rotation. To investigate the differences of the X-ray emitting plasma corresponding to epochs of low and high fluxes of the cool lines, we added RGS data collected at the same phases with respect to the X-ray rotational modulation. We extracted two RGS spectra obtained by adding all the events registered during time intervals centered on maximum and minimum times, with duration of one fourth of the observed X-ray period (integration time intervals are shown in Fig. 1). The two resulting low and high spectra, whose exposure times are 84 and 94 ks respectively, are shown in Fig. 3, while the measured line fluxes, detected at 1 level in the two spectra, are listed in Table LABEL:t3.
We searched for differences in the low and high spectra to investigate how the emitting plasma properties vary between these two phases. The two spectra display significantly different photon flux ratios of N vii, O viii, Ne ix lines, as reported in Table LABEL:t4. In principle, these line ratios may vary due to changes of absorption, plasma temperature, or source optical depth. In Fig. 4 we plot the measured line ratios together with the values predicted in the optically thin regime for different temperatures and different hydrogen column densities, .
Absorption can change line ratios because, on average, lines at longer wavelengths suffer larger attenuation for increasing . The two N vii lines considered here are an exception, because the absorption cross section of the interstellar medium has the oxygen K-shell edge (23.3 Å, e.g. Wilms et al., 2000) located between their wavelengths, making the longer wavelength line, the Ly (24.78 Å), slightly less absorbed than the Ly (20.91 Å). The two lines however suffer very similar absorption, making the absorption effect of little relevance in the case of the N vii Ly/Ly ratio (as can be seen from the upper panel of fig. 4, where the curves predicted for different are very similar). Therefore any change in this line ratio, as that observed, is hardly explained in terms of variability. Instead, an decrease from the low to the high state might explain the variation of the O viii line ratios, but an opposite variation should be invoked to justify the Ne ix variability (middle and lower panels of fig. 4). All this findings indicate that the hydrogen column density toward the source appears to be unchanged, and that line ratio variability is produced by a different mechanism. This conclusion is supported by the similar fluxes between low and high spectra measured for the two lines at long wavelengths (N vi at 28.8 Å and C vi at 33.7 Å), the most affected by absorption, and it is also confirmed by the full fledged analysis of the EPIC data presented in A. Maggio et al., in preparation, where is found to vary by only a factor 2 over the whole observation around a mean value of (i.e. ).
The three explored ratios depend also on temperature, because of the different energy of the upper levels of the two electronic transitions considered in each ratio. In this respect, the three ratios do not vary consistently. In fact, a temperature decrease from the low state to the high state could explain the increasing N vii and O viii line ratios, but not the variation Ne ix lines. The derivation of the plasma model (see A. Maggio et al., in preparation) is beyond the scope of this work, but we anticipate here that the does not appear to vary enough between the two phases to justify the observed variations of the line ratios. Moreover the average plasma temperature (), together with the measured , indicates that, in some phases, line ratios are not compatible with the optically thin limit, irrespective of the nature of their variability.
Optical depth effects can change line ratios because each line optical depth is directly proportional to the oscillator strength of the transition (Acton, 1978). Therefore, if optically thin emission does not apply, transitions with very different oscillator strength may suffer different attenuation/enhancement, with stronger effects occurring in lines with higher oscillator strengths. In the inspected ratios the lines with higher oscillator strength are the line of N vii and O viii, and the Å line of Ne ix (e.g. Testa et al., 2007). Non negligible optical depth is expected in strong X-ray resonance lines produced from shock-heated plasma in CTTS (Argiroffi et al., 2009). The observed variable ratios might indicate that some lines are affected by a changing optical depth. Since the expected attenuation/enhancement with respect to optically thin emission depends on the source geometry and viewing angle, stellar rotation can produce periodic changes in the line opacity, and hence in the observed ratios. However, once again the three ratios do not vary in the same direction, with N vii and O viii ratios being higher in the low state, whereas the ratio of the slightly hotter Ne ix lines results higher in the high phase.
Summarizing we stress the significant variations observed in line ratios between low and high phases. The origin of these variations remains unclear. If these variations were due to changes in plasma temperature or absorption, a coherent behavior would be expected for the three ratios, and this is not the case. Opacity effects instead can operate in a more complex way, provoking both line enhancements or reductions, depending on the source geometry and viewing angle. This hypothesis is therefore the most intriguing, especially considering that in some phases line ratios are discrepant from the value expected in the optically-thin limit.
## 6 Discussion
The main result of the time resolved spectral analysis of the X-ray emitting plasma from V4046 Sgr (§ 5) is that the high-density plasma component at MK is rotationally modulated with a period of half the system orbital period, with maximum and minimum phases occurring at quadrature and conjunction epochs, respectively. The observed X-ray rotational modulation indicates that this high-density plasma component is not symmetrically distributed with respect to the stellar rotational axes. We also found that strong emission lines from this plasma component provide some indications of non negligible optical depth effects, and that the periodic modulation appears to be associated with variations in the source optical depth, as evidenced by the significant variations in line ratios sensitive to optical depth observed between low and high phases.
The strongest X-ray emission lines, produced by shock-heated material in CTTS, are expected to have non-negligible optical depth due to the high density and typical size of the post-shock region (Argiroffi et al., 2009). Moreover the optical depth should vary if the viewing geometry of the post shock region changes.
Hints of non-negligible optical depth observed in the strongest X-ray lines of V4046 Sgr indicate that the high-density plasma is mostly concentrated in a compact portion of the stellar surface, as predicted for the post-shock material. Moreover, the variability of the optical depth can be naturally explained with the changing viewing geometry of the volume occupied by the high-density plasma during stellar rotation. This scenario requires plasma confinement by the stellar magnetic fields.
We observed an X-ray period of half the system orbital period, as already observed for accretion indicators (e.g. Vrba et al., 1993; Kurosawa et al., 2005) and X-ray emission (Flaccomio et al., 2005) from some CTTS. That could be explained, in the case of V4046 Sgr, by different scenarios. If the X-ray emitting plasma is located only in one of the two system components, then a period of half the rotational period is observed when there are two accretion-shock regions on the stellar surface at opposite longitudes, or there is only one accretion-shock region and the maximum X-ray flux is observed when the base of the accretion stream is viewed sideways (Argiroffi et al., 2011, a configuration that occurs twice in one stellar rotation).
Considering the system symmetry and the accretion geometry previously suggested by Stempels & Gahm (2004), it is conceivable that both components possess similar amounts of high-density cool plasma. In this scenario the half period can be naturally explained assuming that the location on each stellar surface of this plasma, compact and not azimuthally symmetric with respect to each stellar rotation axis, is symmetric for rotations with respect to the binary rotation axis.
The simultaneous optical monitoring campaign indicated that the two components have similar accretion rates, validating the assumption that the two components possess similar amounts of high-density plasma. However, the optical accretion spots, probed by Ca ii IRT, did not show rotational modulation (Donati et al., 2011). Therefore accretion regions emitting Ca ii should be symmetrically distributed with respect to the stellar poles. This scenario, different from that obtained from the X-ray data, could be reconciled considering that X-rays are likely produced only by a fraction of the entire accretion-shock region (Sacco et al., 2010).
In conclusion, our XMM-Newton/RGS data of the V4046 Sgr close binary system have shown for the first time the rotational modulation of X-ray lines characteristic of a cool, high-density plasma corotating with the stars. This strongly support the accretion-driven X-ray emission scenario, in which the high-density cool plasma of CTTS is material heated in the accretion shock. It moreover suggests that the accretion flow is channeled by magnetic field lines anchored on the stars, along small magnetic tubes. This is consistent with the general framework of magnetic accretion, but brings new insights into the accretion mechanism in close binary systems of CTTS.
This work is based on observations obtained with XMM-Newton, an ESA science mission with instruments and contributions directly funded by ESA Member States and NASA. C.A., A.M., and F.D. acknowledge financial contribution from the agreement ASI-INAF I/009/10/0.
### Footnotes
1. affiliation: Dip. di Fisica, Univ. di Palermo, Piazza del Parlamento 1, 90134 Palermo, Italy, email: [email protected]
2. affiliation: INAF - Osservatorio Astronomico di Palermo, Piazza del Parlamento 1, 90134 Palermo, Italy
3. affiliation: INAF - Osservatorio Astronomico di Palermo, Piazza del Parlamento 1, 90134 Palermo, Italy
4. affiliation: Institut d’Astrophysique de Paris, 98bis bd Arago, FR 75014 Paris, France
5. affiliation: MIT, Kavli Institute for Astrophysics and Space Research, 77 Massachusetts Avenue, Cambridge, MA 02139, USA
6. affiliation: Observatoire de Paris, LESIA, 5, place Jules Janssen, F-92195 Meudon Principal Cedex, France
7. affiliation: ISDC Data Center for Astrophysics, University of Geneva, Ch. d’Ecogia 16, CH-1290 Versoix, Switzerland
8. affiliation: Observatoire de Genève, University of Geneva, Ch. des Maillettes 51, 1290 Versoix, Switzerland
9. affiliation: UJF-Grenoble 1 / CNRS-INSU, Institut de Planétologie et d’Astrophysique de Grenoble (IPAG) UMR 5274, Grenoble, F-38041, France
10. affiliation: INAF - Osservatorio Astronomico di Palermo, Piazza del Parlamento 1, 90134 Palermo, Italy
11. affiliation: IRAP-UMR 5277, CNRS & Univ. de Toulouse, 14 Av. E. Belin, F-31400 Toulouse, France
12. affiliation: California Institute of Technology, MC 249-17, Pasadena, CA 91125 USA
13. affiliation: University of Vienna, Department of Astronomy, Türkenschanzstrasse 17, 1180 Vienna, Austria
14. affiliation: ESO, Karl-Schwarzschild-Strasse 2, 85748 Garching bei München, Germany
15. affiliation: Center for Imaging Science, Rochester Institute of Technology, 54 Lomb Memorial Drive, Rochester, NY 14623, USA
16. affiliation: Center for Imaging Science, Rochester Institute of Technology, 54 Lomb Memorial Drive, Rochester, NY 14623, USA
17. The quadrature with primary receding occurred at 2455078.199 HJD
18. Second order spectrum was used only for lines contained in its wavelength range.
19. The measurements of the Ne ix triplet was performed by including in the fit the Fe xix line at 13.52 Å, that is anyhow weaker than the Ne ix lines.
20. This is blended with an Fe xviii, that is however negligible because of the and abundances of the X-ray emitting plasma.
21. Period.
22. Amplitude.
23. First epoch of maximum flux after observation start, since HJD 2455089.
24. Reduced obtained with a sinusoid as best-fit function (4 free parameters).
25. Reduced obtained with a constant as best-fit function (1 free parameters).
### References
1. Acton, L. W. 1978, ApJ, 225, 1069
2. Argiroffi, C., Flaccomio, E., Bouvier, J., Donati, J.-F., Getman, K. V., Gregory, S. G., Hussain, G. A. J., Jardine, M. M., Skelly, M. B., & Walter, F. M. 2011, A&A, 530, A1
3. Argiroffi, C., Maggio, A., & Peres, G. 2007, A&A, 465, L5
4. Argiroffi, C., Maggio, A., Peres, G., Drake, J. J., López-Santiago, J., Sciortino, S., & Stelzer, B. 2009, A&A, 507, 939
5. Arnaud, K. A. 1996, in Astronomical Society of the Pacific Conference Series, Vol. 101, Astronomical Data Analysis Software and Systems V, ed. G. H. Jacoby & J. Barnes, 17
6. Bouvier, J., Alencar, S. H. P., Harries, T. J., Johns-Krull, C. M., & Romanova, M. M. 2007, Protostars and Planets V, 479
7. Bouvier, J., Cabrit, S., Fernandez, M., Martin, E. L., & Matthews, J. M. 1993, A&A, 272, 176
8. Brickhouse, N. S., Cranmer, S. R., Dupree, A. K., Luna, G. J. M., & Wolk, S. 2010, ApJ, 710, 1835
9. Curran, R. L., Argiroffi, C., Sacco, G. G., Orlando, S., Peres, G., Reale, F., & Maggio, A. 2011, A&A, 526, A104
10. de Val-Borro, M., Gahm, G. F., Stempels, H. C., & Pepliński, A. 2011, MNRAS, 372
11. Donati, J.-F., Gregory, S. G., Montmerle, T., Maggio, A., Argiroffi, C., Sacco, G., Hussain, G., Kastner, J., Alencar, S. H. P., Audard, M., Bouvier, J., Damiani, F., Güdel, M., Huenemoerder, D., & Wade, G. A. 2011, MNRAS, 417, 1747
12. Donati, J.-F., Skelly, M. B., Bouvier, J., Gregory, S. G., Grankin, K. N., Jardine, M. M., Hussain, G. A. J., Ménard, F., Dougados, C., Unruh, Y., Mohanty, S., Aurière, M., Morin, J., & Farès, R. 2010, MNRAS, 409, 1347
13. Drake, J. J., Testa, P., & Hartmann, L. 2005, ApJ, 627, L149
14. Dupree, A. K., Brickhouse, N. S., Cranmer, S. R., Luna, G. J. M., Schneider, E. E., Bessell, M. S., Bonanos, A., Crause, L. A., Lawson, W. A., Mallik, S. V., & Schuler, S. C. 2012, ApJ, in press
15. Ercolano, B., Drake, J. J., Raymond, J. C., & Clarke, C. C. 2008, ApJ, 688, 398
16. Favata, F., & Micela, G. 2003, Space Sci. Rev., 108, 577
17. Feigelson, E. D., & Montmerle, T. 1999, ARA&A, 37, 363
18. Flaccomio, E., Micela, G., Sciortino, S., Feigelson, E. D., Herbst, W., Favata, F., Harnden, Jr., F. R., & Vrtilek, S. D. 2005, ApJS, 160, 450
19. Gorti, U., & Hollenbach, D. 2009, ApJ, 690, 1539
20. Güdel, M., & Nazé, Y. 2009, A&A Rev., 17, 309
21. Güdel, M., Skinner, S. L., Mel’Nikov, S. Y., Audard, M., Telleschi, A., & Briggs, K. R. 2007, A&A, 468, 529
22. Güdel, M., & Telleschi, A. 2007, A&A, 474, L25
23. Gullbring, E. 1994, A&A, 287, 131
24. Günther, H. M., Liefke, C., Schmitt, J. H. M. M., Robrade, J., & Ness, J. 2006, A&A, 459, L29
25. Günther, H. M., Schmitt, J. H. M. M., Robrade, J., & Liefke, C. 2007, A&A, 466, 1111
26. Hartmann, L., Hewett, R., & Calvet, N. 1994, ApJ, 426, 669
27. Herbst, W., Herbst, D. K., Grossman, E. J., & Weinstein, D. 1994, AJ, 108, 1906
28. Huenemoerder, D. P., Kastner, J. H., Testa, P., Schulz, N. S., & Weintraub, D. A. 2007, ApJ, 671, 592
29. Kashyap, V., & Drake, J. J. 2000, Bulletin of the Astronomical Society of India, 28, 475
30. Kastner, J. H., Huenemoerder, D. P., Schulz, N. S., Canizares, C. R., & Weintraub, D. A. 2002, ApJ, 567, 434
31. Kastner, J. H., Sacco, G. G., Montez, R., Huenemoerder, D. P., Shi, H., Alecian, E., Argiroffi, C., Audard, M., Bouvier, J., Damiani, F., Donati, J.-F., Gregory, S. G., Güdel, M., Hussain, G. A. J., Maggio, A., & Montmerle, T. 2011, ApJ, 740, L17
32. Kastner, J. H., Zuckerman, B., Hily-Blant, P., & Forveille, T. 2008, A&A, 492, 469
33. Königl, A. 1991, ApJ, 370, L39
34. Kurosawa, R., Harries, T. J., & Symington, N. H. 2005, MNRAS, 358, 671
35. Lamzin, S. A. 1999, Astronomy Letters, 25, 430
36. Ness, J., Güdel, M., Schmitt, J. H. M. M., Audard, M., & Telleschi, A. 2004, A&A, 427, 667
37. Petrov, P. P., Gahm, G. F., Gameiro, J. F., Duemmler, R., Ilyin, I. V., Laakkonen, T., Lago, M. T. V. T., & Tuominen, I. 2001, A&A, 369, 993
38. Preibisch, T., Kim, Y., Favata, F., Feigelson, E. D., Flaccomio, E., Getman, K., Micela, G., Sciortino, S., Stassun, K., Stelzer, B., & Zinnecker, H. 2005, ApJS, 160, 401
39. Robrade, J., & Schmitt, J. H. M. M. 2007, A&A, 473, 229
40. Rodriguez, D. R., Kastner, J. H., Wilner, D., & Qi, C. 2010, ApJ, 720, 1684
41. Sacco, G. G., Argiroffi, C., Orlando, S., Maggio, A., Peres, G., & Reale, F. 2008, A&A, 491, L17
42. Sacco, G. G., Orlando, S., Argiroffi, C., Maggio, A., Peres, G., Reale, F., & Curran, R. L. 2010, A&A, 522, A55
43. Schmitt, J. H. M. M., Robrade, J., Ness, J., Favata, F., & Stelzer, B. 2005, A&A, 432, L35
44. Stempels, H. C., & Gahm, G. F. 2004, A&A, 421, 1159
45. Testa, P., Drake, J. J., & Peres, G. 2004, ApJ, 617, 508
46. Testa, P., Drake, J. J., Peres, G., & Huenemoerder, D. P. 2007, ApJ, 665, 1349
47. Torres, C. A. O., Quast, G. R., Melo, C. H. F., & Sterzik, M. F. 2008, Young Nearby Loose Associations, ed. Reipurth, B., 757
48. Ulrich, R. K. 1976, ApJ, 210, 377
49. Vrba, F. J., Chugainov, P. F., Weaver, W. B., & Stauffer, J. S. 1993, AJ, 106, 1608
50. Wilms, J., Allen, A., & McCray, R. 2000, ApJ, 542, 914
You are adding the first comment!
How to quickly get a good reply:
• Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
• Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
• Your comment should inspire ideas to flow and help the author improves the paper.
The better we are at sharing our knowledge with each other, the faster we move forward.
The feedback must be of minimum 40 characters and the title a minimum of 5 characters | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.90732342004776, "perplexity": 5350.320372817045}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232260161.91/warc/CC-MAIN-20190526225545-20190527011545-00025.warc.gz"} |
https://hal-cea.archives-ouvertes.fr/cea-01794006v1 | Nuclear data correlation between different isotopes via integral information - Archive ouverte HAL Access content directly
Journal Articles EPJ N - Nuclear Sciences & Technologies Year : 2018
## Nuclear data correlation between different isotopes via integral information
Dimitri Rochman
• Function : Correspondent author
• PersonId : 1032172
Connectez-vous pour contacter l'auteur
Eric Baugé
• Function : Author
Alexander Vasiliev
• Function : Author
Hakim Ferroukhi
• Function : Author
Gregory Perret
• Function : Author
#### Abstract
This paper presents a Bayesian approach based on integral experiments to create correlations between different isotopes which do not appear with differential data. A simple Bayesian set of equations is presented with random nuclear data, similarly to the usual methods applied with differential data. As a consequence, updated nuclear data (cross sections, $\bar \nu$, fission neutron spectra and covariance matrices) are obtained, leading to better integral results. An example for $^{235}$U and $^{238}$U is proposed taking into account the Bigten criticality benchmark.
#### Domains
Physics [physics] Nuclear Experiment [nucl-ex]
### Dates and versions
cea-01794006 , version 1 (02-10-2019)
### Identifiers
• HAL Id : cea-01794006 , version 1
• DOI :
### Cite
Dimitri Rochman, Eric Baugé, Alexander Vasiliev, Hakim Ferroukhi, Gregory Perret. Nuclear data correlation between different isotopes via integral information. EPJ N - Nuclear Sciences & Technologies, 2018, 4, pp.7. ⟨10.1051/epjn/2018006⟩. ⟨cea-01794006⟩
### Export
BibTeX TEI Dublin Core DC Terms EndNote Datacite
64 View | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8891544342041016, "perplexity": 23473.455440181933}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00267.warc.gz"} |
https://www.encyclopediaofmath.org/index.php?title=Witt_vector&oldid=14729 | # Witt vector
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
An element of an algebraic construct, first proposed by E. Witt [1] in 1936 in the context of the description of unramified extensions of -adic number fields. Witt vectors were subsequently utilized in the study of algebraic varieties over a field of positive characteristic [3], in the theory of commutative algebraic groups [4], [5], and in the theory of formal groups [6]. Let be an associative, commutative ring with unit element. Witt vectors with components in are infinite sequences , , which are added and multiplied in accordance with the following rules:
where , are polynomials in the variables , with integer coefficients, uniquely defined by the conditions
where
are polynomials, and is a prime number. In particular,
The Witt vectors with the operations introduced above form a ring, called the ring of Witt vectors and denoted by . For any natural number there also exists a definition of the ring of truncated Witt vectors of length . The elements of this ring are finite tuples , , with the addition and multiplication operations described above. The canonical mappings
are homomorphisms. The rule (or ) defines a covariant functor from the category of commutative rings with unit element into the category of rings. This functor may be represented by the ring of polynomials (or ) on which the structure of a ring object has been defined. The spectrum (or ) is known as a Witt scheme (or a truncated Witt scheme) and is a ring scheme [3].
Each element defines a Witt vector
called the Teichmüller representative of the element . If is a perfect field of characteristic , is a complete discrete valuation ring of zero characteristic with field of residues and maximal ideal . Each element can be uniquely represented as
where . Conversely, each such ring with field of residues is canonically isomorphic to the ring . The Teichmüller representation makes it possible to construct a canonical multiplicative homomorphism , splitting the mapping
If is the prime field of elements, is the ring of integral -adic numbers .
#### References
[1] E. Witt, "Zyklische Körper und Algebren der characteristik vom Grad . Struktur diskret bewerteter perfekter Körper mit vollkommenem Restklassen-körper der Charakteristik " J. Reine Angew. Math. , 176 (1936) pp. 126–140 [2] S. Lang, "Algebra" , Addison-Wesley (1974) [3] D. Mumford, "Lectures on curves on an algebraic surface" , Princeton Univ. Press (1966) [4] J.-P. Serre, "Groupes algébrique et corps des classes" , Hermann (1959) [5] M. Demazure, P. Gabriel, "Groupes algébriques" , 1 , North-Holland (1971) [6] J. Dieudonné, "Groupes de Lie et hyperalgèbres de Lie sur un corps de charactéristique VII" Math. Ann. , 134 (1957) pp. 114–133
There is a generalization of the construction above which works for all primes simultaneously, [a3]: a functor called the big Witt vector. Here, is the category of commutative, associative rings with unit element. The functor described above, of Witt vectors of infinite length associated to the prime , is a quotient of which can be conveniently denoted by .
For each , let be the polynomial
Then there is the following characterization theorem for the Witt vectors. There is a unique functor satisfying the following properties: 1) as a functor , and for any ring homomorphism ; 2) , is a functorial homomorphism of rings for every and .
The functor admits functorial ring endomorphisms , for every , that are uniquely characterized by for all . Finally, there is a functorial homomorphism that is uniquely characterized by the property for all , .
To construct , define polynomials ; ; by the requirements
The and are polynomials in ; and the are polynomials in the and they all have integer coefficients. is now defined as the set with addition, multiplication and "minus" :
The zero of is and the unit element is . The Frobenius endomorphisms and the Artin–Hasse exponential are constructed by means of similar considerations, i.e. they are also given by certain universal polynomials. In addition there are the Verschiebung morphisms , which are characterized by
The are group endomorphisms of but not ring endomorphisms.
The ideals define a topology on making a separated complete topological ring.
For each , let be the Abelian group under multiplication of power series;
defines a functional isomorphism of Abelian groups, and using the isomorphism there is a commutative ring structure on . Using the Artin–Hasse exponential defines a functorial homomorphism of rings
making a functorial special -ring. The Artin–Hasse exponential defines a cotriple structure on and the co-algebras for this co-triple are precisely the special -rings (cf. also Category and Triple).
On the Frobenius and Verschiebung endomorphisms satisfy
and are completely determined by this (plus functoriality and additivity in the case of ).
For each supernatural number , , one defines , where is the -adic valuation of , i.e. the number of prime factors in . Let
Then is an ideal in and for each supernatural a corresponding ring of Witt vectors is defined by
In particular, one thus finds , the ring of infinite-length Witt vectors for the prime , discussed in the main article above, as a quotient of the ring of big Witt vectors .
The Artin–Hasse exponential is compatible in a certain sense with the formation of these quotients, and using also the isomorphism one thus finds a mapping
where denotes the -adic integers and the field of elements, which can be identified with the classical morphism defined by Artin and Hasse [a1], [a2], [a3].
As an Abelian group is isomorphic to the group of curves of curves in the one-dimensional multiplicative formal group . In this way there is a Witt-vector-like Abelian-group-valued functor associated to every one-dimensional formal group. For special cases, such as the Lubin–Tate formal groups, this gives rise to ring-valued functors called ramified Witt vectors, [a3], [a4].
Let be the sequence of polynomials with coefficients in defined by
The Cartier ring is the ring of all formal expressions
(*)
with the calculation rules
Commutative formal groups over are classified by certain modules over . In case is a -algebra, a simpler ring can be used for this purpose. It consists of all expressions (*) where now the only run over the powers of the prime . The calculation rules are the analogous ones. In case is a perfect field of characteristic and denotes the Frobenius endomorphism of (which in this case is given by ), then can be described as the ring of all expressions
in two symbols and and with coefficients in , with the extra condition and the calculation rules
This ring, and also its subring of all expressions
is known as the Dieudonné ring and certain modules (called Dieudonné modules) over it classify unipotent commutative affine group schemes over , cf. [a5].
#### References
[a1] E. Artin, H. Hasse, "Die beide Ergänzungssätze zum Reciprozitätsgesetz der -ten Potenzreste im Körper der -ten Einheitswurzeln" Abh. Math. Sem. Univ. Hamburg , 6 (1928) pp. 146–162 [a2] G. Whaples, "Generalized local class field theory III: Second form of the existence theorem, structure of analytic groups" Duke Math. J. , 21 (1954) pp. 575–581 [a3] M. Hazewinkel, "Twisted Lubin–Tate formal group laws, ramified Witt vectors and (ramified) Artin–Hasse exponentials" Trans. Amer. Math. Soc. , 259 (1980) pp. 47–63 [a4] M. Hazewinkel, "Formal group laws and applications" , Acad. Press (1978) [a5] M. Demazure, P. Gabriel, "Groupes algébriques" , 1 , North-Holland (1971)
How to Cite This Entry:
Witt vector. Encyclopedia of Mathematics. URL: http://www.encyclopediaofmath.org/index.php?title=Witt_vector&oldid=14729
This article was adapted from an original article by I.V. Dolgachev (originator), which appeared in Encyclopedia of Mathematics - ISBN 1402006098. See original article | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9785118103027344, "perplexity": 790.8868197426008}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526931.25/warc/CC-MAIN-20190721061720-20190721083720-00543.warc.gz"} |
https://socratic.org/questions/5347164102bf3470fef25589 | Chemistry
Topics
# Question 25589
Apr 14, 2014
Boyle's law developed by Robert Boyle in 1662, states that if we keep the temperature of a gas constant in a sealed container. Its pressure (P) varies inversely with its volume (V). In other words at any given temperature. If we pressurize a gas its volume will be reduced proportionately to the pressure change. If we increase the volume of a gas its pressure will increase.
I am not sure what you mean by the steps, but I can help you identify a Boyle's Law problem, and tell you how to solve it.
Boyle's Law is that Pressure, P is inversely related to volume, V at constant temperature and number of moles. The mathematical relationship is
$P = k \cdot \frac{1}{V}$
which rearranges to
$P \cdot V = k$,
where $k$ is a constant.
Since $P V = k$, you get ${P}_{1} {V}_{1} = {P}_{2} {V}_{2}$.
You can tell a problem will be a Boyle's law problem, if there is a change in pressure or volume and it asks you about the other.
For example, you could be asked the following:
If a gas at atmospheric pressure, has its container expand to three times its volume, what is the new pressure.
Solution
${P}_{1} = 760 m m H g$
${V}_{1} = {V}_{1}$
P_2 = ?#
${V}_{2} = 3 {V}_{1}$ because the new volume is 3 times bigger.
${P}_{1} {V}_{1} = {P}_{2} {V}_{2}$ Boyle's Law
${P}_{2} = \frac{{P}_{1} {V}_{1}}{V} _ 2$ Divide both sides by ${V}_{2}$
${P}_{2} = \frac{\left(760 m m H g\right) {V}_{1}}{3 {V}_{1}}$ Substitute givens.
${P}_{2} = \frac{760 m m H g}{3} = 253.3 m m H g$
##### Impact of this question
10763 views around the world | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 14, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7268869280815125, "perplexity": 532.052523393889}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670512.94/warc/CC-MAIN-20191120060344-20191120084344-00034.warc.gz"} |
https://issuu.com/zetmoon/docs/commodore_magazine_vol-10-n07_1989_jul | <££)
\ July 1989
FOR COMMODORE AND AMIGA USERS
ACIMSIIM
A Decade of Games Including Sneak Preview of
tars II
15 GAME REVIEWS!
64 & 128 Out Run, Serve & Volley amiga Zany Soli Dragon's Lair
Profitable Amiga Video Plus
1541 Disk Rescue
07
o
7 as
"ozzaa
6
$2.95 U.S.$3.95 Canada
■■■
m
.
-
'■ j
J
#
"
EOFLAWENF HASAR
has H
m
-^ Detroit has seen better days.
A gang of ruthless hoods has overrun the city, and crime is out of control.
Attacks on the streets. Drug trafficking. Corruption and cop killing. It's so bad a private firm, O.C.R, now runs
the police department. As RoboCop, your job is simple-clean up the city. Armed with a heavy-duty arsenal of weapons, including
RoboCop's Special Issue Auto-9, make your way past street
thugs, the notorious Clarence Boddicker and the powerful ED-2O9 to your final battle with Dick Jones.
Serving the public trust, upholding the law, and protecting the innocent was never so challenging, never so
dangerous, and never so much fun as this. With great graphics and great game action, the future of law enforcement is ROBOCOP. From Data East.
Now available tor Commodore 64. Coming soon on IBM Amiga and Atari STp&sonal comput&s,
DAT/I SciOEtns shown aic (torn aicaflc version Cunpilcr version may vary
Data East USA Inc., 470 Needles Drive, San Jose, CA 95lT2{408) 286-7074
Sharpen Your Commodore™ Skills While You Build a Great Software Collection— ONLY $6.65! LOADSTAR" is two disks Reviewers Love LOADSTAR! each month filled with great software for your ". ..I highly recommend loadstar. If you can afford only one disk service, make it Loadstar..." Steve Leven, Commodore Microcomputers Commodore 64 or 128. Subscribers Love LOADSTAR! Learn From the Experts "The music and graphics are totally superb. Some of the besi Draw on the vast experience of our 1 have ever seen" Steven T. Boston editors to provide you with care fully selected software you can use each month, from spread Contents of Issue #49 sheets to role-playing games, from telecommunications to Power Budget Keep track of your accounting to recipe programs. spending, make projections. With easy-to-use documentation, Down, Down, Down Can you survive you will master each new application six levels of acid mines? with confidence and ease. Robot Rescue As Mandar II, rescue our ambassadors from the Vordax, Notepad Two text screens for notes. Become Experienced Inexpensively J'op-DOS LIST one BASIC program Without investing a fortune, LOADSTAR will help you to see why from another, among other things. your Commodore 64 or 128 is the most versatile and powerful tool Cris-Cros Poker Play 10 ha nds at once. you own. You will know more about your Commodore, its capabili Plus Chump, Animal, Joystick Art, ties, and software for it, than you would have thought possible. At$6.65, LOADSTAR is the best value in software today.
Statistics Analyzer, Template Maker,
Invisible Aid 128,2 Potato, and more! (Available iis a Back Issue)
Try our Monthly Software for Three Months Every month your postman will bring you the latest issue of LOADSTAR, contained on unprotected 5'A" diskettes. Each issue is
chock-full of great software, including utilities, games, home and business applications, and educational programs. Order now and you will receive the "Best of LOADSTAR" absolutely free. Otinninctofv 6-7 ami Oimrnwif/tv 128 tin- m>//v"iiirks of Onnniot!»n- Busim^-c Machines
Jh I? PTh the "Be5t "f LOADSTAK"—a collection of J fourteen of the best programs from recent is
sues—when you order the next 3 issues of LOADSTA K for your Commodore 64 family computer.
Below are the programs on the "Best of LOADSTAR:" Sidel Diskovery
DiskWrlter
BASIX64& 128
Ha nner
Jump! Towers Of Hanoi
Znrphon
Yahtzee
If you are not satisfied with your purchase for any reason, return your
first issue for .1 full $19.95 refund. TIil> "Best of LOA1KTAK" is yours to keep, You can'l lose. Hint this is a trial subscription mid thai 1 am under no obligation to continue beyond three months. (Canada/Mexico$2435,
Overseas 527.95)
Side 2
Puzzle Maker File Viewer Star Terminal
LOADSTAR Forum Submission Form Sector Editor
my three month subscription to LOADSTAR for my Commodore64 or 128 for only $19-95 postage paid. I understand Name Address City _ State Z1P+4 Telephone Q VISA/MC AmEx a Payment Enclosed Card* Exp. Date_ Call Toll Free 1-800-831-2694 (Louisiana Residents add ■!•;; Snic* Taxi SOI-TDISK [ik P.O.Box 30008 CO07' Shreveport, LA 71130-0008 "^ â– : Striker and Blade. The Bad Dudes. Facing some ol the nastiest ninjas in the known world - accompanied by a gang of fire- spitting thugs and their cohorts, mad dogs who are intent on serious crime. This crowd of malcontents has somehow gotten its ugly mitts on the president of the United States. And what they plan to do with him isn't pretty. I What Striker and Blade have to do isn't any picnic either. But someone's got to do it, right? What better time for you to start dishing out the BAD DUDES'am version of the criminal justice system? The action is top-notch. The graphics, phenomenal. BAD DUDES from Data East. Mr. President, help is on the way. Data East USA Inc., 470 Needles Drive. San Jose, CA 95112 (408) 286-7074 Screens shonn ate item tho IBM version Diner compute' rerstons r.i, iaiy t Daia East USA. Inc Ban Dudes is a istrjisiereo liaaenwk ol Data Easl USA. Inc Commodore M A G A Z N E JULY 1989, Volume 10, Number 7 FEATURES PROFITABLE AMIGA VIDEO 54 54 The advent of the Amiga heralded the birth of desktop video. We spotlight two video companies that rely on what the Amiga does for the bottom line. Then we'll tell you about the software they use and the multitude of products available in this burgeoning field. COVER STORY ACTIVISION CELEBRATES A MEMORABLE DECADE 50 Over the past ten years Activision has made millions of joystick jockeys' dreams come true. The company has changed and grown over the years and enters its second decade with a new corporate Amiga Video Product Information 81 title—Mediagenic. Under this umbrella fall such well-respected lines as Infocom, Gamestarand Activision Entertainment. Find out more about the company's diverse offerings including a sneak peek at Ghostbusters II. COVER PHOTO: Charles Bartholomew Software; Out Run by Mindscape (64 version an monitor] Zany Gotf by Electronic Arts (Amiga version imagesl Ghostbusters II'" is a liadsmark o( Columbia Pictures Industries, Inc. Ghostbusters II" Logo is copyright 1989 by Columbia Pictures Industries, Inc. All rights reserved. REVIEWS 64 AND 128 SOFTWARE REVIEWS AMIGA SOFTWARE REVIEWS Out Run by John Pustai 14 16 Serve & Volley by John Pustai Dragon's Lair by Jetfery Scott Hall Zany Go\t by Steve King 25 26 Road Wars by Mark Cotone 17 Better Dead Than Alien by Gary V. Fields 27 Street Sports Football by Scott A. May 18 Awesome Arcade Action Pack, \fol. 1 by Gary V. Fields 28 Alf's First Adventure by John Pustai Robbeary by Jetfery Scott Hall 29 Wizardry I: Proving Grounds by Russ Ceccola 19 20 Cosmic Relief by Russ Ceccola 30 Annals of Rome by John Ryan 22 Heroes of the Lance by John Ryan 31 Win, Lose or Draw by John Pustai 23 DeluxePrint II by Gary V. Fields The Write Stuff 128 by Scott A. May 24 MovieSetter by Gary V. Fields 33 34 DEPARTMENTS LETTERS 4 NEWS 6 TIPS & TRICKS Hints for Fun and Utility Compiled by Louis F. Sander Gold Mine Compiled by Louis F. Sander 10 12 SOFTWARE SHORTS A New Beginning by Russ Ceccola 35 INSIDE Q-LINK Welcome lo My World by Robert W. Baker 38 TECHNOLOGY System Crackers Indicted by Howard Millman 39 PROJECTS X-10 Power Line Interface by John lovine 40 ADVENTURE ROAD Fishing for the Death Angel by Shay Addams 43 PUMPING GEOS 46 Spreading the GEOSpel by Mark Jordan PROGRAMMING 58 1541 Disk Rescue by Robert J. Nedreski 128 MODE ML Programming via ihe Monitor by Mark Jordan 62 AMIGA UPDATE Still Video by Matthew Leeds 65 HOW TO ENTER PROGRAMS 90 MAGAZINE ENTRY PROGRAMS 92 ADVERTISERS INDEX 96 COMMODORE MAGAZINE 3 LETTERS not mention that may also have an effect Piracy Perspectives Our feature story on softivare piracy ("Those Generous Pirates" by Gary Fields, April 1989J drew more mail than any arti cle in recent memory. Our readers were quite vocal (and verbose) on the subject. Here are excerpts from some of their letters: To the Editor: In response to 'Those Generous Pi rates," I am a 16-year-old male, and I have lots of pirated games. My solution to piracy? Cut the prices down, put the games on the market faster, let people test the games before buying, and offer a trained version of a game after a while on the market. (Many hackers now "train" M A G computing read anything resembling a negative review. I have the feeling that a magazine will not print negative state A Z ments for fear of losing advertising dol lars. Before I purchased a paint program for my Amiga, I actively searched out copies Managing Editor Jim Gracely I was looking Tor features and ease of use. If there were bugs, I discounted them to Susan R. West of the available programs and tried them. Editor Technical Editor beta factors or copy problems. I finally Mike Rivers made a purchase and cleaned the test disks. I would much rather have just made my decision from trusted reviews. Art Director Gwenn Knapp [giving] unlimited lives. iThis is] one of my favorite things after trying two weeks to pass a certain level on a game.) me one day that he never ran any of them for more than a few minutes. He recently Assistant Art Director got sick of the whole pirating business and Art Production Czar Address Unknown Dear Editor: I disagree totally with Mr. Fields. Pi rates are not criminals! Example: say you want to make a pro gram that looks exactly like an alreadypublished one, but you want to add some thing extra on it. You take apart the origi nal published program and insert your ex tra idea. Put a new title screen on it and new music, and you have an entirely dif ferent game. Well, pirates crack the origi nal, put hack screens on it, add trainers (unlimited lives, etc.) and sometimes change the whole title screen. Incidentally, pirates crack originals by using copy programs such as the ones be ing sold in Commodore Magazine. I would very much like to see a followup to this article. Also, if you have the nerve, publish this letter. The Maniac Address Unknown Editor's Note: Sorry to disappoint you, but you can add all tlie new title screens, train ers and features you want in a game, and the resulting game will still be in violation of the copyright laws. Ask your friendly neighborhood lawyer. As a policy, Commo dore Magazine does not accept advertising for programs that can be used to pirate software. To Gary Fields: Thank you very much for the excellent article on piracy. One point that you did JULY 1989 E Publisher My son runs a 128 and just got a kick out of collecting programs. He confided to pirating. N Julie Bauer the games by making you invincible or If these things were done, I would stop 4 on reducing piracy is the magazine re view. I have only twice in my five years of Commodore Wilson Hatp Bob Clark destroyed hundreds of disks (some pur chased) and sold his system. Production Manager Jo-Ellen Temple Again thank you for a very well-written article. RodPetree Sunnyvale, CA Circulation To Gary Fields: Kenneth F. Battista The "problem" of pirating is not com pletely the pirates' fault. I remember when I got my 64, and the software was outrageously priced. Now if the software Advertising Sales Coordinator Brenda Billings had been "honest price for honest work"— Commodore Mogazine 1200 Wilson Drive then there would've been no market (or very little) for cracked copies. The quality of software has risen to phe West Chester, PA 19380 (215)431-9259 nomenal heights compared to three years ago—and yet you complain that quality software is on the way out due to piracy. I agree that pirating for profit is wrong, but what alternatives do the software companies give? From the get-go they've had their prices sky high for programs that aren't worth the disk they're stored on! Like the guy who bought a super ex pensive program only to find out it never did what they claim. Fve had four or five experiences like that, and I'm sick of these software companies taking a free ride at my expense. I don't buy from pirates, we share our stuff. And I know 40 or more BBS's who have non-PD software, but you can bet your microchips I won't snitch. L.Q. Columbus, OH Commodore Magazine, Volume 10, Number 7, July 1939. Commodore Msgaime is published monthly by Commo dore Magazine Inc., 1200 Wilson Drive, West Chester. PA 19380. U.S.A. U.S. subscriber rate is 135.40 per year; Canadian subscribe rale is 1*5.40 per year; Overseas sub scriber rale 15 165.00 per year. Questions concerning sub scription should be directed lo Commodore Magazine Sub scription Department. B01 651, Holmes. Pennsylvania 19043. Phone (800) 345-8112. Outside U.S. (215) 533ii'j i Copyright <S 1989 by Commodore Magazine Inc. All rights reserved. To the Editor: After reading Gary Fields' article, I was quite moved by its trite simplicity and its Continued on page 86 CBM, PET, VIC 20, and Commodore 64 aie registered trademarks ol Commodore Electronics Ltd. Super PET and Commodore 128 are trademarks ol Commodore Electronics Ltd. Amiga* is a registered trademark of Commodore-Amiga. COMPACT DISCS GET FOR THE PRICE OF DIFItFflUID ...with nothing more to buy ever! .,'... EGBEVenOWH DoBIBaCrull HEW JLGE BACH SI ICQfllmi n Jl' i— ■ 'cmSlir i doi e g 1 D 0 9 i < The Traveling Wilburys; Vol.1 CULL.ET fJOIS 10 0 8 3 1 C: n D* TAII 1111 u 1 ■! q 1 S i ii" dirKIL I ' in -. ■ iMIIIami i o o 1s a 1 0 S ] S ! IHIt' 11:1 15 3 10 0 VMtGEUS: Dlnil 10 0 17 0 ■ . ■ I ■-. . II : . 10 0 8 5 1 51VI ■ HUULU SHOwriECCl i s i 3 i a LI ■■ I[NN<O DIHTf DiWING'Driginil Sgwidttnt PERIMM 1 a 2 S 2 2 (IVUDI. IXEIMjnSCJISIMS D1 SUTIHf 1IW FfKSM FflUKt It 1 Bv 0 J 1 m Thf Pjfff r HZ j An Uid 1 i " I 0 0 i J a \ " ^ 1 0 0 j aotav »inm* iwin Man I0OUI u ' t E < i s s LELFWCCI] MAC Gitm-.l Hlli \Mtk Gibson Klcrlric . Youth , 1 1 S J 5 6 !MI1I 3 IflHSOF JtThHOIUU iinn URYH WMJIE I:J11ME..MIM i\i ' ANT 10 C 1 0 3 1 0 1 Dig UETUUCl In! Jvillca Fh ill RIC11STLI1 Hill Ma W nw Umi 10 10 5 9 GIPSY 1 INGS Frprith Violin ShDapicir II1S i S 7 tome-IOC Lit-f a Uh am lpil SeaadlrKL 10 10 3 9 skid now 1 0 1 15 a LOU HIED. HnVSrl StGOVlM'LMS F'ONCS iWlUlM lliuurt 1 0 1 II II 1, rjHOCDREA i&lhililc Elflfl MORE DIHTY DANCING BARQJLR1 COOK Thn Dlinrf Album 10 0 1 1 5 REM-OflEEH YANHALEN OUfllJ "f^'rrjl.,., MH TCrnnmsin. mi ovehtuhE Scni Chicago Sr^Bfonj TDUr CN1PMU 1005BG IDUO m sun itwii 115J3S Tilt IimWIHWOOD Roll Km II 1 0 0 I 3 0 1 ! S i ' t i s i i a ; UilHOVEH, SVHPH NO.; 100839 9 r. ".'i: ,■ 16 0 3 5 WELISSA EmERIDG! . ' ' ' ' ir ENTl. KBtrn.rl 1 0 1 0 2 I REPLACIHENTS' Ocn'L Till A Sd-uI i<<i i ■.■.■! i.i 1E1T0FSTEEHDM Dinn , - - , . UiHUafhum 1 S 3 S 2 rTpn' ■' FTiiltlJI IHLHIU 100M7 CRDSIT ST1LL1. MSH 1 VDUKC RUSH 1 She. 01 rt.nli JIS5 SnuliH.TlifllHllHia ,-,,,. I 0 0 7 3 6 ELmPfifSLEY-IINO 1NIB 10 1111 BEST OFEFUCCLAPTGN TdmffPiaai 2 o o s o e lEUHBOIS. Enrjlm Somrntr 1 2 3 3 B 5 INSTANT HALF-PRICE BONUS PLAN , Unlike olher clubs, you gel 50%-olf Bonus /O Savings with every CD you buy al regular Club prices, effective with your first full-pfice purchase! 100933 173233 101068 134647 . START NOW WITH 4 COMPACT DISCS! Yes, pick any 4 compact discs shown here! You need buy just one selection at regular Club prices (usually$14.98-$15.98)...and lake up lo one full year to do It. Than you can choose another CD Free. That's 6 compact discs for Ihe orico of 1 and there's nothing more to Buy...ovari (Shipping A handling added lo each shipment,) ■ — —■ mm, mm YOUR SAVINGS START HERE ■ •— — >^ - Mall to: BMG Compact Disc Club/ RO, Box 91412/lndianapolis, IN 46291 YES, please accept my membership in ihe BMG Compact Disc Club and send me ihe four Compact Discs I've Indicated horo. billing mo for just shipping and handling under the terms of this ad. I need buy |US11 CD at regular Club prices during the next year—after which I can choose a FREE CD! Thai's 6 for the price of I...wilh nothing more to buy ever! (Shipp ng 8 hand ing r. added, lo BBd BhlpfMtll) HOW THE CLUB OPERATES RUSH ME THESE 4 CDs i indicate Dy number): You select from hundreds ol exciting compact discs described in the Club's magazine and mailed to you approximately every 3 n*ek$ (19
times a year). Each issue highlights a Featured Selection in your preferred music category, plus alternate selections. If you'd like the Featured Selection, do nothing It will be sent to you automatically II
you'd prefer an alternate selection, or none at all. just return Ihe card enclosed wilh each issue ot your magazine by the date specified on the card. Ntiu will have at least 10 days lo decide, or you may ralurn your Featured Selection al our expense for full credil. Cancel your membership al any time alter completing your membership agreement, simply by writing to us.
lammoslinieiesledinlhBmusicalcategoryl i □ EASY LISTENING (Wumwm Ucom)
cJiBckedhem—bullmayfllwayslBellrBoio i
□ MRS
n MISS
FmlNanw
CD695
si I CLASSICAL
Lul Nimo
| PL EASE PRINT)
_..:■_
Telephone (
Listen to your A introductory selections for a full 10 days. II not
6550 E 30lti 5t , hdlimpolis. IN 46210-1194
Initial
Staia
satisfied, return Ihem wilh no further obligation. You send no money now, so complete the coupon and mail it today.
0
3 □ HARDROCK
□ MR.
City
FREE 10-DAV TRIAL
BMG Compact Disc Club
2 □ COUNTRY
thocso Iran any (cfiMfc ono only) J 4 Q POP'SOFT ROCK
SI Ln
S^iiiniSE
ntw nKmDrjB, comuwrrlal USA only Oncn
1
reserve I fie nrjhl to lequesl adrjriional ur.urnt ■■■! or Local lares, it■ any be added added ., will mil tw 1 V^^- ■
L
1 I FU
il^fMI
reieciasiy application application rejonmy
Lkf
lUI^UbiM
D-UbMIVIHI
I I FFU I I ■ IUI1U I I
V'
per tarn i ly
I Yoral Tulw I ^cV VlTT«U
J
LJ J
M
,
NEWS ■ NEWS • NEWS • NEWS • NEWS • NEWS ■ NEWS • NEWS
Commodore Offers Amiga Solutions for Vertical Markets Oommodore Business Machines, Inc. will target the Amiga
personal computer in four vertical markets, according to an
announcement made at COMDEX Spring in Chicago in April. The
four focus markets will be graphics, video, publishing and music. "The Amiga provides vertical market users with a creative tool to
DigiTek has also released Extra Course Disk #3 with 54 more holes for the Amiga version of the game. (The master program is
available for the Amiga for $39,95.) For more information contact: DigiTek Software, 8910 N. Dale Mabry, Executive Center, Suite 37, Tampa, FL 33614. Or call: (813) 933-8023. CompuServe Goes International CompuServe recently announced an agreement to distribute their enhance their work, without having to pay a high price," said David Archambault, director of product marketing, Commodore Business online information service in Europe. The expansion was made Machines, Inc. possible through an agreement with Tele Columbus of Baden, Support for the program will include targeted advertisements in Switzerland. CompuServe will initially market and support their newspapers and specialty magazines, a dealer training program and service in the UK and Switzerland, followed by other European customized Amiga hardware/software bundles for in-stcre demonstration of specific applications. Dealers will also be able to countries. Combined with an earlier expansion into Japan, CompuServe expects their interconnected electronic mall service to provide customers with how-to videos on the targeted applications. be the world's largest international communications system when To find a specialized Amiga dealer, consumers can call (800) 627- the European system is implemented this fall. 9595. Commodore/ITTE Video Grant Program Vommodore Business Machines, Inc. and the Institute for the Transfer of Technology to Education (ITTE) have selected 20 schools to participate in a special desktop video grant program. Participants will explore and create classroom applications for video projects using the Amiga 2000HD with genlock and software provided by Commodore. The schools were selected from over 75 proposals for classroom video projects submitted to the ITTE. "Because of the current interest in desktop video, Commodore did not expect to have difficulty getting SO good proposals, but we were pleasantly surprised to have gotten close to SO innovative projects submitted,'' said John DILullo, education manager, Commodore Business Machines, Inc.' 'We are well aware of the interest in desktop video among Amiga users, but what really surprised us was the amount of video knowledge and Interest for the everyday classroom applications," he added. Winners attended a two-day workshop in Atlanta, GA at the Omni Hotel at CNH Center. The two days of training included an official tour of the Cable News Network building. Watch future issues of Commodore Magazine for updates as this program progresses, More Hole-in-One Miniature Golf .ole-in-One Miniature Goli from DlgiTek is now available for the Commodore 64. The program Includes traditional holes like the ubiquitous windmill as well as more unusual holes like one played inside a pinball machine. Hole-in-One Miniature Golffor the Commodore 64 carries a suggested retail price of$29.95. 6
JULY 1989
Carmen in Amigaland -Ul Isewhere on the international front, Broderbund Is releasing Where in the World is Carmen Sandiego? on the Amiga. Carmen, a popular globetrotting thief, is famous for teaching fourth through ninth graders their geography lessons, but parents and teachers have also been known to get caught up in the global chase. The Amiga release has been revamped to take advantage of that machine's extensive graphic capabilities. The program comes with a copy of Hie World Almanac to help players with their research.
Suggested retail price of the award-winning program Is $44.96. For details on Carmen's whereabouts contact: Broderbund Software, Inc., 17 Paul Drive, San Rafael, CA 94903-2101. Or call: (415) 492-3200, Bogus Quarterback wentral Coast Software cautions Amiga users to ignore a bogus version of their hard disk back-up program Quarterback, which Is appearing on some BBS's. The counterfeit program known as "Quarterback 3.0" is an illegal copy of CCS's program. The current version of Quarterback is VS.S; CCS is currently working on V2.3, which will back up to devices that don't have a standard MountList entry. Registered users of V2.2 will be notified when the update Is available. For more information contact: Central Coast Software, 4S4 Vista Ave., Golden, CO 80401. Phone: (303) 526-1030. Famous Courses xlccess Software has released a supplemental disk for their bestselling golf ymgnm World Class Leader Board. Famous Courses of the World, Vol. 1 includes Harbour Town (SC), known as the 1 'Pebble Beach of the East"; Sunningdale (UK), built in the Nineteenth Century; Dorado Beach (Puerto Rico), one of the world's most demanding courses; and Pine Rddge, a fictional course designed by Access, which is the most difficult in the series. The disk is NEWS • NEWS • NEWS • NEWS • NEWS • NEWS • NEWS • NEWS available for the Commodore 64, Amiga and MS-DOS formats at a suggested retail price of 819.95. For details contact: Access Software, 645 W. BOO South, Bountiful, UT 84010. Or call: (800) 824-2549. Hardwired G old Disk has launched a subsidiary to market entertainment software and has announced the first two releases in their new line. Amiga Rampage xictivision has released an Amiga version of their movie- Hardwired is the company; the first two games are Denaris (In the shoot-'em-up genre) and Jinks (an arcade-style break-out game). The company will be supporting the Commodore 64, Amiga and MSDOS formats. For more monster spoof Rampage. Players control a ravenous information on this new venture, oversized critter (gorilla, lizard or wolf) on a destructive contact: Gold Disk, P.O. Box 739, Streelsvllle, Mississauga, forage through 132 different cities. The monster must build stamina and gain energy from the morsels he picks Ontario, Canada L5M 2C2. Phone: up along the way. Rampage for the Amiga sells for$3995.
(416) 828-0913.
The game is also available for the 64 (834.95) and MS-DOS machines (S39.95). For further information contact:
r
Activlsion, 3885 Bohannon Dr., Menlo Park, CA 940SS. Phone: (415)339-0800.
Dungeon Quest
(Tillies
-4 ^5^
JLmage Tech has released Dungeon Quest, a "multisensory graphic adventure'' for the Amiga. The program, a medieval battle against the forces of evil, boasts vivid graphics and digitised stereo sound and supports multitasking. Dungeon Quest (two-disk set) retails for
Denaris
Dark Si
C inemaware's Spotlight Software label is letting computer owners
take a walk on the Dark Side. The new program (available in 64, Amiga and MS-DOS formats) is a 3D space adventure in which the
player becomes a' 'mercenary of the future." Equipped with lasers, shields and a jet power pack, you must infiltrate a hostile area and disarm a weapon that is capable of destroying the universe. Dark
Side carries a suggested retail price of 839.95 for the Amiga and MS-
DOS versions and $29.95 for the Commodore 64. For details contact: Clnemaware Corp., 4165 Thousand Oaks Blvd., Westiake Village, CA 91362. Or call: (805) 495-6515. Wizardry Essay Contest Attention Wizardry Warrlorsl Come out of the dungeons and load Design 3D and The Advantage Un a more serious note, Gold Disk has released Design 3D and The Advantage for the Amiga. Design 3D is a modelling package suited for designers, artists, architects and engineers, as well as the home user and hobbyist. The program includes six line types and 16 colors and provides four views: top, side, front and perspective with four light sources. Design 3D is priced at$99.95. The Advantage is the latest in Gold Disk's Home Office Series. The program Includes a spreadsheet, database and graphics package and is designed to work on a 512K Amiga with a single disk drive. The
Advantage can be used to create charts and graphs to be imported \nto Professional Page orProfessional Draw. The program carries a suggested retail price of 879.95.
For further information on these releases, contact: Gold Disk, P.O. Box 789, Streetsville, Mlssissauga, Ontario, Canada L5M 2C2. Or call: (416)828-0913.
up your word processors, because Sir-Tech Software, publisher of the
popular series, is sponsoring an essay contest. The company wants to find out' "What's Hot, What's Not'' in the Wizardry world.' 'All the market research in the world won't tell us what a Wizardry player feels when he or she plays the game," said Brenda Garno, director of corporate communications. Essays must be no longer than 2000 words, and must Include a section on what the player would like to see in forthcoming
installments of Wizardry. Deadline for entries is September 30, 1989. Prizes Include free software, Wizardry jackets and other promotional items. Submit entries to: Sir-Tech Software, Inc., "Wizardry Contest;' P.O. Box 245, Ogdensburg, NY 13669.
COMMODORE MAGAZINE
7
NEWS ■ NEWS • NEWS ■ NEWS • NEWS ■ NEWS • NEWS • NEWS
Prospector in the Mazes ofXor Iljurosoft International has introduced Prospector in the Hazes
of Xor in North America. In this beat-the-clock maze game, two heroes are lost in the 15 mazes of Xor and must collect 645 blue balloons to have any chance of escape. The multitasking game features a fully digitized soundtrack and is already a hit among
European Amiga enthusiasts. Prospector In the Haies of Xor
retells for $39.95. For further information contact: Eurosoft International, 70 Woodfln Place, Suite 400, AshevillB, KC S8801. Or call; (704) 255-7590. products. For details contact: Lattice, Inc., 2500 S. Highland Ave., Lombard, IL 60146. Or call: (312) 916-1600. UpTime Educator Offer U pTime, The Disk Monthly, is making a special offer to teachers and schools. Their new promotion lets educators order "Three Disks for Three Dollars." Each issue contains ten programs in Commo dore 64 or MS-DOS format. The only Lattice Lowers C++ Price JJattlce, Inc. has lowered the price of their C++ package for the stipulation is that the order must be made on school letterhead. For more Information contact: UpTime, Box 299, Newport, RI02640. Phone: (401) 847- 2455. Amiga from$500 to $300. According to Lattice vice-president Robert Hansen,' 'We set the price at a level where projected sales over the product's life span would cover development costs and provide a fair return on our Investment." The product has proved more popular than the company's original projections Indicated, so the aavingB is Bible Search S 0GWAP Software has introduced Bible Search for the Commodore 64 and 128. The program contains the full text of the being passed on to customers. Registered users can also obtain discount coupons for Lattice King James Version New Testament, plus a Concordance. The GET MAXIMUM OUTPU Since you've put in a few hard earned paychecks into a Commo dore system, how can you be sure you'll ever get more than just a few video games out? Well, you could start by booting up GEOS 2.0. The hard working software WE PUT A LOT MORE IN, SO YOU COULD GET A LOT MORE OUT. GEOS 2.0 squeezes the absolute maximum out of Commodore 64's With geoPaint, you can mirror or rotate it. Then stretch and scale and save it in your GEOS 2.0 Photo Album for use later. You can mix text and graphics. Or trade them back and forth. GEOS 2.0 even comes with its board commands.All you need to remem Pretty simple, huh? includes geoWrite (an advanced, full-featured word-processor), and geoPaint, a graphic workshop draw almost anything. Invert, You see, with GEOS 2.0 you don't need to memorize complicated key your mouse or joystick. ing documents with outrageous graphics. That's because GEOS 2.0 with over 32 different tools and patterns. that's easy to use and easy on your wallet. ber is this: Point and click. GEOS 2.0 shows you options, and you point to your selection. Then all you do is click The important thing is that with GEOS 2.0, you can create outstand own deskTop, which lets you man and 128's with an array of applica tions you can use millions of ways. In fact, millions of people do. age your files and disks easily and efficiently. There's a calculator, note pad and alarm clock, too. And GEOS 2.0 is LaserWriter™ compa tible. Which means you get a better looking document and a harder work ing system that's easier to learn NEWS NEWS • NEWS ■ NEWS • NEWS ■ NEWS ■ NEWS * NEWS program lets users quickly find and display references with single and/or multiple-word searches. The text lists complete book, chapter and verse markings. Printer output is available for any verse(s). Bible Search supports the Commodore 128 in 80 columns, and support disks for the 1541,1671,1581 drives and the 1764/1750 RAM expansion units are available. The program is available at the introductoiy price of$25.00 from: SOGWAP Software, 115 Bellmont
M, Decatur, IN 46733. Phone: (219) 724-3900.
Ultima Trilogy
Oi
RIGIM has released a collectors edition of their popular Ultima series for the Commodore 64. The package contains Ultima 1, II and III at a special retail price of $59.95. For more information contact: ORIGIN, 136 Harvey Ed, Bldg. B, Londonderry, NH 03053. Or call: (603)644-3360. Interplay Exchange ^*:srf .Interplay Productions, best known for entertainment titles lite Newvmancer m&Battle Chess as well as IZ&Bard's Tale and Wasteland series, has announced a new policy to benefit customers who are changing hardware. Customers who purchase Interplay games will be able to exchange their software for a version that operates on their new system. "If one of our customers goes to the expense of buying a new computer, he shouldn't have to pay Ml price to replace compatible software," said Interplay president Brian Fargo. "With this policy, our customers can exchange an Interplay product at an affordable rate." To make the exchange, customers must send their original disks, a note indicating their address and which version they'd like along with$15 for the exchange and 53.50 (s/h) to: Interplay Exchange, P.O. Box 8123, San Francisco, CA 94128-9986.
Commodore Business Machines wishes to thank the dark County Commodore Computer Ctnb of Las Vegas, NV for their help in setting up the Commodore liooLh for recent computer shows at the Las Vegas Convention Center. Their loyalty and support are much appreciated.
FOR MINIMUM INPUT.
than those space alien games your cousin Phil keeps dragging home.
INCREASE YOUR OUTPUT WITH A TURBO. For flat out fast performance, GEOS 2.0 even comes with a diskTurbo, which cranks up your Commodore five to seven times its normal oper ating speed.
Now, if all
that weren't enough, it also converts other programs' text in a heartbeat.
And then checks your spelling with
geoSpell. And comes with a mail
merge for stamping out labels and form letters. And eleven built-in fonts. And a file manager.
The bottom line is that
GEOS 2.0 can do just
PC's can do, including
one thing they
can't: Share data with all our other GEOS 2.0 applications.
A HARD WORKING FAMILY. Now, if you like the idea of what
GEOS 2.0 can do by itself, just think what life would be like if you could
share text, graphics and information
amongst a whole family of applications.
Well, that's what you get with our entire GEOS line. There's a spread sheet, a database and a desktop publisher. Not to mention a chart
program, accessories and over 53 additional fonts.
So if you'd rather take more from your Commodore and less from your wallet, insist on GEOS 2.0. Fora
minimal investment, it'll do more
than just make your documents look a whole lot better. And that could pay out handsomely for you. IX1IS 64 2.0 ISMM GEDS 12H 2.(1 tliH-ii hi i Tilers imly. til 1BUIJ WI-UIMU«I. 2H (California r™Jmu add It
sales lav 1 li-UI I'&'SH. fjl tnfiii,-n shipping and tumllm*;. Allow six berks lor delivery.
(;f.<)s 2.0. GBO5 WAS, ibmCJ^. n^^jit ii». Rcnffe B.->i-ile
12", sinChm, jwui'uliliali, dnkiiiftai. Dt^U'nk/iKi^iiill'iiritl'Kh Plus
VQ Somti&tiiathKMty S-iftvnuk^- Cfjrunmildn' .iml l,wrWil|.| are ■ 'iftunpanm ullii'c 1I1.111 Linki-k^ S>Mwi>rk^
Berkeley
n Softworks
"Hie brightest minds are working with Berkeley.
GEOS 64 GEOS 128
Compiled by Louis F. Sander
This month's tips feature languages, especially those not nor mally run on the 64 and 128. As always, we toy not to ne
glect any interests, so we've included a few on the old slandbys BASIC and machine language.
There are also some good materials on the CP7M operating
system, which many of you 128 owners will appreciate, plus some goodies for joysticks and the PI us/4. Astute observers will note the absence of programs from this month's column. That's because we're clearing the decks for next month, when the winners of our Programming Contest will ap pear. You may remember that the contest asked for useful pro grams shorter than four blocks. The entries now lill a large file box, and over the next month they'll be scrutinized, evaluated and judged. If you have tips and'or tricks of your own to share with our thousands of readers, by all means send them in. May's column contained a Trick Writer's Guide; if you have it, use it. Even if you don't, just send your material to Louis F. Sander P.O. Box 101011 Pittsburgh, PA 15237 If we print your tip, you'll get a check for at least S10.
Longest Line of BASIC: In the old days, hackers would try to
type the best program with as little code as possible. When fool ing around with BASIC abbreviations, I came up with some thing that reminded me of those days. A line typed with the Commodore BASIC abbreviations can expand to two or more Lines when LISTfed and the abbreviations
are expanded. 1 think I've come up with the longest line of BA SIC that can be abbreviated in 80 characters. It doesn't do any thing; all it's good for is enlightenment and amusement. Here it is: 1 REM [76 SHFT XI When typing it, don't put any spaces after the line number or between the REM and the first shifted X. Shultz Wang Elmhurst, NY
A Feast of I^ansjuages: While most programming for our Com modores is done in the BASIC and machine languages that are
built into the computer, many other languages are available. When programming in these languages, you typically use the Commodore screen editor to prepare your program, giving it line 10
JULY 1989
numbers as in BASIC, but using the vocabulary and syntax of whatever language you're writing in. Your program is then pro
cessed by one or more other programs, either memory resident
or on disk, to produce code you can execute and save in the sec ond language. The program you type in is called the source code. The one prepared later is called the object code. Here's a list of the most popular alternate languages: Assembly language—This is a brother to machine language,
since the code they produce is exactly the same. With assembly language, however, the programmer has access to many pro gramming tools that machine language by itself lacks. All but
the very simplest "machine language" programming is really done in "assembly language" with an assembler program; some people use the two terms interchangeably. BASIC (compiled)—Commodore's built-in BASIC is a socalled "interpreted" language. That means that program state
ments are converted to machine language one by one each time the program is run. The various "compiled" BASICs have the fa miliar vocabulary and syntax, but after the program is written, it is subjected to further processing; it is compiled. This step con verts the BASIC into a quasi-machine-language program which is the program you actually run. When this compiled program is executed, the computer doesn't spend time converting each statement from BASIC. Compiled BASIC is faster than the in terpreted variety, but you cannot LIST the compiled program.
C—(That's not a misprint, it's the name of a language). The C language is much in vogue among professional programmers. It's a powerful language with the major advantage that its pro grams are transportable from one make of computer to another. C is somewhat difficult to learn, but many people think it's worth it. It's very big among Amiga programmers.
COBOL—The computer that printed your paycheck is prob ably programmed in COBOL, the business world's most popular language. COBOL is very effective at processing large numbers of repetitive business-type transactions; that's why it's so popu lar on mainframes.
COMAL—This interesting language has attracted Commo dore devotees all around the world. (A more complete descrip tion appears in "COMAL Explained," below.)
FORTRAN—Here's a cousin of BASIC, with a roughly simi lar syntax and vocabulary FORTRAN'S great power is its abili ty to handle complicated mathematical calculations. It's a favor ite language of scientists.
FORTH—Available in several versions, FORTH is a great
language for those who like the unusual. It's highly customiza ble, and you program in it by defining your own new commands.
Tips & Tricks LOGO—An easy-to-learn language that has been taught in
elementary schools. Its so-called "turtle graphics," in which lines
are drawn by a "turtle" crawling around the screen, are popular with young programmers.
Pascal—Many colleges require their students to program in Pascal, it's a highly structured language, requiring the pro
grammer to plan his program before he writes it. The rigid
structuring makes it easy for other people to look at a program and understand it. If you're a teacher, you like that feature. Modula-2—An improvement on Pascal. Easier. Lets you write your programs in modules, which are then linked together into a whole. Mike Rivers West Chester, PA
COMAL Explained: COMAL is an interesting programming language for the 64,128, Amiga and PET, as well as other com puters such as the Macintosh, IBM PC, IBM PS2 and CP/M
machines. It was developed in Denmark as a first language for
home programmers, but has evolved to the point where it's used by professionals in many countries.
The language is similar to Pascal, C and Modula-2. Programs written on one machine can be run on any other, so long as ma
chine-specific enhancements haven't been used. Commodore versions are available for as little as S9.95! The U.S. branch of the COMAL Users Group publishes an 80-
page newsletter (23 issues to date), and has do-/ens of COMALspecific books and disks at reasonable prices. For more information, send a self-addressed business-size en velope with two 25-cent stamps to: COMAL Users Group, U.S.A., Ltd. 5501 Groveland Teirace Madison, W] 53716
Louis F. Sander Pittsburgh, PA
Compiled COMAL: The latest 64 disk-loaded version of CO
MAL, called Power Driver, has a compiler option. If you use the compiler, you can pass around copies of your COMAL programs without requiring users to have COMAL, or even to know that you used COMAL to write the programs. Len Lindsay Madison, "VV7
location to get the required map. Perform your required oper ations, and before exiting your routine, restore the original val ue to location $0001. Jim Oldfield, Jr. Abacus Software Super Pascal File Safety: When you look at the directory of the Super Pascal disk, you'll notice that the names of source files have an "S" and a back-arrow as a prefix. This is not a require ment of the language, but it's a good convention to follow. In Pascal, you're required to supply a program name in the source code; the compiler uses it as the filename under which to save the object code. If you have unwisely used that name when saving your source code, the compiler will overwrite it. Jim D'Haem Kentwood, MI Learning Miichine Language: For most people, machine lan guage is harder to learn than BASIC, at least in the early stages. The problem isn't that machine language is so difficult, but that BASIC is so simple. After all, BASIC was created to make it easy to learn how to program. The first essential step in learning machine language is to master the binary and hexadecimal numbering systems. The next step is to learn the registers, addressing modes and instruction sets of the 6502 series of microprocessors. You can learn this from a book, but for most people it's easier to learn from a teacher. The electronics departments of community col leges and technical schools often run elementary courses in ma chine-language programming; computer science departments almost never do. If you can't find a 6502-oriented course, you might want to try one for another microprocessor. Since there's some similarity among all microprocessor families, and since the hardest part of machine-language programming is to learn to think like a mi crochip, much of your learning will be transferable to the 65XX world. Once you have that elementary knowledge of machine lan guage, the next step is to work with some actual programs. [ Editor's Notes: See "ML Programming," 128 Mode, p. 62.] Louis F. Sander Pittsburgh, PA Binary and Hexadecimal: Many beginners know that computr ers "think" in terms of ones and zeros, and that binary math is COMAL Turtle Graphics Tip: When doing turtle graphics, the drawing is much quicker if you turn off the turtle image with the HIDETURTLE command. Captain Cornal Copenhagen, Denmark therefore important to programmers. (Actually, computers think in terms of circuits being on or off; the ones and zeros are representations of those electrical states.) But what about hexadecimal? Who needs the additional con fusion? Actually, hex makes things simpler, not more confusing. The great benefit of hex is that it compresses a four-bit binary nu Super C Memory Access: If you use the Commodore 64 V2 ver sion of Super C to access memory which can be bank switched, (video chip, SID, eta), you should do this with a machine-lan guage routine. The Super C operating system has control of the memory map, and while it is in control of the machine, it will use memory in its own way. Your machine-language routine should first save the contents of location$0001 and then set this
meral into a hex number with a single digit. (Strictly speaking,
it's a hexit, not a digit.) Not only that, but any long binary numeral can be instantly converted to a hex numeral that's one-fourth as long. So hexade cimal is just an easy shortcut for dealing with binary. lb make the conversions, you must memorize the following table: Continued on page 48
COMMODORE MAGAZINE
11
L
O
U
N
D
saa^,-
v v
Compiled by Louis F. Sander
This month's nuggets are evenly divided between new games to the mine and Top 20 Favorites, with a salting or addition al tips. As always, many of our tips will work on any computer,
whether it's from Commodore, Apple, Atari or IBM; others apply to only one machine. Don't forget that many tips require skill as well as knowledge, and that since they apply to so many games and computers, we can't test every one.
Send your own Commodore game tips to: The Gold Mine P.O. Box 101011 Pittsburgh, PA 15237 Use a separate sheet of paper for each game, and combine all
tips for one game onto one sheet. If your tip is printed, you'll get worldwide fame, a feeling of pride, and a grubstake of at least five dollars. Gold Mine Rules! Aaargh! Tb beat the other monster in a fight for an egg, don't jump around and breathe fire. Just hold your ground and punch forward. After three or four falls, he will be defeated. Keep eating, even when your monster doesn't show any wear and tear. It won't show on the screen, but your health will go way up.
Bob LaCroix Warwick, RI Action Biker: After loading the game, enter POKE 15297,47 RUN
You will receive 191 motorcycles. Jason Dishop Huntsuilk, OH
Airborne Ranger: There are a few warning buzzers that the manual doesn't tell you about. In the Delayed Sabotage mission, a buzzer will sound if your bomb plant was discovered. There are two buzzers in the Create a Diversion mission: the first one tells
you to start fighting, and the second tells you that you have lost
12
JULY 1989
due to lack of combat for a certain period of time.
Charlie Summons
New Haven, CT
Auto Duel: If losing your prestige is no problem, you can get rich fast by getting a good payload and visiting Joe's Bar. When he gives you an offer and asks if you'll take it, hit F5 to check your payload. When you return to the regular screen, hit Y to sell the
payload. If all works well, you should get the money and still have the payload!
If you're on the road with an expensive cargo that you don't want to risk losing to a road gang, find one of the places where the road doesn't make a tight fit against an obstacle. (Example: the barriers allow room to squeeze through on either side ofjut ting out yards.) You may lose a few points through careless driv ing, but no enemy cars can reach you. Here's another way to get rich fast. Make a stripped-down ve
hicle with as much weight left as possible. When you've complet ed it, add a machine gun and leave town. When you run into an other vehicle, kill it then salvage. When you return to the car, fire at the dead car once again, you should be able to continue salvaging until you're out of room. If you're in a pinch for money, you can participate in two Ama teur Nights per week, except for weeks when a championship is being held. Amateur Nights are every Saturday, plus the nights so designated on the schedule. Contributor Unknown The Riinl's Tale 1: If you're puzzled about how to get into Man-
gar's Tbwer, think back to the Sewers. The stairway that goes from the bottom level to the outside puts you behind the locked gates and right next to Mangar's Ibwer. Charlie Sammons
New Haven, CT The Hard's Tale 1: If you're caught in a bind in the middle of the
night, go to the Adventurers' Guild and enter it. Once inside, leave immediately. You will find yourself outside at dawn! Always have two magic users in your party, so you can quick ly develop a multi-user. (I recommend using a Magician for
Gold Mine this.) Meanwhile, you can develop your Archmage with a little more protection. I've never had a chance to test it, but this is
probably a lot quicker than developing two Archmages at once.
If you're creating a new party ofyour own, make sure to use El
Cid from the A-Team, since he has the Firehorn already. This will be invaluable in developing your party. Blaine Campbell Spruce Grove, Alberta Canada
The Bard's Tale III: If you have a Warrior or Paladin, give him or her a Stoneblade for a weapon. Give your Thief a Heart-
seeker. Give your Mages Mangar's Staff. It halves the cost of spells.
In Malefia, never let large groups to ten-foot range, because they always kill everyone. The only exception is Cursed Nui sances.
Also in Malefia, go to where Tarjan is, cast DIVA once, and
NUKE. Kill everything until you get 100,000 experience points.
After he says "Now I will personally kill you," and you face one Tarjan, run away. Repeat this. Setk Carlson Silver Spring, MD
The Bard's Tale III: Tb get the Belt of Alliria, first find the blue, red, yellow and white rose. Also get a wineskin. Then go to the Violet Mountain and kill the Rainbow Dragon at 5S, 4E, LEV2. Get the Crystal Key and fill the wineskin with the dragon's blood. When the rainbow rose appears, get it.
Bureaucracy: The order in which you collect postage stickers will be important later. Prank knocking (or ringing old ladies can sometimes pay off. In the bank, EAST and WEST can be used to move between the windows. When dealing with the In tercom, remember that only direct quotations will work. If you've lost something, the Air Zalagasia desk is easy to
find. On the Aeroplane, you can type GO TO ROW then the row number, instead of typing S a lot of times. Notice how the con trols are hooked up to the wrong seats? This will help you get rid
of the Stew. You need the seat in front of the angry man. Read everything you find; a lot of the information will become useful. Some people don't read left to right or right to left. Whatever you do, don't Panic! It is illegal without prior ap
proval by applying in triplicate at your local llama salesman. Tod Courtney Centralia, IL
Captain Zapp: Tb fight the dragon in the jungle, run to him without stopping and shoot him every few steps. As long as you keep running at him, he will not fire back. Jeremy Petter Louisville, KY
Defender of the Crown: When swordfighting in a castle, always thrust and back off. Always keep your guard up. When choosing a territory for jousting, select one closest to your opponent, not necessarily the richest one. The chances are good that the computer will take it over on its next turn. Nick Wagner
Next go to 2N, 3E, LEV3 in Cyanis' lower. Kill Cyanis. When the triangle appears, get it. Then go to 9N, 6E in Ailiria's Tomb
and use the triangle. A door appears to the north, and through it are stairs which you should use.
Dcja Vu: To get rid of your gun, drop it in the water at the bot tom of the sewer. Siegel's corpse has the key to the Mercedes. The Sternwood Estate is at 626 Auburn Road. 1b read the timetable in Mrs. Vickers' drawer there, operate the pencil on it. The syringe is in a wastebasket on the fourth floor of Joe's
The Belt is 16N, 12E, LEV2. Use the red rose when the voice talks of kinship, the blue rose when it talks of valor, and the yel low when it talks of nature. Use the white rose with truth. Final ly, give the rainbow rose to the very last voice. Brian Spencer Warrensburg, MO
B.C. Quest for Tires: Tb get across the lava, jump about an inch in front of the pit. A bird will carry you across. Tb get across the
lake (after the lava pit), hold the fire button down to increase your speed, push up at the last second, and fly! Joe Page
Bar.
You need four pieces of evidence to prove your innocence: • Marsha Vickers1 diary
• Letter in Mr. Sternwood's desk • Timetable
• No gun (black) Patrick Donovan St. Foy, Quebec
Moville, LA Executive Leader Board: If you use a 61 on the seventh hole, Bubble Bobble: If you can get to boards 20,30 and 40 without losing a man, a door will appear on the screen. Enter it, and
you'll find a secret board filled with large diamonds. If you get a large bullet, kill every monster on the board ex
you will often get a hole-in-one. Scott Morrison St. Catherines, Ontario Canada
cept one, then blow some bubbles without popping them. Kill
the remaining monster and get the large diamond plus the bub bles that have turned into little diamonds.
On boards 7 and 22, wait ten seconds until the umbrella ap pears on the top. Take it to advance six boards. Ashok Relwani
Flushing, NY
Family Feud: When you get a question, you can safely buzz in
before you read it, since there isn't a time limit. With such a long time to think about your response, you're likely to come out OK. Chad Biggerstaff Camdenton, MO Continued on page 94
COMMODORE MAGAZINE
13
64 AND 128 SOFTWARE REVIEWS
Reviewed by John Pustai
Serve & Volley Computer: Commodore 64
Medium:
550 South Winchester Blvd. Suite 200 San Jose, CA 95128 Disk
Price:
$29.95 Tennis is a thinking game. Players must determine whether to smash, lob, top-spin or slice the ball, and where to place the shot. Moreover, tennis players must anticipate an opponent's return shot. Only when all of these mental decisions have been made does a player exert phys ical energy. Almost the Real Thing Serve & Volley demands all of the thinking of a real tennis game. The only thing missing in Serve & Volley is the physical exertion. Every mental decision required by a real tennis game is duplicat ed in this engrossing and realistic simula tion. Every type of competition, level of difficulty, playing-court surface, environ ment and player capability is possible with Sen* & Volley: Before we get to the most interesting as pects of the software, it is beneficial to give a brief overview of tennis itself. Scor ing for each point in any tennis game is as follows: 0 (called "love"), 15,30,40 and then "win." Players must "win" by two points. In other words, if the score is tied 40-40, one of the players must get two points in a row to win the game. If this doesn't occur on the next two points, the game is still tied ("deuce") until one play er gets two points in a row. Every type of competition, level of difficulty, playing-court surface, environment and player capability is possible with Serve & \fotley. ly win a game by two points, Serve & Vol ley limits the game to one opponent beat ing another by a 13-to-12-point margin. For any match play, there are different choices for the hardness of the playing surface. A "hard court" gives the ball a fast, high bounce. A "grass-court" yields a slow, long ball bounce. Finally, a "clay court" results in the ball having a longer bounce that is faster than "grass," but ings. A higher ranking on the list permits better positioning in future tournament play. Characteristics of new players can be tailored to match actual playing ability. These characteristics include speed, en durance, forehand and backhand strength, power and accuracy. Further more, these characteristics affect the actu al computer play during a match. Every with less mobility. There is even a choice of the type of court you wish to play in. "Center Court"—replete with spectators—is for time a player performs, the computer fac those of us who daydream of becoming the next Borg, Lendl or McEnroe. "Seaside" is the choice for a more relaxing visual feast, used when individuals want to play as one again with surrounding fans. "Country Club" offers a private, pool-side, practice- tors the new performance into his perma nent record. Characteristics are provided for the supplied list often players and are member of this list. Simulation Par Excellence The most exciting feature of this soft court environment ware is the method by which players can A player must win six games (and beat his opponent by two games) to win a set. Players Advance make all of the mental decisions of a real tennis game. A pop-up, window—called the "Control Box"—exists for each player. In the international tennis competitions seen on TV, winning a men's match occurs when one opponent wins three out of five sets. Winning a woman's match occurs to make the game appealing to neighbor when an opponent wins two out of three sets. Serve & Volley can be played with one opponent against a computer player or with two human players challenging each other. In these two play modes, there are a couple of ways to set up the games. First, simple match play is available. In this mode, the player determines whether to play one set or to play the best two out of three sets, or to play the best three out of five sets. Although a player must usual14 JULY 1989 A "Tournament" option is also available hood friends. In this option, up to eight players can be entered in an elimination tournament. From the initial eight play ers, four winners move on. Then two play ers move into the finals to determine the champion. Serve & Volley comes with a list often existing players, and two positions for the addition of new players. The existing list has a series of statistics—number of wins and losses, percentage of wins and per centage of first serves—that ranks the players. If a new player is added to the list, and the new player continues to win games, he is advanced on the list rank In fact, there is a control box for each play er—one on each side of the screen. This pop-up window does not detract from watching the players move on the field, but affords all of the decisions possible. The control box appears when a given player must make all of the decisions. In essence, this occurs as soon as the ball is hit by the opponent. All of the mental ac tion takes place with players using the control box to make quick decisions. Decisions are made during the initial serve and during each volley of the game. For an initial serve, the control box offers these choices: flat shot, slice (or side-spin) Continued on page 64 JjUPQ [11 JtU fcB^flWW WFI LHOlWK I»TN"31( i" tucj 'ji| in» 1|j Jij|»djjifj iW* 411» ^j^iqi|K)iloo 'iifri ^ iii'iri^aili 'triuj^ lirpfmifl v/t*\ s inpoirt mi/ i|jw noA 3,*( 01 n« '»> M - 81H liS3 11 I1; nv j" i ' i Hi - ,■ 111' . ' i! '■'-' 1V3INH39I ,™an5 nu- ™»h'i>*-wpH :™sii Wlttm im Wi in natiKiBBWmtwii »m «H»« 3iia]d«niNiNinnoi;B03i<Mniqn/niia3d33-)!mi«OJ51ulioi ifoi V3WX it *- Id NoHlio1 SQDHHn IMIniVd OSldMJK SiSooTs^Mi'So'-m) 9ls B»™«m>iw3 kch'Xb wm») oo m 9';n nn H AUdQlUd ^jJt "■irvip'V, 'riCi[ I'"' nJ ^a^iPif^ SuyWiL-. ^u'vrri/ii an {jnv fSV3 SQ1VXV3 BJL3/V9-1 1111 VQIHtf 1V3US mo J0| ||i;a JO :i]UM 1S3 ioon JL IM1/6 ^Bpinies 1S3 Wd9'H¥6 ^Bpuj Aepuo/j ISn .IISIA 3HO3 3SV31d t J uurt r III ,(hi^ Bv. jiiu» pafljpiji 101 V QJF) nui/ ttae •&&*) Ifl^O i"'1! ^OffM'Ji11; nil 'J 3t>j Q'3iiii« „, oaij indMsj '■i)()iv.||H.|/li/jJlu>im j.imiJ* JM 6695 E89 513 I EEfrS EB9 S13 1 2958 EB9 ? 13 I ui' Sliiji'iiI nftii.v iBi.if*d 'ahhj '=J3DJ(j '-JuflOli U3UV [^irtHOEP WVflE H '^WHWyi *WU0W '■» ■"LiJ ill q nu f) 1 II 1' IN 'awenlsui + ftudfliuj? ici^v + . *uj»j 34»^!"p'j>) ji-iji fjfi c; £ ( wjjiJili'. ';^n iiy ~* p? s ^iur^nq t ja r irkjj. w ^kehhpii i^Ufii 'pu^lc l.v pomoitl fjurfJili^'n i 1/ Q/A HinjjiiKlS t^"H JilJ^PlUJIJILI ?J G£L Milling ?a .HCIll-IT- p«jrj 'julinm/i ipi'A innif ihIq S^ C/ ,*W, HUH \mvat 6i iMmAi.uBnutujaMig Xua[»3V ^>*N3P|(3 ;; fi^ wig Mtupior si jiipwh |a paod QVQ» Hi Ji! 1BHK msevi uosSunn ntW !NlrtMTlH1!'H BJt Lujei SL UIJl| JH| rtyrtoia*j tiM| W 3£L I'llp^ i£F notions lESUiijaai uwnmnjf toiojiantiuDiBimajniKiJiMn l\ BUM 9JW3 IJH ■ lOllJ'UPl'l"l.f Ml (1 .iiftBsnir.vi'iw "'. 'tt.. 1 tl * 6( ,,,.;- "f #«»s iov?'»iii| ipju'sjiis |i<Pi|*15 ;; W ff dAits^'i j; ispi'PH jiilwu^u pootfl ii'iani l \ »0V3 wOmflotl «0*ii»1 61 >t<a*i i**»3iuoniafl',i-i'fl OC si P93ii»i«i,if;i 'm <wiUH»aani(iH™oiO uciiti^ uoijr.jjiup , .,, ,.,,,||,5 3i w fl^i f'nji'in; 1»*9 1(Uf|/13r115 ItT^^Pqj^; 6? -iM'.MI W""1 IIH^ .*u!ut.6nn 9^n i'1 tYnfifxiiy ilJ5Pi«Di»il»H?li«iri»io™j| iril Wiffiil Honi],ldu)M^!|asK|ICp; 69 SHOOS j Hi'tiMns l»H Ii M i'l 62 rt1J' hui'i^ (Hfii|l"H,1 IBIKMl^j jp nil ui) PLJP^ oljUjlIOri ItuAMB^ is*»v«i>n 6E k t,H fit 801 n c ffiii son ^p o i- P9snw BE ^; nliiinnir^uoiiiipji;! u^fl ill IJMUM F1*"! <■ WI'j[plrNH ^** 1 rtipfliuoa nc ova wmpnam se qz Awnm ||E3 a>«»5 fStwisng auil J3piO '"OH K Mij-tioi 0ES61 Vd oqisaHasffiaunQE 1 4*0 i']jvi>|.^,k|Li| i..*!!,.', •jsiui^ninuj 61 iuoo^*W ^ 1 s;i jJuD"5an smnn <;p gJ SOl iu^iujAiiviMiri l;<;ijii^i STWflDWT/EWnilLrl *NI* H'J'^rJ JUS ^ili "'rlM1^ ■I|O?II^ JiC <m% 19N0I1MIKH ^ i.i.i oun XVJ Ji'OH PJ ECt-5 EB9QL2 1 VS(1 Bpisinrj sun JOP'O "iDH-t2 /S/S-BE9 008 L «"j,'ti"S ibOddns onos ? sionnobd onos iSifi-BE9-00B I « pg^tj iiuflLMyiq 5C wotj oa« II IVN0SU3d 3A JJiono Bprfinuan pq.'jhii'd 11103^'"H fii lua'IS »IO,on 9S/631 *U8 ud nvMiua suaauo 33Ud-noi unoH n ss ^^ i/j. ^iii'Mf] BZIStH fa HhfSdfus ids GZ 5! Ml SOd'W'HOC flil^'n l^'AOd fi£ |i-jnci| b j'Ti] H Hf [fl Mil 'IMIPJ fif put RJL +l'fl]H'l|') && bji tamsAiiisni £? S? ||?3 Ml) mutt 1*"^ BJS pit m W^I'i'nt.iH t9^ *l(tB'lS J^HtM EUWmu I'MHr.l «P9 «B '"""fl I*"!) hihlUJirPT H^i iJli'W BSL't1! avmnr n irsi i*l»w 50(1 WWI 69 iiMiufln uMimIWI i>3V|iA;u| \"w loqwtl Bp n inillimi ■ 1 3|I|U| JIJJH ftOQ 'inii'J'j 1..1I11', aBMHUBKlOW*1?1*"^ 5DI qf BE sr SI S5W snti IVHWB .;, BVMQ jy SJaulUieifcld S0111 11 eh anomipj im. ( «PWH ita«J WIS r uti.'.(iiiiv *l(|PD15l'*'Sl'llflllI>30fl(0P S11B0S5MD9 8210/1-90 innj io | jai|iaBoi oGb^xiI uioisna e jnd sisjiEioads jno ibi spaau siEwpjBii eBiu V jnort lie jo) sn iiea "QNV IIE3 b sn aAifi sseaid '9iai| n aas i.uop ncM )> inq |i MI-i^-J/il SErVi fl1 0UJI| IE |l iM'.h|.H I-11 BJ9M , ULLM pOqjeUJ ■ J"'' l^i,| { mo paisi) 3ABi| 3M >93 pue 92 [0 'eBiiuv joo^ ioi snnpo flQOOl J3nO AJJEJ3M P(* 11 Xj ari SU'li'mn BE ii^y^w uopoBy uo<i3ipi wiia ■it Ep E 1 '""3 ""I'M OlSVfl l*riiomj»OM BI! HSn 6t fir* ii*jii ip I E|"[»rt iinunJiHS iqmuiii1(i i^iq n tf ^ i.iOhnqfln isajt ^Gjnos 3 MI/9 iiiiidujna iFuni'AJinj t 'l MIZV 1 ; i t'l'm* luamuliiiv iuij -f afipn'nii'l "Jifl :r E 1-3ISV935 snidiHl* uqij eQiuitf^ jniPi'nn^ tg OO^v mitw"! i»w 00019 Dlin0S l^ajjani ' 'h^iiia cqi ^'pniS 6uiD'03*H 'U'W 1 Kl . 66 pij o'l nspg anj[ Bi ■■ <j<i]ia|jpnO 1 lAfllMlOU 1 >r,j ladniaAaou ij A 3 BWlfli r,n^ SOd f ^M o j' >n 1 d r a ^r ■; 6il [,.,■ landujOT iaonij'#n n jaiji* cci 1NNDO1 SOCcb-iui, n ■3E1 !( j^l IIWOOurHS *q Jini.Ji (J9 sisnw iua(B||jmi vl 6EI at fflf : 1 ^ii'i^ drnidg Di9n*annos eK ,„ B,r; .i^.^.skhOOOI.'I'I'is cm WRIigi H uoiiiftnaiis,( Bp e^; sirli^su^i lljiiiqi »»ifllia*n in ujs-upj OltlAW *WB(iiHij B5I nILnKVJ V Iflf LiSnfl HJ^I1IKin-J p,)'] «IUUH0i»l™"l0 Bliun^ fit 3J*^il|1rt J*N ??1 HPQ qKI DOdiK "OUS^HWl M'U'ii't1! OOOi'^OO^W^il^ ^lyiui^ ?Hr 5?E nOII<!9 ">005>J BNi! WlI'lliB 508 nwoiVwooaiv^^^pyGi^^ ■)] nils «i=3 5( tuQOL 1 'Jill nvHG £Z l"Wfl "f"10D? I*1-'! 6iC 66 611^ WlllBfl i buiM iiumiuow i™BOS|Utl1S3i|J.lI<rl .,P1 3*'*! IffLUE 000^9 w*tO i'T lur i^i"3 VDftOlCrl uo^p^ III1! IMM lo^v) jn^'iiiN »,\ S9I 9fl Bfr 00? pdPSdiurnj |$fl|
6^9
lawAaiuPj) OOOU i»'n
Si?
jj*qqejftoiuPiJOOO;9iSAn
?f£
inqnufiaiui'ijQQfjv i"aii
qsa
BAUDiun,,^ E l"nihW
BH
mum iw i«d dH
mil
OOt pieaiuini | Sfll
Hi
DOS piroamnji Sfli
6SU
(it 3iPHPin?fl*nJS
aftmigi
li
lUlfrl IMl»l|i|
muds uiAon 1 15in mo 1 nun nmw
nujAiag uihfuwv wii <Mn
"^►n ijy cio unopm
P7
J^fll^lfWrt
(193onui
VI WUi] ii "I*!
.OiDe^nnj
69 S
Will luraopnifl
COi
pa aiu.p.i Jiniao 'illla^ HIAJQ3
601 69
wih«hO'a:iaih3ud
Jh'ii '"vi wrA
be
1*0 *«/
EE iiin
iri/i 1
[MH "I
ntaiwi 'i roils A(
.HUUW
6E
j^wi^oni^
ijf
(r'nj) H-ii] ■■. 11 uj 1 ■ j
651
»HW«'l
lillWM i*"H ■JAihrti 111 him
U'l'; TluKiH 1" 01" 1
it
iiPT -, uuDi-m ,OAi]ia|a(i joi^rft cii|^ tw>|fl un'iili'T
01
|Hit)fiH;>je«0iFH
iZ rsn^i 11111/ 7^"i."jpri|-su| |Un [ffLUWMftQU
1L
'if!'W 'Hl'JI ?sHl| tSuLl1^ 'pn.V ]
■' ■L V
" . L
^.ipn^jjiui^foi,! impIvV; i'uiiliv
11
I^tffj 'T-riPnfiiii11 auiLjsrfl rfmuv
I'i*
l"0 V 9ljWU| SQflliQ i'iH| l'ii'iL.v
i 1
HM"d mo t ap.sui snn ^"»u
ItSiO QUItS
6E
0661 a*W|!iaJu«|fa
qi 11?
^^uitufl •amifl1? fftiuv liMVi « fll sButyi iQOt
PMVC1I9
1NWNIV1HUN1
(ii ;)»e wrts
6J
Iwil*»o*i0i^sii;n,j
BE
(»ij||Q3l UtnlPliil1 Ulf rt
?S
buifl^i uojpafl '.''''.T
9E
p!
u3
|PT|dollu'nfl tttttti
qfi
V Jund r^ fin|,| BlIIIUMO
5/
001 l'l
6£l
iim'j u)f O0tf FJ()|1S
6/
u«H»n
DOQ.V ll'*fl
'uW^rt
} 5a6Fitlur! WW1
I/O S HxMNi) uopltmn ieiuiub
JE
HM ^Ji^d^lfl JllV'd(HII(]
BZ
miauiv innqi/1™
6Et
19 noil wnai
•'■'V] l'IDIJi/j, DDi' pi'Y
IZ
ri
ooeon I** ai
1
avivfi uuafiunn
K
SE
IKi6lN(| afflimfl
6J
6! EC
jBiuu 4ui|V>n 11 -. piVQ
BE 9E 02
emwSS!! OHO! *('(]
OOOC^Q'JV 'Dj Dico wajAiCiQ ■ ■' ''
£6
^iiuao
i»iiii£) 1»IUJ9
BilOS OOSJ IK*"! HO
666
n
WW\ ll> pinwq
PE
IE
II MtOfJIlulS
aiwJi;iW0J|'UiJMfl iJ5
&2 EC 1C
■ *1N.fWl|!*J|l«1
JROftKJ^PWWJIWfti
'l!Ui3au*EM *>I(*H»J| (u Jsiju.iaanluuS'P1"!) ,■ II
0 2* l"*d MI0IU
Pt
69 p<!
p7 ri
S5
bS
691
6EI Or
ll'i'Q PITH
lutoft moiuao ToiiiPig uJaJptfl
u*l|) 1J0IU30 ualwLifl i30|ijjg jafiiaons
6fi9
je 5E 5£
*Hfl»Ji(V WUMilHW
69E 601
ii'iidl'iii'l'lui1"! ..s ElltH
fS,f.
Urt ^E 009 pjeaflLiinji 5^1
6^?
WUUJHfiWldH
6il
■VHUd
n^3 6^9
US hFi
9U0U93
61/
4ruhnrfhAr%.I^PiiiiiAn
if i
6? 11
I[PQ
'^aj^i nv
cjgi I1E3
llBAQJ
>;)Jj6il g|iV piJPl<j AS03 sadAiiitf «HT3
; ""-""'
661
?ES IB]
DC
VSINV
™™!™'^^
|
64 AND 128 SOFTWARE REVIEWS"
Reviewed by John Pustai
Out Run Computer: Commodore M* Publisher: Sega of America Distributor Mindscape 3444 Dundee Road Northbrook, IL 60062 Medium: Disk
Price:
The object of the
game is to complete each stage of the
$34.95 race within a 75-second time limit. The world-famous scenic vistas that whizz by at blurring speeds make Out Run worth running out to buy. This high- performance, race-car adventure will take you along the beaches of southern France, the roads of the German Autobahn, the Swiss Alps, California's Death Valley and a typical French countryside. You'll move at speeds up to 295 kilometers per hour. Choosing Your Course Out Run is visually exciting and chal lenging—a result of the stellar, depth-offield graphics. The graphical technique of slower-moving horizons—6 la the Walt Disney cartoon techniques—gives a real istic sensation of true speed and move ment. The sensation of speed is accom plished by having objects at different dis tances move laterally at different rates. You'll save money, too. Out Run is based on one of the top coin-op games ever. In fact, Sega has sold over 18,000 Out Run arcade machines worldwide. This is an incredible feat, since most good coin-operated games average about 5000 machines sold. The reason you'll save money is that the Commodore 64 version is graphically true to the in-store video versions, so you'll spend more time at home. The challenge comes from completing your goal—getting through five levels of a particular driving course. It is a long-dis tance road race. There are five different courses from which to choose. In the open ing screens, you choose which course you wish to drive. To reach your goal, you'll travel over roads that are aptly named: "Cloudy Mountain," "Devil's Canyon," "Wheat Field," "Wilderness" and "Seaside Town." "Coconut Beach" will be your starting point. During your drive, cars are constantly entering the roadway. You must pass them without crashing into them or going off the side of the road. If you get to the checkered flag of Stage 1, you automati cally go right into Stage 2 without stop16 JULY 1989 ping. As you drive into each new stage, the number of cars increases, making the driving more challenging. Players must be much more careful about, their driving capabilities as they move into another stage. At the end of a race, a car moves along the course map to show how for you actu ally drove toward your chosen goal. Thu object of the game is to complete each stage of the race within a 75-second time limit. If you do meet this time criterion, you move on to the next stage. Time is carried over into the next driving level if it is not used up in the preceding level. An on-screen digital clock indicates how much time remains for a particular level. Your score is based on how well and how fast you drive. In fact, the faster you drive through the course, the more points you can accumulate. In essence, you have to go as fast and as carefully as you can. If you cross the finish line in the time allot ted, you'll get one million extra points for every second of time you didn't use. Speed is increased by moving the joy- Driver's Ed • Don't slam on the brakes to avoid trou ble. This will only bring the car to a dead stop, and you will lose time trying to re gain momentum. Try switching to the low gear to slow down. • Downshift to the low gear when maneu vering through a curve. • Shift into the high gear when racing down a straightaway. • Avoid hitting any vehicles on the road —collisions will only slow you down and eat up time. • If you're really getting into trouble, just press the spacebar to pause, take a breath, and then get back in the race. stick forward If you pull back on the joy stick you decelerate or brake the car to a slower speed. You are constantly moving the joystick for acceleration, deceleration, and direction. Shift from gear one to gear two by pushing the fire button. The best way to navigate curves in the roadway is to shift, to the lower gear. On the screen there is an indication of what gear you are in. The speed is indicated on screen in kilo meters per hour. If you travel too fast and hit trees or objects along the side of the road, the car flips over. Excellent graphics show the car flying on its side and the oc cupants being thrown from the car on the ground. Musical Interlude You'll be musically entertained—if you so choose at the beginning of the pro gram—by the "Magical Sound Shower" or "Splash Wave." In the opening screen be fore the race, there is a graphic of a radio, and the player gets to pick his choice from two types of music that will be played throughout the race. Music is chosen by moving the joystick side to side and press ing the fire button to make the choice. On-screen graphics also indicate the stage, a relative tachometer rate, the gear you are in, your speed and your total point score. If your score is high enough to rank within the seven existing highest scores, you will be able to enter your initials on the list. Out Hun will make you concentrate on the driving. You'll be so (ocussed on the screen, that all else will lx> forgotten. Isn't thai what computer fun is supposed to be? I think you'll agree, Out Run is worth add ing to your software collection. Q *AIso available for the Amiga. 64 AND 128 SOFTWARE REVIEWS Roadwars Computer: Commodore (vl Publisher: Arcadia/Electronic Ails 1820 Gateway Drive SanMateo, CASM404 Medium: Disk Price:$19.99
netics and artificial intelligence have al lowed for the development of roadways so complex that they strain our late '80's imaginations. Exemplifying this fact is our stop at Armageddon, a Federation es tablishment displaying one of the most so
phisticated travel networks ever devised. While the planet itself remains seared, scarred and uninhabitable since the Tar'Sian War of 2371, its many life-sup porting moons have recently been colo nized and linked together by a magnifi cent series of space pathways. These com puter-controlled wonderworks bridge the stellar abysses, providing easy access to all orbiting travelers. The design is an en gineering marvel, garnering praise and attention from all corners of the universe. But upon your arrival a serious problem has been discovered. For no clear reason, the computer employed to monitor the nu merous roadway safety mechanisms has
suddenly gone haywire, destroying rather than protecting any vehicle that attempts
to traverse its paths. Every level of trans portation is completely shut down, bring ing all of Armageddon to a dangerous
standstill. The powerless frightened citi zens send out a frantic call for a fastthinking, quick-shooting hero to save the
day. This is where you come in. Better fas-
Reviewed by Mark Cotone
For your mission, you've been granted the use of a Battlesphere—a joystick-controlled street-sweeper of dynamic proportions. ten your seat belts, the ride will be wild. Simply put, the object of Roadwars is to cruise the lunar causeways and clear them of any and all obstacles. For your
mission, you've been granted the use of a
Battlesphere—a joystick-controlled streetsweeper of dynamic proportions. In its at tack mode, it handles like a freewheeling, streamlined two-turret tank, capable of obliterating anything in its path with an endless supply of missiles. When the situ
ation calls for a defensive stance, a push of the fire button encases the Battlesphere in an armored shield, allowing it to plow through most obstacles with limited dam age. It's a potent machine indeed, but as you'll see, your frenzied computer foe is a formidable match. The action is viewed from a position be hind and slightly above your Battles phere. The road stretches out before you, arcing up to a vanishing point somewhere on a colorful moon hovering along the screen's upper edge. Since no one should be forced to patrol the Armageddon streets alone, this contest has been set up
as a two-player challenge, with your com panion's vehicle—identical to yours in de sign and function—fueled and positioned to your vehicle's right. If no human team mate is available for the drive, the Com modore will be glad to act as your loyal partner.
As you speed off on your journey, it
won't be long before you discover the bat tery of fiendish traps planned for your wel come. The most common is an ironic mis use of the "protective" barriers lining each side of the road. These high-tech guard rails were originally constructed to create a magnetic field that would help to keep vehicles on their course. But by over charging random sections of the paneled barrier, the rogue computer has trans formed this retaining wall into a killer, an electronic lethal weapon that continuous
ly launches violent sparks across the highway to destroy any unshielded vehi cle in its path.
Your job is to blast away every last one of these malfunctioning panels, making travel safe for all those who follow. Clear a defined course of all sparking sections, and you and your partner will be awarded instant access to another charged thor oughfare in an even more perilous lunar precinct
Dangerous panels differ from the unaf fected ones in color, so detection is easy enough. What becomes difficult is trying to maneuver your Battlesphere into a fir ing position while working to avoid the
additional hazards developed for your de struction. This on-road traffic includes an army of deadly small red balls that roll at you on a premeditated collision course, and stationary "Chevron" partitions, which have been placed perpendicular to the side rails to block entire lanes of traf fic. Hit either of these with your shield and you lose that defense. Make contact without the shield and your Battlesphere will be reduced to rubble. And as if that wasn't enough, in the star-speckled open space on either side of the road floats a fleet of killer satellites— the most feared of all enemies. They at tack one at a time, sailing in off the hori zon and honing in on your target vehicle before unleashing a powerful laser blast. They're quick to act, tough to hit and
deadly accurate. In the first few rounds, a satellite visit is a rarity. But as the mis sion pushes on, the skies will soon be lit tered with these metallic marauders,
helping to keep the trip interesting. Just to show you that they do have some sympathetic capacity, the game de
signers have painted a few bonus arrows on the pavement. Running them over will instantly increase your firepower, providContinued on page 87
COMMODORE MAGAZINE
17
64 AND 128 SOFTWARE REVIEWS"
Reviewed by Scott A. May
Street Sports
f.RIH
ok
I nil i:
1H!
f ! ftVtini.i ...
Football Computer: Commodore i'A Publisher
Medium:
Price:
Epyx
600 Galveston Drive Redwood City, CA 94063 Disk
$19.95 As a kid, one of my favorite sources of bumps and bruises came from a good game of backyard football. Each of us would pretend to be our favorite footbaJl heroes—Bart Starr, Jim Brown, Johnny Unitas. An imaginary line between two trees served as the end zone. There were no yard marks and no first downs. Either you scored or you punted. Epyx recaptures these rough and tum ble glory years in Street Sports Football, a masterful tribute to youth and vigor. The Sporting several truly innovative play features, this game holds its own among the top contenders in the league. game maintains an exciting contempo rary feel, while stirring nostalgic memo ries in those of us who admit to being thir ty-something. The game was designed by Ogdon Microdesigns and programmed by Stephen M. Thomas of K-Byte. This same team brought us Street Sports Soccer, without a doubt the least successful effort in the Epyx series. But don't hold it against them—this time they got it right. I must admit football is my favorite computer diversion. So when Epyx first announced their "Street Sports" line a few years ago, I eagerly anticipated this edi tion. It took some time, but was worth the wait. Sporting several truly innovative play features, this game holds its own among the top contenders in the league. The initial setup differs little from the three previous "Street Sports" titles. Games can be played against a computer opponent or head-to-head with a friend. Next, choose from two field locations: an urban side street or a vacant construction site. Both areas offer suitable room to play, each with its own type of field haz ards (discarded bottles, cans, boxes, etc.). Players then pick team members— three per side—from a lineup of nine neighborhood kids. Select your teams from one of the pre-saved sets on the pro gram disk. Or let the computer create a randomly selected team for you. Serious managers will want to handpick their players, name the teams and save this combination to disk for future play. With a 18 JULY 1989 few exceptions, your team's eligible draft ees are the same kids from the first three games in the series. Those who excelled in baseball or basketball, however, are not necessarily adept at pixel pigskin. Players assign one kid as quarterback and two as receivers. 'ITiis selection is crucial to the outcome of the game. Use it to adjust skill levels and player handicaps. Before play begins, game rules and pa rameters must be set. First decide how many passes must be completed for a first down (there are no yard lines). Should the offense get a first down for crossing the midfield marker? How many first downs can a team have without scoring before losing possession of the ball? Finally, de grams are supplied with the instruction manual. Wait a minute—design their own? Yes, included with the game is a special Playmaker option for creating custom-de signed play patterns. Edit an existing pat tern or start from scratch. Using on-field graphics, players can create a unique of fensive formation, then assign individual running and pass patterns to each team member. On the Playmaker screen, each player's path is represented by a different type of line (dotted, thick or thin). Patterns are drawn in the same manner as computer art programs, stretching lines in the de sired direction. Each pattern can contain termine how long the defense must count ("One Mississippi... Two Mississippi...") up to five "nodes"—changes in direction. before rushing the quarterback. The pre- At the end of the pattern, players can be told to Stop, Continue in that direction, or game screen also allows each team to choose a playbook. This feature alone ele attempt to Get Open. Although there are only three players per team, the Play- vates Street Sports Football far above the average action-oriented computer football game. Playbooks consist of individual playsets, each containing up to eight de tailed pass patterns. Playbooks are loaded into memory and available to each team throughout the game. The program disk comes with its own playbook of four playsets, for a total of 24 unique patterns. The offense makes its se lection before the start of each play from a menu at the bottom of the screen. Both teams may use the built-in playbook or design their own. Two sets of play dia maker feature suggests unlimited poten tial. Players can double-up, criss-cross, re verse, zig-zag, loop and hook. If you can imagine it, you can put it into play. A spe cial option allows you to test a pattern be fore giving it your final stamp of approval. A blank disk is required for saving per sonalized plays. The mechanics of game play are pretty straightforward. On defense, press the joy stick button to switch control from one player to the next. The player under your control is highlighted. Before the ball is Continued on page .16 64 AND 128 SOFTWARE REVIEWS' Alfs First Adventure Computer: Commodore f>4 Developer Alien Productions Publisher: Box Office Software, Inc. 336 Robert Street, Suite 1202 St. Paul, MN 55101 Medium: Disk Price:$15.00 Eating pizza-fuel, beating the clock, es caping dual capture and collecting
treasures are activities that require focussed concentration and playing dexter ity. The challenge of these activities is in creased with a four-screen maze and puz zle-piece treasures that change at each of four playing levels. As a result, there are hours of fun playing with Alfs First Ad venture.
Alf—short for "Alien Life Form"—is a proboscis-prominent, cuddly, 230-year-old, furry creature, with impeccable English, who has arrived from another planet. As the story goes, Alf was born on the planet Melmac (anyone remember those plastic
dishes of yesteryear?). After rocketing through space, Alf crashes his spaceship
through the earthly roof of the Tanner family garage. Unless you are also from another planet, you'll recognize that this
software package was derived from the very popular television show with the same name.
Cats and Rockets
Alfs unusual personality is captured in this complex, interesting and challenging game. Alf loves pizza and cats and also wants to return home. Your job is to get Alf home. Accomplishing this task is made easy with detailed, clear, on-screen instructions that eliminate the need for a user's manual.
Reviewed by John Pustai
Your job is to get Alf home.
This is made easy with detailed, clear, on-screen instructions that eliminate the need for a user's manual.
spaceship, he must collect all the parts and return them to the garage. All the action takes place in four game
levels called "neighborhoods." These neighborhoods are really increasingly dif ficult, multi-screen mazes through which Alf must navigate. There are four cats,
Each neighborhood brings faster move ment of the cats, Willie and the dog catch
er. Willie and the dog catcher become smaller and more difficult to evade with each higher level. Therefore, Alf will have
to become smarter at each level.
No Time to Waste
The challenge results from the complex
two spaceship parts and one key to collect in each neighborhood. Alf must complete al! four levels before the clock reaches 24 hours. Getting to the goal is a logical sequence
But Alf must also chase four cats, eat piz za and watch the clock tick closer to the 24-hour time limit. At the same time, Alf
of events, which goes as follows. Before Alf can assemble the spaceship, ho must col lect all spaceship parts and return them to the garage. But even before that, Alf must return Willie Tanner's (that's Alfs earthly
must return safely to the garage with each collected item. Returning to the garage area uses up
time. There is special difficulty if Willie or the dog catcher are around the garage. In
host) cats to the garage. Time becomes im
this situation, Alf can only wait for Willie or the dog catcher to move to another posi tion. Garbage cans slow up Alfs return to the garage. If Alf runs into garbage cans, he will be stunned and not move fast on
portant, because Alf cannot carry two col lected items at once. Therefore, constant time-consuming forays into the neighbor hood maze are needed. Collections—of cats, spaceship parts and keys—made during these forays are indicated by an on-screen statement. Each collected item must be returned to the garage, which is in a different location for each level. Once the object is dropped in the garage, it will show up in the inven tory in the garage area. Once the four mobile cats are returned to the Tanner garage, then the four sta tionary spaceship parts appear at different
locations in the neighborhood. Once all four boxes of spaceship parts are returned to the garage, the key will appear. The key is needed to unlock the passage to the next level. In order to capture each cat, Alf must be well fortified with pizza—Alfs fuel. Alfs pizza level constantly diminishes—as
shown graphically with a pizza that re duces by one-eighth of a pie every few sec
onds. When the "pizza-meter" disappears,
Before Alf can assemble the
lives are left at a particular level.
Alf has to find and eat another pizza.
Then he can continue the cat-capture ac tivity. While the action moves from one screen to the next, Alf is being chased by Willie Tanner and the dog catcher. If caught by Willie, Alf forfeits everything gathered from that neighborhood level and must
action. Alf is chased by two characters.
the- screen, making it easy to be caught. Because of the multiple screens, the
need for a pizza may force Alf closer to Willie or the dog catcher, or away from the cats, spaceship parts or key. This activity also results in a loss of time.
Several special functions have been added to the game. To quit, a player can simply press "Q." This action results in presentation of the Melmac Skleen Club
listing of high-scoring players. This list
shows player name, level and time for the top ten players. The list allows players to
get an idea of their ability. In addition the F3 key turns the music on or off, the Fl key turns the sound on or off, and the F5 key pauses the game. Success and failure are both abetted by clever cartoon quips. Between each neigh borhood level, there is a humorous cartoon of Alf making some witty remark based on the level that is being entered. If you lose, Alf is equally "quip-tic." At one point, for example, Alf comments, "You're
doing great for someone without fur."
A-L-F Spells F-U-N The attraction of A//is a combination of
start over at that level. If caught by the
activities usually obtained only by owning many different software games. The graphics are excellent: the colors are bold,
dog catcher, Alf loses one of his three lives.
attractive, and eye appealing. The maze is
If Alf is caught by the dog catcher three
challenging. Each level brings more chal lenges—spell that, F-U-N. The fun is for kids of all ages. Q
times at any level, the game is over. There is an on-screen indication of how many Alf
COMMODORE MAGAZINE
19
&4 AND 128 SOFTWARE REVIEWS
Reviewed by RussCeccola
Wizardry I:
Proving Grounds of the Mad Overlord Computer: Commodore 64 Publisher:
Medium:
Price:
Sir-Tech Software, Inc. P.O. Box 245 Ogdensburg, NY 136(59 Disk
S39.95
It took a long time to finally get this re view written, as the editors of this fine
Your goal is to put together a party of characters and guide the party in the exploration of the maze in hopes of finding Werdna and the amulet.
publication can confirm. It wasn't that I
had writer's block or anything—it's just that I wanted to finish Wizardry I: Prov ing Grounds of the Mad Overlord before I wrote the review. I did finish the game
and compiled a list of general hints that will help you in playing the game with the minimum of frustration (see box on page 21). Proving Grounds is a very addictive fantasy role-playing game, and I simply wanted to play more of it rather than sit down at my Commodore 128 and write (we all know computers were designed for playing games). But now ifs time to muddle through
let that contained powers spoken of in fa bles. One day, a great fear came over him
and all of his subjects. After it passed, the amulet was gone. Werdna had captured the precious item and used its powers to carve out a ten-level maze in the ground next to Trebor's castle. Paranoid that Werdna would attack again, Trebor decid ed to assemble an elite guard of the best characters of each class in the kingdom. The maze that Werdna created would be
the "proving grounds" in which the guard
tive because it is chock full of all kinds of
would be tested. At the same time, Trebor hoped that by putting together a powerful guard, they would venture deeper and
surprises wherever you go in the game. First off, let me tell you that if you want fancy pictures or puzzles, you better go buy another universe-on-a-disk. Proving
Werdna and recaptured the amulet. That is your goal in Proving Grounds—to put together a party of characters and to
this review. Proving Grounds is so addic
Grounds is a maze game and nothing more. You create characters and place them inside a ten-level dungeon/maze in which you'll find all sorts of traps, tricks, nasties, treasure, teleporters and passage ways. But before I give you the specifics of game play, let's talk about your goal. Proving Grounds is the first scenario of the Wizardry series of role-playing maze games and the scenario in which you must bring a set of six characters (any
fewer would be futile) up to ability levels high enough to compete in the other sce narios. Wizardry games have been avail able for other computers for many years and have become "classics" in both com puter game and role-playing adventure game circles. Finally, after all those years, the classic has been translated to the
Commodore 64. This first instalment in the Wizardry chronicles involves the Mad Overlord Trebor and the Evil Wizard Werdna. It seems that Trebor had discovered a special amu20
JULY 1989
deeper into the maze until they found
guide the party in the exploration of the maze in hopes of finding Werdna and the amulet Sounds neat, huh? I found it to be. I've played other maze games before, but none as packed with variety and a strong sense
of exploration as Proving Grounds. What's
more attractive about the game is that its
and are removed from the screen in as short a time as possible without losing their effectiveness. Wizardry allows the user to adjust how long the windows should remain on the screen. In addition, you can interrupt the normal time delay by hitting the RUN/STOP key or turn all pauses on or off with the Fl key. There are some other features included in Proving Grounds that may or may not be useful to a player. In particular, you can switch off the sounds with the F3 key and make all of the keys auto-repeating
(if you hold them down) with the F5 key. The latter was very useful. Because the only sound you hear in Wizardry are your footsteps in the maze, I found the former
option rather useless. Proving Grounds is the type of game that allows me to catch up on my music listening while I play be cause I don't need to hear any sounds to play the game. The program autoboots on the Commo dore 128, supports the 128's additional
memory or a 1764 RAM Expander and uses a disk drive speed-up system that
interface is so easy to use. The Wizardry gaming system consists of multi-layered
can be toggled with the F8 key if it doesn't work on your computer. These are all pluses for the game system—they are ex
menus in which the options are chosen by
pressing single keys. The entire game is played with the keyboard in this way. Usually, an option is selected by pressing the first letter of the name of the option,
So far, I've avoided talking about the game play of Proving Grounds. That's be cause it is very easy to play the game, and there isn't much to it except for explora
set apart from the rest of the letters by
parenthesis. This makes it very easy to
tell which keys can be pressed at any giv en time. Wizardry makes the most of the Com modore 64's windowing capabilities. All options and messages in Wizardry appear in windows. Because there are so many windows, some need to be read only once
and combat. Most of your time will be spent mapping and fighting. But that's okay, because you never know what is just around the corner in Proving Grounds.
You create a party of up to six charac ters to explore the maze. The manual of fers a lot of hints in this area. There are
six character statistics (Strength, IQ, Pi-
64 and 128 Software Reviews/Wizardry r ety, Vitality, Agility and Luck) that deter
mine the character's class, five races (Hu mans, Elves, Dwarves, Gnomes and Hobbits), three alignments (Good, Neutral and Evil! and six classes (Fighter, Mage, Thief, Priest, Bishop, Samurai, Lord and Ninja). The first four are the basic classes; the others are advanced. There are two main places in Proving Grounds—the Castle and the Maze. In the
Castle, you can find Gilgamesh's Tavern, Boltac's Trading Post, The Temple of Cant and The Adventurer's Inn. At the edge of town, you can find the Training Grounds,
the Maze and the Utilities. The game re quires that you create your party of char acters in the Training Grounds. After do ing this, you outfit them with weapons, ar mor and other items at Boltac's. You as semble and inspect them at Gilgamesh's. You resurrect dead characters in the Tem ple of Cant, give rest to them in the Inn,
and change names and do other things with the characters in the Utilities menu. Everything else takes place in the Maze. A typical sitting of Proving Grounds in volves sending your party into the maze, mapping and exploring as much of the maze as you desire, fighting monsters to collect gold and experience points and re
turning to the Castle to check if your characters have increased experience lev
els, rest them and buy any new items that you can afford. The only graphics that you see are a first-person view in the maze. It is not a solid view. The graphics are made
up of simple lines. Monsters are drawn on the screen in color as you encounter them.
Prouing Grounds is that you can define these keys if you're not happy with the ones that the games uses for a default set ting. Magic is an important part of the game. In fact, you won't get very far without it.
Your mages and priests can cast spells when in camp or in combat. These charac ters are assigned a number of spell points for each spell level (there are seven levels for both mages and priests) in which they
have at least one spell written into their spell book. Each time a spell is used in a spell level, one of that level's spell points is removed. You get more spell points per
spell, you just type in its name where it is required. Even the spell names were well thoughtrout. A more powerful spell of the
same effect uses the weaker spell's name as the base word for the powerful spell's name.
With all this talk about the game's good points, there must be some flaws in Prov ing Grounds. There are two things that
Proving Yourself Hints for Successful Maze Maneuvering
• Think carefully about the alignment of your party before you generate charac ters. Characters with good alignments can't be in the same party with evil char acters. If you choose a good alignment, you can't have thieves or ninjas. A neutral
Although simple, the graphics are effec
alignment restricts priests, bishops, lords
tive. The combat system is very easy to use. You select actions for each character in
samurai :ind lords. You can mix good and
each round of combat, and the computer displays a message describing the result of each character's attempts. You encoun ter monsters frequently, but not so often that combat takes up much of your time, Most of your efforts will be spent figur
ing out the layout of the maze. A pad of Map Plotting Aid paper has been included in the package—a most welcome addition. No maze level is bigger than the 20 x 20
grid on the paper, so all you have to do is fill in the grid. Choose a legend for doors, pits, transporters, ete. If you're really
stuck, the mages can cast a spell that will tell you the exact coordinates of the maze that your party occupies. Moving around the maze is accom plished by pressing one key to move for ward, one key to turn left, one to turn
right and one to turn around. A plus for
and ninjas; an evil alignment restricts neutral and evil and neutral. • Be careful about changing class halfway
through the game, because your statistics drop to a minimum, experience points to zero, and you lose the use of some items. However, if you know some spells in a cer tain level, you will eventually learn and be able to use all of the spells in that level.
• Here is the best party to have (in the standing order you should place them in the maze): Dwarf fighter, Human fighter,
Gnome priest, Hobbit thief and two Elf mages.
• Remember to equip your weapon, ar mor, shield or any other items you need for protection before combat or entering the maze. • Have a mage cast a DUMAPIC spell (reveal location in Maze) in camp if you are lost in the Maze. • Plan out your initial purchases from
really bothered me. First of all, the game is incredibly slow and it accesses the disk drive too much. Even with my Commo dore 128, tlie delays are great. Perhaps a 1764 RAM Expansion increases speed,
but I really doubt it. Most of the delay conies from disk access and updates of the
character data. Also, you can't save your
game in Proving Grounds. Exploration would have been much less tedious if this option were included. The most you can do
is resume where you left off, but you can't save your place and return to it when you
get lost or die.
Still, Proving Grounds and the Wizard ry system offers many hours of enjoyment in the quest to capture the amulet from Werdna. There are all kinds of creatures in the Maze and many neat level layouts and blind alleys to keep you occupied. My only problem now is that I have to start reviewing Wizardry I: Knight of Dia
monds for a future issue of Commodore Magazine. I hope I don't get stuck, or an other review might not get written for a while. Sleepless nights, here I come!
Q
Boltac to maximize the use of your gold pieces. Buy things for your mages and thief first, because they need the least equipment. • Get back to the Castle as quickly as pos sible if one of the characters is poisoned, unless you have a high-level priest with spells to cure the poison. Otherwise, the character will die quickly.
• Use the Make Camp option to pause the game.
• When you first start out, don't take too many chances because it's too easy to get killed or lost. Make frequent trips back to
the Castle to rejuvenate your characters and see if they've advanced in experience levels. • If you haven't lost any hit points in the Maze, sleep in the stables at the Inn to see
if you've advanced an experience levei. • In the very dark areas of the maze, you can't see in any direction. Be careful not to get lost.
• Check the walls to make sure that they are solid, but be careful you don't go through a one-way door and can't get back to where you were.
• As soon as your priest or bishop has the LOMILWA spell (illuminates more of the Maze and all secret doors for the duration
of the expedition) or the LATUMAPIC spell (reveals the true names of all mon
sters for the duration of the expedition), cast them as soon as you enter the Maze.
COMMODORE MAGAZINE
21
64 AND 128 SOFTWARE REVIEWS
Reviewed by John Ryan
Annals of Rome Computer: Commodore (>4 Publisher: Datasoft/PSS Distributor: Electronic Arts
1820 Gateway Avenue Medium: Price:
San Mateo, CA &44O4 Disk $24.95 Time acts as history's veil. Things that are clear enough today, may seem od dly muddled or unimportant tomorrow. We tend to judge or test information against how current it is. Realistically, we should lend history the same ear we do the six o'clock news. However, we often see history taken for granted, or worse, shrugged off as a ritual to be endured throughout high school. Let's look at Annals of Rome, a new strategy war game for the Commodore 64. Although it deals with history some 2000 years old, military historians still study the period, if only because of the lessons it taught mankind—lessons that were brief ly forgotten for the duration of two world wars this century. While Annals of Rome is an exercise in military strategy, it does not try to trivialisse the other aspects of the empire that made ancient Rome the world city that is was. It concentrates on effective use of military power and command, while or chestrating all the other side effects of a maturing republic in the background. The simulation roughly spans the pe riod of history from 750 B.C. to the fall of Constantinople in 1433 A.D. (though only a select few of you will ever make it that far). Time is measured in uneven turns, where each turn may represent a chunk of time between one and 25 years, with eight turns per century. The game is further di vided into seven phases. Your window into history is comprised of a regional map, framed by tables and information critical to game play. This map is divided into 28 different regions, each with a code or number that identifies its owner. At the beginning of the game, you won't have to worry about this much, since you'll only own Italy (Italia). As the game progresses, however, the regional maps will change code references many times over as the struggle for land marches forward. The goal here, of course, 22 JULY 1989 is to expand Rome's borders and avoid be ing sacked. The further you can move Italy's frontier lands, the greater success you'll have in controlling the constant on slaught by barbarian hordes. Before wars can be waged, however, you must have money to wage them. This is where the economic phases comes in. You may fill the imperial coffers by either con quering new lands land holding on to them, of course) or by raising taxes. Be warned, taxing Rome's citizens, is likely to have an adverse affect on the current rul er's reign, for the current tax rate may in fluence local inflation, increase jxiverty (thereby increasing mortality rates) and cause an emperor to lose popularity. As you may know, an unpopular ruler's death grip on the throne wasn't worth a plugged drachma back in those days. In Annals of Rome you should not con cern yourself too much with who is the dictatorial head of Rome, since this will constantly change. In this game you are more of a conductor of events than an ex plicit ruler. Conversely, civil wars tend ta divert attention away from more critical problems at hand (such as Gaul inva sions). So raise taxes if you must, but pre pare yourself for the inevitable conse quences. The next two phases deal with person nel display and assignment. There are 21 officers on hand, all of whom have varying degrees of expertise as field commanders and loyalty toward the current ruler. Also displayed arc each officer's age, rank, locu tion and identifier code. At first you'll have to assign an officer to command the legions of Rome itself. As the game pro gresses, you'll be able to assign command ers, legates or tribunes to outlying areas to command the Roman campaign armies and garrisons. A smart ruler will base a loyal commander in Rome to temper un rest during lean times. Unloyal com manders often stir the winds of rebellion and are best used for suicide attacks in the frontiers. During the personnel assignment phase, a roster of Rome's officers will show the location and status of each. Since this is a game based on the movement of time, you'll see many names come and go. Some may retire, others may die in battle or from natural causes. You can assign a new officer to a region by entering a region's identifying code, then pressing the code of the officer to be assigned. When assigning personnel to a region mired in war and confusion, it's best to send a commander with high military ability. This ability is used in the formula to determine the out come of a particular battle. On the other hand, sending an unloyal officer to a re gion you are about to lose is a good way to dispose of your enemies—a common method used by many Roman emperors. An emperor's popularity is based on several factors: losing regions, an emper or's age and the tax rate, all have a vari able effect on how the people of Rome view the regime. If a ruler's popularity level drops too low (on a scale of-5 to +5), a coup may be inevitable. Unloyal com manders attemping rebellion will be high lighted on your roster, though the actions you ran take as ruler are fairly limited. You can try to bribe the troops in the hopes of maintaining loyalty, or appoint a new commander to Rome, this with the view that the commander will be popular enough to prevent rebellion. If these tac tics do not work, Rome will be plunged into civil war. Civil war involves a nasty chain of events that diverts resources and man power away from the goal of maintaining Rome's borders. If the rebels win the bat tle over loyalist, the current leader will simply switch his loyalty to the new rebel leader! A prolonged civil war, however, may very well bring Rome to the brink of disaster, so settle all internal struggles as swiftly and painlessly as possible. The foreign wars phase is really the heart of Annals of Rome. It is during this Continued On pa/jr 75 64 AND 128 SOFTWARE REVIEWS Reviewed by John Pustai Win, Lose or Draw Computer: Commodore 64 Publisher: Hi Tech Expressions 584 Broadway New York, NY 10012 Medium: Disk Price:$12.95 Parties will come alive with Win, Lose or Draw. Players will have as muck fun as they do on this program's television namesake. Although this game was de signed for single-player use, its potential for team and multi-user play could make
Win, Lose or Draw the surprise hit of 1989.
If you haven't seen the TV version, here is the game strategy: There are two teams of three players each. A player tries to get his teammates to guess a secret saying,
phrase or word by drawing pictures on a large pad of paper. Money is awarded to the team for each correct identification.
There is also a "Speed Word Round" made up of a series of single words for teams to accumulate more money. The team with the most money at the end of the game wins.
Clever Simulation The software version is self-contained.
Individuals can play against the comput er, or two players can play against each other. The second side of the game disk contains the secret words, phrases and sayings and the related drawings. On
screen graphics simulate two teams with three members each. Like its TV counterpart, the object of the software version is to guess the sen tence, phrase or word being drawn to accu mulate the most money. Each team gets three picture puzzles for the regular round of play, and then they play a speed round with easier puzzles for more money. In all cases, the computer draws the pic tures much like a human would draw a
freehand picture. Time ticks away while the picture is being drawn, just like on the TV show. When the picture is finished, a
Returning Champs
Each time the disk is booted, players are asked if they are a returning champi on. If you are a returning champion, the list will indicate the number of times you
by how fast players guess the answer.
More money is won if the player identifies
the answer in less time. Therefore, it be hooves players to type fast, with as many single words as they can think of to try to guess what is being drawn. If the first contestant doesn't get the an
Like its TV counterpart, the object of the software game is to guess the sentence, phrase or word being drawn to accumulate the most money. have played and the total amount of mon ey you have won to date.
Opening graphics display a living room setting like the TV game show, with the contestants sitting on a couch and an em cee standing next to a blank drawing board. The team that is playing sits in
swer within 60 seconds, the second player has an additional 20 seconds—just like on the TV show—to make only one guess at
the correct answer. If the correct answer is not given within 20 seconds, neither team wins any money.
Speed Word The Speed Word Round is very exciting. As soon as you guess the correct speed word—even before the drawing is com
pleted—a new drawing is started. This round lasts for 90 seconds, and the player
wins money depending on how many words are guessed correctly.
Like Horseshoes, Almost
There are some cases where the com
front of the screen on the floor. The other
puter will accept an answer that is close to
team sits on the couch, hi the lower right
the exact answer. There are also cases
and left of the screen are the scores indi cating how much money each team has
where the computer will not accept an an swer unless it is exact. Here are some ex amples of answers that were not exact, and which were accepted or rejected:
won.
Players can choose to play as a male or female contestant. When the log-on infor mation has been entered, players are prompted to turn the disk over to the question side. Next, players activate the drawing.
Nuts and Bolts At any time during the drawing of the picture, the player whose turn it is can guess the answer. Answers are typed on the keyboard. If the answer is incorrect, nothing will happen, and the picture will continue to be drawn.
There is one major hint to playing the game. Players should type answers as fast as possible, as soon as they have any idea what is being drawn. For example, a puz zle solution might be "Nuts and Bolts." The computer will draw some peanuts first. If a player enters "Nuts" into the keyboard, and it is a correct portion of the answer, the word nuts will appear on the drawing area of the screen. Players will
then know that the word nuts is in the complete answer.
When the complete phrase is entered
correctly, the player is credited with the money. Money amounts are determined
Correct answer: "The moon is green cheese."
Answer accepted: 'The moon is not made of green cheese." Correct answer: 'The light at the end of the tunnel." Answer rejected: "See the light at the end of the tunnel."
Correct answer: "Blood, Sweat, and Tears" Answer accepted: "Blood sweat and tears" (without commas) Correct answer: "Jumping the gun" Answer accepted: "Jump the gun"
Correct answer: "Have the world by a string" Answer rejected: "Got the world on a string"
Party Time I tested the software at adult parties
and found that even without a largescreen TV, you can still duplicate all of the Continued on page 39 COMMODORE MAGAZINE
23
64 AND 128 SOFTWARE REVIEWS
Reviewed by Scott A. May
The Write Stuff
areas allow up to ten documents in
128
memory at once
Computer: Commodore 128* Publisher: Busy Bee Software
:
P.O. Box 2959
Lompoc, CA 915438 Medium:
Price:
Disk
$29.95 (Quick Brown Box version is also available) Visualize your favorite, most feature- laden word processor for the Commo dore 128. Now multiply that two or three The Write Stuff 128 is actually the title of the entire software package, which contains several distinct programs. times, and you'll have some idea what to disk. Finally, "BB Menu Maker" creates expect in The Write Stuff 128. Prepare to be amazed. Chances are, if you or someone you know belongs to a Commodore users group, Busy Bee Software (a.k.a. R. Eric cursor-driven, auto-load disk directories, Lee, programmer extraordinaire) is al ready a familiar name. Lee introduced The Write Stuff'64 a few years ago under a new concept called "Userware": software promoted, distributed and supported en tirely by users. Enticed by demo copies of the program promoted through user groups, individ uals become officially licensed distribu tors, placing orders directly through the company. The larger the order, the lower the price. Distributors are supplied with one master disk plus numbered disk la bels, startup booklets, registration cards, manuals and keyboard overlays for the number of copies wanted. Bypassing the costly middleman results in lower prices for commercial-quality software. The system works, which is as much a tribute to the power of Commo dore users as it is to the strength of Lee's program. The Write Stuff 128 is actually the title of the entire software package, which con tains several distinct programs. The main complete with user-defmed file descrip tions. You'll want to include this handy DOS accessory on all your disks. Given the cost/power/performance ratio of the Commodore 128, you simply can't find a better computer for word process ing. Although hard-core users will agree that the perfect word processing software does not exist—and never will—none has ever come closer than "BB Writer 128." Yet the program is versatile enough to ap peal to all users, from absolute beginners to the most demanding typesetter, and be yond. A complete list of the program's fea tures boggles the mind. You may never use them all, but the potential is there. Here's a sample: • 90Kofon-disk documentation, in cluding 68 help files, 36 tutorial files, and instant on-line help screens • 60 user-defined keyboard macros • Built-in outline generator ■ Dvorak/QWERTY keyboard toggle • 80-column print preview • Full-sized keyboard overlay with command summary • Supports 1581 sub-directories, 1700 and 1750 RAM expansion feature is, of course, "BB Writer 128." Both 40- and 80-column versions are in cluded on the flippy disk. With only a few • Built-in file translator reads format exceptions, each version offers identical features. • Read'write in nine different file types Also included on the disk is "BB Customizer," a powerful tool for creating custom printer setups. Over 30 used-defined printer macros in addition to 16 printer toggles can be used for complete printer control. "BB Manual Maker" will print a hard copy of all 68 help files found on the 24 JULY 1989 commands from over 14 other word processors • Batch search and replace • Mail merge, database interfacing • 21-function calculator • One-pass double column printing This list merely scratches the surface and hardly does justice to the scope of the program. Dozens of additional features range from standard issue to truly inno vative. The deeper you dig, the more amazing "BB Writer 128" becomes. Yet there's always room for improve ment. Many aspects of the program, from the auto-boot loader to keyboard control commands, can be redefined by the user. Machine-language programmers will even find a complete memory map for adding their own features. Design an auto-save feature, for example, to work in conjunction with the built-in alarm clock. Busy Bee continually supports users with both a bulletin board and user news letter. Rumored to be in the works are a dictionaiy, thesaurus and grammar checker. Because of its multiple-file for mat capabilities, spell checkers from othei word processors can be used. Lee surely must realize, however, that dictionary disks are absolutely essential to remain competitive in today's market. As for a thesaurus, buy a paperback. Software ver sions are merely gimmicks. [Editor's Xote: A 70,000-word SpelUhecker will be available for$10 by the time you read this. "BB Writer 128" takes time to learn, but your efforts will be well rewarded. Ca sual users can enjoy working with the easy command menu, although advanced users will prefer the fast control-key sys tem for utilizing the 60-plus keyboard commands. The program's keyboard overlay is one of the best I've seen. It's also one of the few cut to incorporate every key on the 128. Helpful hint: For this, or any other key board overlay, use reusable poster putty (called "Fun-Tak" or something similar) to secure the cardboard to your computer. It works better than tape and can be easily placed and removed hundreds of times
• Split-screen option (80 column only)
(leaving no residue). Available at most of
• Confidential file encryption/decryp
fice supply stores. "BB Writer 128" is a post-formatting
tion
• Word/paragraph count
• Define and sort up to ten columns • Store hundreds of word/phrase macros for quick typing • 63K text area, 16K buffer. Multi-text
word processor, a must-have feature for both speed typists and writers. The pro gram features over 64 embedded format codes—many of them user-defined—inContinued on page 39
AMIGA SOFTWARE REVIEWS"
Dragon's Lair Computer. Amiga*
Publisher:
Price:
Lewiston, NY 14092 $59.95 Have you ever wanted to play Drag on's Lair at home? If so, then you should check out ReadySoft's version of the coin-op classic for the Amiga. Ask any arcade addict and they will all say the same thing-^Drago/i's Lair's appeal is unique. It has captured the imaginations of thousands of players who just couldn't believe their senses. The game's appeal stems from the fact that the graphics are not flat images, but rather actual cartoon drawings which the player can manipu late throughout the game. The dazzling sounds result from real studio mixed ef Reviewed by Jeffery Scott Hall Both the characters and backgrounds appear in 3D in such tremendous cartoon quality you will swear you're watching Saturday morning TV. whole idea behind this game is to figure out what moves get you past certain ob stacles and creatures, there will be no dis cussion about how this is accomplished. However, I assure you that if you've played the original coin-op version, you will be able to start playing the game im mediately. Most sequences found on the arcade are duplicated here, not to mention fects applied to game play, which make for bone-chilling realism. Even better yet the drawbridge scene which was found on were the digitized voices, synchronized with the characters to make you feel as if you were actually inside the game itself. Now, let's find out just how the Amiga ver sion of Dragon's Lair stacks up. is to find and rescue the beloved Princess Daphne from Singe the evil Dragon. There is just one problem—Singe has en You begin your quest on the draw bridge, where you must fight your way through the castle's inner walls. Each game sequence consists of about 30 sec onds of actual play, which roughly com pares to the original. Since there are only a few sequences per disk, there are six disks containing a whopping 130 MB of game play. This means that you get an al most exact reproduction of the coin-op, a fact that will make Dragons Lair fans ex cased himself within a large and very tremely happy. Of course, to win this complex castle where he holds the Prin game you must make it to the final show down between the handsome young fight er (that's you) and the fire-breathing drag on (that's Singe) to see who will possess the Princess. Remember, you're her knight in shining armor, so don't let her down. After all, Princesses can be quite ro mantic! Where Art Thou Fair Lady? As Dirk the Daring your ultimate goal cess captive. Clutching your sword, you enter his evil castle. As the screen comes to life, you may not be able to believe your eyes. The replica tion of the laser disk game is almost exact, and game play is very true to the original. Both the characters and backgrounds ap pear in 3D in such tremendous cartoon quality you will swear you're watching Saturday morning TV. If your Amiga is connected to a stereo (which I highly rec ommend for this game) then your ears will hardly believe what they are hearing. All sound effects and voices have been du plicated directly from the arcade game, providing some of the best sounds you've ever heard from your Amiga. Singeing; Singe Dragon's Lair is played by making a se rious of moves in corresponding order, with all choices left up to you. Since the only a few coin-op versions in the U.S. Coin-Op vs. Amiga One of the first differences a Dragon's Lair coin-op player will notice is that the sequence when you get killed is missing. In the arcade version I played, when Dirk gets killed he will fold his arms with a dis gusting look on his face as he boldly grunts an angry "Humh!" Some of the other death scenarios are also missing. The next thing you will notice is the time delay between the arcade sequences. Since the game is provided on six disks (while quite reasonable for a game such as this), it requires many disk swaps even with two drives. On the original, there are few if any time delays, since the game is on laser disk. Last, but not least, you will notice that some voices are left out at certain times (especially during the introductory se quence). When considering these "limita tions," keep in mind that the price of the coin-op version is around$12,000. Now it's time to see what the Amiga version can do. As I've stated before, the game has been closely duplicated from the coin-op version. I'll give the programmers an A for achieving such high standards with this game, and confining it to a mere
one megabytes for the Amiga 500/2000 and 512K on the Amiga 1000. You might be wondering about the differences be tween the two versions; there are none, Since the Amiga 1000 has 256K in it's
Writeable Control Store that really isn't ever touched, the programmers have ac complished a first by utilizing this extra memory with no special requirements. You can install Dragon's Lair on a hard drive, providing it's by Comspec. (This limitation—explained in the manual—is too lengthy to describe here.) Also, you can toggle the audio on and off which is something that's not on the arcade. Other nice features include a low-pass
filter which improves sound on some Amiga 500's and 2000's, a high-resolution mode which condenses the game into the center of the monitor giving you a differ ent perspective to playing the game, and toggle interlace on or off to eliminate scan lines.
Summary Simple mathematics will (ell you that $60 from$12,000 gives you a total of $11,940 left. I don't know about you, but I feel fte price of the Amiga version cer tainly beats that of the coin-op version, Continued on page 87 COMMODORE MAGAZINE 25 AMIGA SOFTWARE REVIEWS Reviewed by Sieve King Zany Golf Computer: Amiga Publisher: Electronic Ails Price: 1820 Gateway Drive San Mateo, CA 94401 S39.95 Zany Golf is, well... zany indeed. Sim ply speaking, if Woody Allen had de signed a miniature golf course, this would be it. Unlike real miniature golf, however, there are only nine holes. The game itself is played like an arcade game: you can't Throughout the course there are opportunities to earn bonus strokes by hitting a roving pixie who looks just like Tinkerbell. advance to the next level, or hole, until you have successfully completed the prior hole in the number of strokes allowed. Moreover, you (and up to three other play ers) start out with five strokes, and as you putt your actual strokes ;ire deducted from that total. At the beginning of the next hole, the par for that hole is added to your remaining strokes. So when you run out of strokes, the game ends and you must start from the beginning. Throughout the course there are oppor tunities to earn bonus strokes by complete ing a hole within a specified time, by hit ting a roving pixie who looks just like Tinkerbell, or by putting the ball through designated obstacles. Before you play each hole, a preview screen gives you an overview of the hole as well as any special instructions. The view is from above looking down at a 45- degree angle, and the holes themselves are larger than the viewing screen, so you have to scroll around to see all the sec tions of the hole. At the beginning of each hole segment is a superb but short musi cal interlude. lb play, simply place your The second hole is a U-shaped arrange ment called "Hamburger Hill." A large The seventh hole is a castle on a hill where the hole is on an island in the fore plastic ketchup dispenser sits at the first ground. If you can manage to putt up to the castle and get the ball through the en turn. Hit it just right and your ball will bank precisely towards the hole, and the trance, it will magically appear on the is dispenser will spew globs of ketchup in the air which plop down into the messy pool at its base. Oh, by the way, there is a ham land. burger "with the works" sitting right on The eighth hole is the "Ant Hill"—a raised hub surrounded by rectangles radi ating outwards like spokes on a wheel. At top of the hole. Tb move it, you must click on the mouse button rapidly: as you do, the far end of each area is a bumper which you activate by pressing the mouse but ton. The aim, of course, is to bump the ball up onto the ant hill so you can putt it in the hole. The final hole, known as "Energy" real ly defies description. In fact, the only instructions given are "Hit the buttons on the big computer." It looks something like the burger bounces up and down as if on a trampoline. The third hole, "Walls," requires you to hit the ball along a narrow area in which several walls rise and fall blocking your path. Radiating downwards from the right is another area, the bottom of which is di vided into several sections, one of which contains the hole. The fourth hole is also bi-level, but here Dr. Frankenstein's basement laboratory, complete with stone floors, flashing light the upper level is a pinball machine. Tb get to the lower level, you must get your ball into a hole at the upper left of the ma plasma arcs spark, photon projectors hurl blobs of energy, and vaporizers disinte grate your ball. This hole is a challenge ening and pipes snaking all around. Here, chine. This I discovered was no mean feat and depended more on luck than on skill. The fifth hole has several levels ac and a half. There is no disputing that Zany Golf is both creative and challenging. It does, cessed by ramps extending in all direc however, suffer from several flaws. If you tions. Fans are placed at critical junctions to help blow the ball in the right direction. Tb activate the fans, you must jiggle the mouse rapidly. With proper coordination, it is possible to navigate these hilly ramps use up all your strokes, the game ends and you must start over. This becomes quite frustrating and tedious, as it takes a and even get a hole-in-one. crisp or excellent. In the pinball hole, for lucky enough to get the ball past the The sixth hole is the Magic Caipet where you have the opportunity to steer blades into the windmill, it will drop down your ball with the mouse when it rolls to the lower level and end up near the over any of the checkered areas on the green. Tb complicate matters, you must get the ball under deflector bars which rhythmically rise and fall. example, the ball bounces before it hits anything. Finally, there are only nine holes, and once you master them, the game becomes "old." Zany Golf is a cute, entertaining game in the Marble Madness mouse pointer on your ball, hold down the left mouse button, and pull the mouse away from the ball in the direction oppo site where you want it to go. The further away from the bail you pull the mouse, the harder you'll hit it. Let go of the but ton and off it goes. And now for the course itself. The first hole, while not so unusual, is really not that easy. It is a bi-level hole with a spin ning windmill on the upper level. If you're hole. Otherwise, try for the gutter which will get you down there through a flashing lighthouse, but not near the hole. 26 JULY 1989 while to load the data for each hole. The graphics are quite good, but not really genre, but unless you're a miniature golf fan, the novelty may soon wear off. H AMIGA SOFTWARE REVIEWS Reviewed by Gary V. Fields Better Dead Than Alien Computer: Amiga Publisher Discovery Software Price: Annapolis, MD 21401$34.95
163 Conduit Street
etlerDead Than Alien is an improved
and challenging spin-olTof the Space Invaders arcade classic. But don't be put off by the suggestion that this one is sim ply a rehash of an old game. Where Space Invaders ends, this one begins. The chal
lenge of the older game was simply to sur vive, but this one goes beyond that and above all, it is fun. When you boot up Bet ter Dead be prepared to laugh. At first glance it is easy to compare the program to the invader game, since most of its screens (and there are dozens of dif ferent screens) show wave after wave of in vading aliens slowly descending and bombing your defensive position. And like another classic, Galaxion, individual in vaders will routinely break away from the formation and swoop down on your posi
tion. The developers of Better Dead took the best parts of those two classics, com bined them and added digitized sound ef fects, power pellets, bonus units, a twoplayer option and some of the strangest, funniest and best-defined invading aliens you could ever hope to see. Those early games earned the right to be called clas sics, and I predict this one is destined to
follow them into the arcade hall of fame. The thing I like about Better Dead Than Alien is that it can be played either solo or in cooperation with another player. This means you can have a partner at your side helping you survive. Or if you prefer, because the hits registered by both players are recorded separately, you can compete against another person. And un
like the original invader game, your de fense platform can move up and down as well as right and left—but there are no de fensive shields to hide behind. Beyond the obvious fttn of two-player action, lots of laughs are produced when in the confu sion of battle, your partner (or opponent) accidentally blasts one of the enhance ment pellets (instead of catching it) when it is released by a wounded alien, or you become confused about which defense sta tion you are controlling and fail to dodge
an attack.
The physical appearances of
the invaders are a delightful mixture of the threatening
A
and the humorous.
The physical appearances of the invad ers are a delightful mixture of the threat ening and the humorous. One of the mas ter invaders is a huge, missile-firing brute which looks like a cross between an octo pus and a jellyfish. Not only is this fellow
odd looking, he is nearly indestructible— you can chase him ofTbut you'll rarely de stroy him. Two other aliens which always inspire some giggles look like giant
heads—one resembles a red-eyed, scalyfaced muppet, and the other reminds me of an old bald-headed man. The first you
must destroy piece by piece, while the sec ond must be forced to retreat.
Attacking Iwtween these master invad ers are levels of formation after invading formation of bugs, aliens and "doo-dads" which get progressively more resistant to your missiles. For instance, at level one you can scratch an alien with a single hit,
but at the advanced levels, you must blast them three, four or even live times to ter minate them. And for those who enjoy
blasting their way through an asteroid field, that thrill is included too. But re gardless the opponents you'll face here, they all have one thing in common—they are deadly.
Those who like options will be happy to know each player's ship can be controlled by either a joystick, mouse or keyboard, so there is no restriction on controlling de vices. I prefer a mouse, while my son feels he does better with his favorite joystick.
The game keeps track of high scores dur
ing sessions, but does not record them on disk. All in all, Better Dead is an excellent ar
cade challenge which will appeal to all ages. My eight-year-old son and I (I'm 39 plus) love to team up against the nasties.
The action is fast and varied, the sound ef
fects are digitally perfect, the graphics are excellent, and there are dozens of chal lenging levels. But above all it is fun—the
different digitized sound effects which are heard after each victory or defeat are sure to touch everybody's funny bone. For ex ample, instead of using an explosion sound when your defense platform is hit by an alien or his missiles, the word ouch is sounded instead. That may not sound too funny, but during actual play it is. It was refreshing to play a game where
the programmers didn't take their work
and the game's traditional "you-alonecan-save-the-planet" scenario so seriously that they couldn't laugh at it and get you to do the same. On a scale often, Better Dead gets the highest mark.
Better Battling * Getting through all the invading aliens may seem impossible, but there is a way to survive all the screens. I've seen the last attacking wave, but only because I discovered a "back door" which made my defense post almost invincible. I won't tell you exactly how to access the cheat mode,
but I will offer a cryptic hint: "Only a CHAMP can succeed and even he will need HELP." • If you just want to face one of the ad vanced waves of invaders (to experience
just how tough they are), select the level option and then type in CROSSWORD for the sector reference. You will be able to
battle with one of the more challenging invasion patterns. At this level each alien can absorb three direct hits without being stopped, while at the same time they will be pelting you with salvo after salvo of bombs. 9 COMMODORE MAGAZINE
27
AMIGA SOFTWARE REVIEWS"
Reviewed byGaiy V. Fields
The Awesome Arcade Action Pack, Volume 1
playing field, fast action and good sound effects with an enjoyable challenge, it is a game most arcade players will like. As you progress you can retrieve power pills
which increase your craft's fuel, armor and firing power, so a really good pilot
Computer Amiga
Publisher:
Price:
Sail Mateo, CA M4O4 $49.95 1820 Gateway Drive Was it arrogance or self confidence that inspired the word awesome in this title's name? In my opinion, any soft ware developer who labels a game collec tion awesome, is inviting some hard criti cism. But after playing with the trio in this pack—SideWinder, Xenon and Blastabail—I concede that the label is appro priate. The three games in The Aioesome Arcade Action Pack, Volume 1 would have been hits even if sold separately. They are all excellent arcade offerings in every as pect, combining action, challenge, graph ics and sound effects. SideWinder SideWinde^s fast action, beautiful graphics and challenge are as good as those on any game which has ever traced the screen in a quarter-eating arcade ma chine or anywhere else for that matter. The scenario is simple and classic—you must take on a massive enemy force sin gle-handedly. As you attempt to penetrate the enemy's fortress flying your lone fight er craft, you encounter a horde of enemy .S'ldcWinrfer removed from the screen it is replaced with a realistic, damaged image. If you are really good, or just suicidal, SideWinder offers five different levels of competition, starting with Beginner and progressively getting more difficult until you get to Master level. At the Master lev el, my chances of surviving the alien star craft are about as good as a flea's sitting on a hot coal. I'm much more successful at the Beginner level, but because there are five different degrees of difficulty, Side Winder will remain a challenge for a long time. Xenon Of the three games, Xenon is the most complicated—to survive here you need not only quick reflexes, but also informa tion about the enemy you encounter. At first glance it appears to be a simple fly, shoot and dodge exercise, but approaching the game with that attitude will end your career as a fighter pilot almost instantly. When the game begins you are on a mis sion to rescue a downed companion. To crafts, missiles, obstacles, gun placements save him you must battle your way through enemy territory in your convert and assorted dangers. As you progress ible fighter daft (you can toggle between from one level to another, the enemy de ground and air action). Before you finish, fenses grow more aggressive, difficult and dangerous. The only help you will receive you'll have to identify and defeat over 20 different types of alien defenses. Some are stationary, some fly, and others are ground based. The trick is to identify the enemy quickly and properly convert your craft (from air to ground or vice versa! to match the threat. Once that is done, you must still out^maneuver and out-shoot on your mission is an occasional power pack which reinforces your craft. The first is rapid-fire capability and the last is the ability to hover, rather than being con stantly projected forward. What I found so appealing about Side Winder are its excellent graphics and smooth movement. The well-defined fight er craft responds accurately to joystick pressure (e.g., when you signal it to bank right, it rolls to the right). Bui all of the game's graphics are real killers. The fight er casts a shadow as it moves over enemy territory; attacking forces are all realisti cally defined; explosions look (and sound) like destructive blasts; and when an en emy emplacement is hit, instead of being 28 JULY 1989 could finish a mission with a more power ful craft than the one with which he began. BlastabaU Of the three, this is my least favorite. Btastaball is a sort of futuristic game of hockey where the players use spacecrafts instead of skates and laser cannons in stead of hockey sticks. The idea is to ma neuver the puck across the end line of your opponent's field (for one point) or into his or her goal box (for two points). Adding some strategy to the game, each player is allowed to select the particular craft he or she wants to pilot from a list of ten. Each has different attributes (con trols, power, armament, etc.), so making a wise decision will seriously affect your performance in a game. You can compete against either another human or a com puter-controlled opponent. To move the puck you either collide with it or blast it with your cannon. The only reason I have not become an ardent Blaslaball fan is that I've found the computer unbeatable. Once I've let the computer's craft move the puck past me, I've found it nearly impossible to regain control before the it goes sliding across my goal line. I hate losing, and when I play the computer I experience that repeatedly. On the other hand, playing Blasiabal! against another flawed human, like my self, can really be fun. The craft responds much like a space sound. For instance, if you mistake a lowflying opponent as a ground unit and con vert your craft to ground controls, you have turned yourself into a sitting duck. On the other hand, if you try to match a ship—you rotate the nose of the craft in the direction you want to move and then apply thrust, fIb change directions you must rotate and apply thrust again (for you old-timers, the crafts here are con trolled exactly like those in the old 64 Omega Race game). The computer doesn't have any trouble mastering these con trols, but I had to spend a lot of practice time with the game before they became second nature. That's why I find humans more fun to play—they make mistakes ground-based enemy from the air, the too. same deadly results are almost as certain. Because Xenon combines great graph ics (including digitized and animated im ages of Captain Xod), three-dimensional In the heat of competition, trying to keep track of where your opponent is. ma neuver your craft and at the same time them. All this is not as easy as it may Continued on page 70 AMIGA SOFTWARE REVIEWS Reviewed by Jeffery Scott Hall Robbeary Computer: Amiga Publisher: Price: Anco Software P.O. Box 292 Burgettstown, PA 15021$24.95
jyobbeary, from Anco Software, puts
X».you in the middle of the greatest
heist in history. Bertie Bear is one of the
greatest criminals of our time, and his specialty just happens to be (surprise!) robbery. You assume his role as you enter
Bertie has made some enemies during his career, and all of them have gathered together for the final confrontation with him at the department store.
However, I don't feel these minor com plaints detract from the overall game play. Anco included a top-eight score table for those who manage to escape with
enough stolen goods to qualify. The graph ics and sound effects are very good, and the game play is both fast and complex due to its 24 different levels of play. H
Bertie's Secret Hints
• Never jump more than one beam at a time, for if you do it will result in your death. When it is impossible to jump, wait
avoidable while others will be super fast causing the most masterful arcade player to panic.
which will give you a platform which you can use to climb either up or down.
Robbing the Store
• Keep an eye on the timer; if you have fewer than 30 seconds left don't worry
tated creatures than you can count.
sible, while avoiding contact with any
will have several seconds before the en
Knowing that you will go down in history
creatures guarding the store. If captured by the enemy you will die immediately. If
one of the largest and most valuable de partment stores ever to be constructed. However, since robberies almost always
occur at night, you will be faced with the greatest challenge of your life. The store you are about to rob has the most fright ening security guards ever seen by man or
bear, because this store contains more mu
as the most famous non-violent criminal ever with the success of this robbery, you decide to enter the building. Once game play has started, you will al ways find Bertie Bear located in the cen ter of the screen with a generous supply of five extra lives. At the top of the screen you will notice three displays; these show your current score, the highest score and
the level you are playing. Also, at the bot tom center of the screen you will find a timer which is set for a certain amount of time according to the level you're on. If this timer runs out before you complete that level, it will result in instant death.
Controlling Bertie Bear is done by mov ing the joystick in the direction you wish
to move, and pressing the fire button will
cause Mm to leap up in the air. This makes the game more difficult because you will have to think carefully about each move before actually making it.
Bertie Bear's Unpopularity
Bertie Bear has made some enemies
during his career to say the least, and all of them have gathered together for the fi nal confrontation with him at the depart ment store. Bertie's enemies are unique in
appearance and intelligence, getting smarter as you progress through the game. The enemies you will encounter range from large animals to mutated creatures bent on stopping your quest. De
pending upon the level you are in, some of the creatures will be very slow and easily
The goal of Robbeary is to make it past all 24 floors (or levels) in the department store collecting as many valuables as pos
you have an extra life, you will start over at the beginning of the current level. Each of the floors have beams which you can walk across and jump up or down provid
for one of the bonus objects to appear
about any bonus objects—go only for the valuables. • Whenever you start a new level, you emy appears. You can take advantage of this by going to what you think are the difficult spots on the floor and collecting the valuables before the creatures appear.
ing it is not too far from your location. You
will also find ladders on each floor which will allow you to climb greater distances than you can jump giving you access to
the entire floor. However, (his will be a lot more difficult than it sounds due to the en emies in constant pursuit.
In order to help give you a better chance at completing your robbery, you will find
bonus objects throughout the floor. These objects are too numerous to mention here, but a few of them include candlesticks
which turn the guards into precious dia monds, a stop watch that freezes time, and a cross that makes our friend Bertie invin
cible. Many others are encountered only on certain levels, while some appear al most constantly.
Summary
1 have only two minor complaints with
Robbeary. First, the screen display is just
fine where graphics are concerned, but the text is a different story. The game was ob viously designed to be played only on PAL monitors which have a wider display hori
zontally. This means that some of the text isn't fully visible at all times. My other complaint: In a game as fast paced as this, one definitely needs to be able to pause the action for a well-deserved break.
Next Month in Commodore Magazine All about Epyx Ten years old already. From Temple of Apshai lo The Games: Summer Edition, Epyx has grown up quickly. Read all about the company, the people and the products that are Epyx. And whors this about a sequel lo California Games?
Sound Investments Considering using your Amiga tor music? Then this is a feature you doni want to miss. Included are the ins and outs ot MIDI recording, some short sottwore reviews onfl advice Irom recording musicians.
Best of Amiga Public Domain Each month we publish an Amiga public domain column, and once each year we
select the best ol what we've reviewed. Find out what the year's best public domain software is in categories from animation to telecommunication. Available on newsstands
July 20, 1989 COMMODORE MAGAZINE
29
AMIGA SOFTWARE REVIEWS"
Reviewed by Russ Ceccola
Cosmic Relief Computer: Amiga* Publisher:
Datasoft
Price:
Chatsworth, CA 91311 $34.95 19808 NonlhofT Place Arcade adventure games have got to be one of my most favorite types of games. They are challenging and fun and fill up an hour or two when you're looking for something to do. 1 always like getting new arcade adventure games in the mail—especially when they're for the Amiga. When that's true, then I am also in for some incredible graphics. Such was the case with Cosmic Relief: Professor Renegade to the Rescue, Datasoft always put out consistently good programs, but none has been as good recently as Cosmic Relief. This game has all of the elements that 1 look for in a great game and then some. If the great graphics and game play aren't enough, the wacky characters and plot will blow you away. Cosmic Relief has what I guess you'd call a typical "B" movie plot. In the game, you choose one of five international char acters as your computer counterpart. It seems that an asteroid the size of Louisi ana is heading straight for Earth. Over 40 years ago, a certain eccentric Professor Renegade warned the people of Earth that such an asteroid would be coming. Of course, nobody listened to the good Profes sor, his attempts to warn humanity were unheeded. After his ideas for saving the world were rejected, Professor Renegade became a recluse, went far away and hid himself. Now that all the important people of the world can see the asteroid coming straight at the planet, they are desperate for the professor's help. Unfortunately, nobody knows where the old man has gone. You must travel through dangerous wilder ness to find the professor and enlist his aid in saving the world. He is the only one ca pable of saving the planet, and his every desire must be met if your mission is to be a success. Professor Renegade's greatest asset is his ability to invent and build things. In addition to finding the professor, you must also pick up items along your journey that he will use in building a working anti-as teroid deflector. This dual goal makes the game more fun, as well as more frustrat ing. 30 JULY 1989 The bulk of your efforts in Cosmic Relief vi\\\ be spent trying to stay alive, exploring the game world and finding the use for and collecting all of the objects. You can't tell what a lot of the objects along the way are, but if you collect every thing you find, you can't go wrong. As you walk along, you pick up any object you move over or touch. You would think that after a while, you'd have too many things in your inventory. This is not true. There are "bearers" to the right of your charac ter who each hold a different item. Be cause you can only carry and/or use one object at a time, you must let the bearers carry the rest The way you do this is by swapping objects with the bearers. As you pick up an object, it appears in a window above a copy of your character at the bottom of the screen. To the right of this window is another window that has three bearers (who look like restless na tives from the Congo region) visible in it. Above each bearer is room for an object. If the bearer right next to the copy of your character has no object, the one you are carrying switches to the spot abovo the bearer when you hit the "S" key. In addi tion, you can scroll bearers to the left and right with the "1" and "2" keys. By scroll ing to an empty bearer and pressing the "S" key, you can store your objects away for later use. This is a very effective way of keeping track of objects that you find, since there are so many. Cosmic Relief is so chock full of objects that you don't know what to do with them all. r(b help you in figuring out what to do with such things as a flute or a vacuum cleaner, the game includes an option called "thinking." By pressing the "T" key, you are sometimes given hints in the game. These hints are in the form of ob jects that appear above your head while you are thinking. When this happens the game is telling you that you need this ob ject to get past whatever obstacle is on that screen. For example, on the screen with rock snakes, if you hit "T," the char acter scratches his head, and a flute ap pears above it. If you have picked up the flute already, obtain it from the bearer who has it by swapping, and you can charm the snakes with the flute. As an other hint, you use the vacuum cleaner on one ground screen only to fly up to the clouds. By thinking, you can get help in a lot of different situations. However, it is important to note that thinking does not always work—you might actually have to use your brain sometimes. In this adventure game, you must as sume the role of one of five "adventurers." Each adventurer is from a different coun try. These countries are (by chance ?) the countries with the biggest sales in com puter games. You can choose any country representative you want. Your choices are Fortisque-Smythe from England, Big John Caine from America, Herr Krusche from Germany, Wu Pong from Japan and Henri Beaucoup from France. Each char acter is distinctive on the screen and each has his own facial expressions, etc. You may wonder what separates one character from another. Each character has a special "key" item that he must be carrying to finish the game. None of these key items are needed to build the anti-as teroid deflector device. Instead, the key item for each player is just one of the ob jects that is used to get farther in game. Each adventurer has his own key item. These items are related to the nationality of the character and will seem fairly obvi ous, especially after you read the descrip tions of the adventurers in the game man ual—-each character's key item is men tioned in his description. You must read carefully and think clearly. The bulk of your efforts in Cosmic Relief Continued on page 88 AMIGA SOFTWARE REVIEWS' Reviewed by John Ryan Heroes of the Lance Computer: Amiga* Publisher: Strategic Simulations, inc. 1Mb' N. Rengstorff Avenue Price: Mountain View, CA SMQ43$39.95
It's been three hundred years since the tremendous cataclysm that fell upon the great nation called Krynn—a disaster brought down upon the land by angry gods. The Queen of Darkness, seeing an
opportunity to spread her evil wings over
the land, compelled mighty dragons to do battle on the side of darkness. Her plan
was rather simple: Control Krynn, and entry into the free world would be assured. The land's only hope of resisting her great
power lies on the heads and swords of a small band of warriors—the Companions
of the Lance—not yet heroes, for that hon or is yet to come. If these adventurous warriors can recov
er the Disks of Mishakal from the Xak Tsaroth ruins, faith in the old gods may be restored and the queen held in abeyance. There's only one small problem: The disks
changed prior to play, so it is a good idea to pay close attention to the statistics of
time.
each player. Get to know them. Only by using each character's unique abilities
The animation, for both on-screen char acters and the background, is simply mar
can you succeed in this game. Likewise,
velous. Player movement is very fluid and lifelike; your alter egos walk, run and leap as you patrol the ruined temple. During
since the party is multi-racial in makeup {dwarves, elves and humans), some char
are guarded by an ancient and huge black dragon, a nightmare of teeth and leather. Yes, this is a problem. This is a challenge. This is Heroes of the iMiiee.
acters accomplish tasks better than oth ers, whether it is fighting a certain mon ster type, locating traps or jumping over obstacles. Using them effectively against
Heroes of the Lance has been, until now, a highly popular Advanced Dungeons & Dragons8 campaign that has existed only
most pivotal aspect of the game.
in the minds of its players. Now, in cooper
the dilemmas thrown against you is the
As the game begins, you are presented with a quick overview of each player, com
leader, only one character will appear at a
exploration, crumpled buildings, shrines and ominous doorways and corridors scroll "behind" the party, imparting a three-di mensional feel. Even though you can en ter many of the buildings and crossroads, some entrances and portals are hard to spot. For this reason, among others, a small compass at the Iwttom of the screen
plete with a concise character back
will activate whenever a new path can be taken, highlighting the directions in which the party can travel. Not all of the
struggle against almost, insurmountable
ground. Much of this information is also presented in the 25-page manual, so you can quickly bypass the opening screens
background graphics are there for window
odds. Within Krynn's ancient ruins are Draconian hordes and a host of other nas
(which include very nice high-resolution
dressing, either. Along your path are
portrayals of each character).
ation with TSR, Strategic Simulations has translated this mythical saga into com puter format, where heroes and heroines
ties, all intent on keeping you and your companions from reaching the mystical disks. Of course, finding the location of
the talisman may be far easier than actu ally taking possession of it. You'll find the disk's guardian, Khisanth the ancient dragon, a nightmare rendered from your most hellish dreams. (I'll give a hint right up front: You can't outrun him!) Heroes of the Lance comes complete with a pre-built party of adventurers.
This is a graphic adventure. While that may not sound so special to some, keep in mind that I'm talking about an Amiga
graphic adventure, with all the speed, col or and detail that you would expect from top-of-the-line Amiga software. The screen is divided into two main sections: the graphics screen, where ail the action takes place, and a character icon area,
where each of your party's players is rep resented. During play, the graphics screen
Each of the eight characters has different
smoothly scrolls left or right, depending
levels of ability in areas such as strength, wisdom, dexterity and charisma, to name a few; and these attributes cannot be
on the direction a character is moving.
Since the entire party is represented on screen by whomever you select as party
weapons, magical shields, potions, scrolls, gems and a host of other goodies that can be collected by the paity leader. Surviving long enough to complete your
quest will lake a combination of heroics, resource conservation and luck. There is an endless parade of monsters and other evil vermin to contend with. You can, however, survive most confrontations if you take your time and think! As a mon ster attacks, it must walk (or run) onto the screen to reach you. This gives you time to use ranged weapons such as spears, throwing axes, arrows or magical attacks while the beast is still out of sword's reach. Once the attacker gets within a few feet of COMMODORE MAGAZINE
31
Software Reviews/Heroes of the Lanceyour main character, however, ranged weapons will become useless, and you'll have to resort to hand-to-hand combat. This is where a character's physical characteristics and handicaps come into
play. A Dwarf, for example, is a superb
dally too long without taking action, your
fallen comrade will be lost forever, his icon replaced with that of a dreary gravestone.
Resurrected players return with minimal hit points and require substantial first aid to regain their strength.
Spells can be cast by the priestess or the
match against other Dwarves—and his
mage. Each spell costs certain amount of
throwing axe is positively devastating-— but you will probably not want to match
spell points to cast. Once these spell points are used, no more will be granted during the game. Conservative and thoughtful casting is definitely the order of the day. Thankfully, there are numerous scrolls and ]»tions scattered throughout the tem ple to ease the workload of the spellcas ters. Spells are used much like ranged weapons during combat. Once a spell is selected, it is considered the "ready" spell until the next time a new spell is chosen.
him up against a dragon. Conversely,
your tall, statuesque fighter can make short work of a mercenary, but those slip pery little Dwarves will fairly dance around his feet! As you enter battle, you
can interrupt the sequence to select a new
leader if the current leader is unaccepta ble for the situation. Pressing any key will bring up a menu that contains options to cast spells, trade or drop items, rearrange the marching order of your members or pick up items, among other things. (This menu can be called at any point during the game.) There is an important point to address here, for only the first four charac ters in the marching order are considered
in combat. So while only a single charac
The creatures and traps found in this game demand respect, caution and atten tion to detail. The various beasts includemen, Draconians, giants spiders, trolls, specters, gully dwarves, hatch ling drag ons and wraiths. All are superbly animat
ed, all are deadly, and all require a difler-
ter is presented on screen, the other three characters behind the leader can take
ent approach during combat. Traps, on the other hand, can be discovered beforehand by wary travelers, though, more often
damage during the course of battle. More
than not, it is the clumsy foot or inatten
over, priest and mage spells can be cast
tive grasp that discovers the effects of rock slides, falling columns and tripwires. If you're quick, your character may be able
only if the spellcasters occupy one of the
first four party slots—critical if you need to cast a quick healing spell in the midst of battle. Once a leader is selected for the battle, ranged weapons can be loosed at the at
tacking monster. Projectiles can be aimed
• Learn when to duck! Smaller charac ters can easily duck blows and magical as
high, mid-level or low, selected according to the size of the target. This also applies in hand-to-hand combat. Blows can be
where you won't be harassed. This will
placed to an attacker's head, mid section or—well—lower than the mid section. As each blow lands, crisp, digitized battle cries, groans, grunts and the harsh clang of sword against sword sounds as the struggle proceeds. If the fight is success
Of course, it may go the other way as well. Near each character's icon is a small thennometer-type bar that represents the relative health of the player. As an adven
turer is hit, this bar will begin to slide down and will turn red if the wounds be come critical. If the player falls in battle,
the next character in the marching order will move forward and take the fallen war rior's place.
Characters killed in combat can be res urrected by the priestess only if the party
does not leave the area where death oc curred. If you depart the battle area, or 32
JULY 1989
saults, but it takes practice. Try the duck ing maneuver outside of the temple,
to leap swiftly out of harm's way. If you're not—well, have your priestess ready. I have never played a game so engross ing. From its digitized sound to the won
derful graphics and animation, it is hard to focus on any shortcoming the game might have. Even its documentation, usu ally a program's weak link, is written in a chatty, informative style, with everything you'll need to play effectively. I found only one small irritation with this program, really—just an irksome detail, but impor tant. The Amiga is a wonderful machine, with capabilities unheard of until now, but about as flexible as a steel girder with only one disk drive. So why, SSI, can't the program detect a second disk drive when
it asks for this game's "b" disk? Come on, fellas. An Amiga program that can't de tect a second disk drive? I don't know why, but it severely tested my patience when I plopped the disk into dfl: and still had the disk requester staring me in the face!
This small quirk aside, Heroes of the Lance has definitely set a new standard for others in the industry to follow. Wheth er you are a conventional role-player or an arcade buff, you'll find a little of every thing here. Like those who may have achieved the status of Heroes of the Lance, I eagerly await a sequel. a *Also available for the Commodore 64.
strongest character can take at least one
dose of dragon's breath). The dragon will actually back away from you and, if you stay within arm's reach of the dragon, it won't breath on you—though he will claw and bite if you get too close. You can van
save you a lot of hit points. • Don't heal a character every time he
quish the dragon by hitting it on the hind
or she loses hit points. Spell points are
• Don't waste your arrows; there's a limited supply and they come in handy at long range. Use arrows on men and gar goyles—don't waste them on hakhling
• Wateh out for Bozak Draconians (I call them gargoyles). Their magical at tacks can be devastating if you haven't learned to duck. Use a Web or Charm spell to immobilize it, then move in for the kill. Be careful, though: Even at the point of death, these bad guys can unleash a po tent missile, so quickly get behind the Draconian after it begins to crumble! • Your mage floats whenever you at tempt to jump him over obstacles. There's a wide canyon on the second level in
dragons—they'll be useless.
which only he can negotiate. I lost several
• Speaking of hatchling dragons, there's only one sure-fire way to kill them. First and foremost, don't waste precious
warriors discovering this tidbit.
precious and you won't get anymore (which will give you absolutely no hope of defeating the dragon). When a character is severely injured, move him to the back of the party for safe-keeping until potions can be acquired or a place of healing
found.
spell points by casting several short-last ing dragon protection spells. Cast one pro tection spell then run directly at the drag on (yes, I know it sounds crazy, but your
quarters area.
• Save your game often, especially be fore attempting anytiling hazardous (which could be every other screen). Los ing just one important player can leave
AMIGA SOFTWARE REVIEWS"
Reviewed by Gary V. Fields
DeluxePrint II
The program is customized for seven
different printing projects: signs, labels,
Computer Amiga
Publisher:
Electronic Arts 1820 Gateway Drive
Price:
$79.95 banners, letterheads, calendars, greeting cards and four-tile signs. Ail are easily created, and most people will find a use for San Mateo, CA 94404 many if not all of them. Students will find Icon j DetuxePrintH is the update of the pre mier Amiga publishing program. Although it is not a desktop publishing package in the traditional sense, it does put an affordable, yet substantial publish ing machine within every user's reach. DeluxePrint II makes it easy for anyone to design and print anything from personal ized calendars and address labels to busi ness letterheads and four-sided greeting cards. The program is so simple to use that anyone familiar with the point-and-select Flexible editing options let you paste, move, delete, size, flip, edit, load and save specific elements which make up your design. Flexible editing options let you paste, move, delete, size, flip, edit, load and save interface common to most Amiga software can have DeluxePrint II up and printing specific elements which make up your de without ever opening the manual. The main screen of each project displays simi lar options: palette, menu bar, corner sam ple, editing options and the main display area. Thus, switching from one print pro ject to another doesn't require you to learn new commands. And because the display area accurately duplicates the project as it drawing (called an icon by DeluxePrint II! and edit it with the program's full-fea will print (including shape, color and loca tion of text and graphics! all the mystery is removed. The resolution of a monitor other graphics or text screen differs from the resolution a printer can produce, so in most cases the final printout will be better than that shown on the screen. But what you see on the screen is very close to what you will see on paper. I was happy to see that DeluxePrint II in cludes a preview option which lets you view a highly-magnified version of the de sign. Electronic Arts didn't forget that color printers are becoming affordable and pop ular either. The program supports an im pressive 32-color palette. Thus color print er owners can print professional full-color projects which will rival those produced in commercial print shops. The program's pull-down menu bar lets you select which design type you want to create: signs (single and four-tile), labels, banners, letterheads, calendars and greet ing cards. The lower-left window displays what is called a "corner sample." This use ful feature constantly shows the size and font you are currently using for text or the graphics available for editing or pasting. sign. For instance you can load an IFF tured graphic editor and then turn it into a border element to surround a project. Or you could resize, change its color and paste as many copies as you needed any where you wish, without having to reload it. And you can paste it over or around One the things I like about DeluxePrint II is that each object used to create a de sign remains a separate element even after it is pasted in place. For instance, If I want to pick up a piece of text or an icon and move or discard it, that action does not affect any other elements in the de sign, even those it may be touching. This means you don't have to worry about de stroying finished layers of your design while testing elements in different loca tions. This is possible because each ele ment of a design is responsive to only one of the four independent editing modes: icon, border, text and background. To change modes, you simply click on the word and presto, every option you need is activated. I like this division of editing be cause it lets me concentrate on the task at hand. If I want to edit text, I select text and don't have to worry about accidental ly altering the other elements. Anyone who has been frustrated by how easy it is to inadvertently select or alter the wrong element while using a traditional desktop publishing program will applaud DeluxePrint IFs solution. signs and banners useful in school, while business people will like the ability to cre ate business cards, personalized calendars and letterheads. And if you've ever wasted a full lunch hour futilely searching for the perfect store-bought greeting card for a special occasion, you can now create ones which reflect your exact sentiment. I think users of the original DeluxePrint will be pleased with the improvements in corporated in this update, and new users will be happy with the program's power ful, yet uncomplicated interface. This up date suppoits only IFF files—a welcome standardization of filing formats. Unfortunately, because the original ver sion supported its own unique format as well as IFF, and the clip art which came with the original DeluxePrint was stoiied in the non-IFF standard, you cannot use it with DeluxePrint II. The only way I have been able to access them with this update was to load them into the older program, and save them as IFF files—a slow and boring task. The people at Electronic Arts recognize that incompatibility between the older and newer programs may frustrate some owners of the older program; they will be releasing similar clip art disks soon. It is ironic that the company which cham pioned the adoption of IFF as the filing standard when the Amiga was first re leased would get caught in a non-standard conflict. What's important, however, is that DeluxePrint II now conforms to the IFF standard, and we hope to have seen the last of non-standard formats. DeluxePrint IFs manual is easy to un derstand and comes with a tutorial for cre ating each of the seven projects. It in cludes a healthy reference section and both an index and table of contents, so there is no time wasted hunting for the ex act information you need. Thankfully, it is splattered with graphics displaying exact ly what is referenced in the text. Neither the program disk nor extra art disk are copy protected, and both can be installed on a hard drive. As good as DeluxePrint II is, it is not perfect. While bringing the new program Continued on page 87 COMMODORE MAGAZINE 33 AMIGA SOFTWARE REVJEWS Reviewed by Steve King MovieSetter Computer: Amiga Publisher: Gold Disk 2171 Dunwin Drive, #13 Mississauga, Ontario, L5L1X2 Canada Price:$99.95
For those of you whose creative bent leans towards animation, MovieSetter by Gold Disk is the perfect tool to get you
started. Billed as a WYSIWYG ("What You See Is What You Get") animation and video program, MovieSetter makes it ex traordinarily easy to create your own car toons, complete with digitized sounds and moving backgrounds, that "project" at an amazing sixty frames per second. MovieSetter takes the traditional ani mation approach of displaying a sequence
of "frames." Each frame is a little different than the previous one; so when you play, or flip, the frames at a high rate of speed, you create a sensation of motion. A Movie
Setter production is comprised of several elements. First, you need a background against which your objects will move. Sec ond, you must add the objects that will be moving and specify the movement path.
Finally, you add your sound effects at the appropriate places. Tb begin your first production, load in a background (or a blank screen can be used if you wish). This can be any IFF format graphic up to 352 X 240 containing no more than 32 colors. This background im mediately appears as the first frame. For example, to create a simple animation of a man walking down a street from left to right, you would load a picture of a street scene for the background. Each object that
moves down the street is created on a sep arate track which consists of a number of frames where the image of the man is placed further to the right as the frame number increases. You don't have to wor
ry about copying the background each time you create a new frame; the program
does that for you automatically. There are several ways to move the im
age (which has been attached to your mouse pointer when you selected it) across
the screen. The first is by moving the mouse pointer and clicking the button wherever you want that object to appear. This stamps the image onto the back ground. The second way is to select the 34
JULY 19B9
Editing tracks is a breeze; all
you have to do is advance the production to the desired frame, click on the face you
motion. This scrolling requires a bit of care in constructing your background, as both the left and right edges of the back ground picture must match up to produce a smooth, continuous image. Another option is adding sound effects.
At any frame you can specify that a digi tized sound be played. MovieSetter is ex
tremely flexible in this area; once you load
want to edit, and make the
a standard IFF 8SVX sound from disk, you can change its pitch and volume,
change.
use, and even create a stereo panning ef
menu item "Guides." Then just draw a
line or ellipse with your mouse, specify the speed and acceleration of the object, and indicate the number of frames it will take for your object to move the distance. Mo vieSetter does the rest.
Up to this point, you have probably imagined the moving object as static and
inanimate—like a brush you have grabbed in a paint program. Here is where MovieSetter sets itself apart; the object is really a series of brushes called "faces," each depicting a slightly different view of the actual object. For example, there may be six different pictures of the man we are using with his legs in different positions. The entire collection of these faces is
called a "set." If you were to view these faces rapidly, you would see the man walking in place. So every time a new frame is displayed the object not only
moves across the screen, but the face itself also automatically advances to the next face in the set. And when you reach the sixth face, the next frame automatically displays the first one again. This creates the illusion of animated movement.
Once you have finished plotting the movement of your first set, you have sev eral options. You can create more tracks
by rewinding the production back to the beginning using controls similar to those
on a VCR. You can then place either the same or different objects on the back
ground. A nice feature lets you easily specify which objects will pass in front of the others.
One of the unique features, is being able to continuously scroll the background
specify which of the four internal voices to fect. At any point you can also choose to
cycle a specified range of colors, change palettes, or modify the frame display rate
(to either speed up or slow down the ani mation).
Editing tracks is a breeze; all you have
to do is advance the production to the de sired frame, click on the face you want to
edit, and make the change. Using the icons in the edit window, you can even cut, copy and paste tracks. If you want to
change background pictures, you choose from six types of transitional wipes. A spe
cial window titled "Storyboard" provides some unique editing capabilities—it is es sentially a pictorial database of your pro duction. When this window is active, you can search your production for all frames in which a specified event occurs (e.g., a background change or sound event).
When you have finished your produc tion, you can save it to disk in several ways. Normally, all that is saved is a small file which describes the production you created. The playback function actu
ally reads that file and re-assembles the production. By choosing the Embedded
Save option, that script file as well as all of the sounds, backgrounds and sets are
saved on a disk. While this takes up a great deal of space, it is required if you in
tend to distribute your production. Final ly, there is also an option to separately save all of the components of a production
previously loaded from disk as an "embed ded saved" file.
Perhaps the most difficult part of any program of this type is the actual creation of the animated characters which in all honesty requires a high level of artistic
ing to the right, the street moves in the
ability. While MovieSetter can't impart this skill in you, it does contain a graphics editor which facilitates the creation of sets. This window looks quite similar to several popular paint programs. On the
opposite direction, giving the illusion of
Continued on page 89
both horizontally or vertically. In our ex
ample, specifying a horizontal scroll with a negative velocity moves the background from right to left. While our man is walk
SOFTWARE SHORTS"
by Russ Ceccola
A New Beginning
tered everywhere—a result of the crea tures' attacks. Project Firestart is "filmed" like a movie too. I thought this was neat.
There are close-ups, pans, fades, etc.
OK, folks, before we get down to busi
The manua! contains a map of the ship that is tough to figure out—my only com
plaint about the game. The interface is
umn.
What is the purpose of this column? you might ask. It's real simple. 'Ib make you
aware of the duds and the successes in the software world for the Commodore 64,
Commodore 128 and Commodore Amiga series home computers. Who am I to judge? you might also ask. Wei!, I've been writing for Commodore
Magazine for almost three years and have been involved with software and comput ers since I was knee-high to a Space In
vaders machine. Anyway, in simple lan guage, I will try to assign a fair rating to as much new entertainment software as there is space for every month.
The software I'll be previewing will
have been released just before the dead line for the magazine. There is a threemonth lead time for the publication, so software highlighted in this month's col umn was actually released in March. Fve assigned a star rating to each pro gram:
* = poor
** ■ fair/average *** = good **** =s very good
***** = excellent
You won't see too many five-star ratings— simply because it's tough to make a pro
gram that is great all-around. The price mentioned is the suggested retail price. Any special memory requirements for Amiga products will be mentioned, but I'm assuming 512K and Kickstart 1.2 or greater. Let's get to some software.
By the way, feel free to write to me at: Russ Ceccola
c/o Commodore Magazine 1200 Wilson Drive West Chester, PA 19380 Mind-Roll***1/* Epyx, Inc.
600 Galveston Drive Redwood City, CA 94063
Commodore 64: $29.95/Amiga:$29.95 I'm starting to get really sick of these bouncing ball programs, but the problem
is that they just get better. Mind-Roll is one of those games in which you bounce a
ball along platforms suspended in the air
easy to use, and the graphics are excel Wntl-K'Jl
to try to get to the end of the course. It is also the best program of this type that I've
seen released so far. You roll the ball by pushing the joystick in any direction, and you jump by hitting the fire button. There are a lot of different objects on the tiled squares that make up the planes, from energizers and time boosters to lifts and teleports. In any case, Mind-Roll is fast and furious. There is no time for mistakes. An added feature that makes MindRoll more interesting is that you can
choose the order in which you visit the ten planes on a Designer screen. I went in nu
merical order because the higher-num bered planes are more difficult, but you have the option to do what you want. Also,
each plane has its own personality based on the type of tiles prevalent and the "theme" of the plane. The graphics are very good on both versions, and the
sounds reflect the happenings of the game. The only thing that is missing is a construction set option, so I can set up my own courses. Maybe next time... Project Firestart **** Electronic Arts 1820 Gateway Drive San Mateo, CA 94404
Commodore 64: $29.95 As soon as 1 saw the press release head line "Project Firestart Combines Science Fiction With Horror Movie Effects"—I knew I was in for a treat. Boy, was I right! Project Firestart is a two-disk game in which you must find out what happened to the Prometheus, a research ship that is orbiting Titan, a moon of Saturn. The sci entists on board were experimenting with genetics, and something went wrong. All kinds of flesh-hungry creatures are stalk ing the research ship now. You must search the ship and solve the mystery be fore a certain amount of time passes. This adventure game is a lot like the hit movie Aliens. You have to go through the ship to find the answers to the questions and save a beautiful girl. Blood is splat- lent. Another neat feature of'Project Fires tart is the music. It increases in tension as you get further in the game. The sound ef fects are great, too. If you put all of these elements together, you'll find that the package is worth the price of admission. Just don't turn your back to the creatures! Goldltunncr II ***'/;■ Microdeal 576 S. Telegraph Pontiac, MI 48053 Amiga:$39.95 This shoot-'em-up is the sequel to the popular game GoldRunner in which you destroyed the pirates on the Ring Worlds ofTriton. It seems they've returned to try to take over the Ring Worlds once again.
They are capturing your defense robots and reducing your ability to protect your fellow citizens. You have to fly the GoldRunner II fighter craft and shoot down all of the pirates that are taking the robots. You move from platform to platform, (platform = level in the game) collecting the robots and placing them in the moth-
ership after all are brought together. The neat thing about GoldRunner II is that the enemy ships' fire doesn't hurt you—it bounces you closer to certain buildings that will destroy you. I like the vertical scrolling and the quick game play.
You have smart bombs to help you, and there is a tutorial that comes with the game.
The graphics and the game play are the strong points of this game. It takes a while
to get used to the controls and what you
can and can't run into on the platform. That's my only complaint—you can't just pop in the game without reading the man ual and expect to get very far. Still, I have found GoldRunner II to be a very enjoy
able arcade game. It's a real challenge to get those robots back from the pirates.
The landscape is colorful and detailed and the sounds in the game phenomenal, so turn off the lights and turn up the vol ume. There are all kinds of enemy ships to fight, so start remembering them from the first time you see them. COMMODORE MAGAZINE
35
Street Sports Football
Software Shorts/A New Beginning school and are ready to take on the world. Galactic Conqueror **** Titus 20432 Corsico Street Chatsworth, CA 91311 Amiga: $44.95 Titus' games get better with each re lease. Galactic Coiujueror is no exception. All of the other Titus games required joy stick skill and some aiming expertise. Ga lactic Conqueror requires one additional element that makes it so good—strategy. In the center of the galaxy is the planet Gallion, the headquarters of the stellar league for the protection of mankind. Sur veillance units have noticed a small inva sion in a remote corner of the galaxy. It is your job to make sure that the invasion is stopped. You do this by choosing planets to liberate, after which they can help you destroy the enemy. The strategy lies in the choices you make. The fighting seg ments of the game are fast and furious. As with all other Titus games, the graphics and sounds are excellent. You'll find your self speeding along in outer space shoot ing at enemy ships and trying to save dif ferent planets. The manual is well written and in cludes pictures of all the major elements in the game (ships, meteors, planets, etc.). There are also examples of sticky strate gic situations in the manual and sugges tions for possible moves you can make. There are over 416 planets for you to Be careful, because the enemy planes snapped, study the offensive formation are just as well prepared as you. To really get you ready, you will have to dogfight with other students in the Naval Fighter Weapons School. This practice is exactly what you need to survive in real combat missions. I have also found that-F-14 Tomcat is a very addictive game. 1 keep on going back to the game every now and then when I want a challenge. The graph ics are really clear and they make you feel as if you're in the pilot's seat. The action is fast, and the manual gives you all the de tails you need to know about the plane and performing aerial maneuvers. Plus, you have Admiral Hawk from the school chewing you out when you get too big for your britches! Time and Magik ***V-i Datasoft 19808 Nordhoff Place That is why it was so nice to see Time and Magik arrive in the mail. Time and Ma plot and can be played without any knowl edge of the previous partts), even though the same plot carries throughout all three. Menlo Park, CA 94025 Commodore 64:$39.95 Did the movie Top Gun make you want
to be a navy pilot? Well, now is your chance to try out in the latest flight simu lation game from Activision. F-14 Tomcat is more than just a flight simulator. The game puts you in the seat of one of a num ber of planes in one of 80 randomly as
signed missions in five theaters of action: the Persian Gulf, Central America, Libya, Korea and Lebanon. The subtitle aCF-14 Tbnuiat is "The Nuval Fighter Weapons
School Simulation." Once again, the game is more than just a flight simulator or combat flight mission game. You really feel as if you have gone through this 36
JULY 1989
In "Lords of Time," you must travel through time to stop the Timelord's at tempts to alter eternity. In "Red Moon," you recover the Red Moon Crystal, the last source of magik after the destruction of the Lords of Time. Finally, in "The Price of Magik," you must recover the Red Moon Crystal from a madman in an old house who is using monsters to protect it.
There is so much to do in these games that it may take months to finish all three parts—certainly worth your money. The graphics are excellent and the parser is pretty good, so don't expect too many prob lems. The biggest factor in Time and Magik's favor (next to the great plot and many pu2zles) is the inclusion of a clue
book with the game If you put all this together, you realize that you're getting a bargain.
the game. This setting applies only to the offense. Curiously, it does not affect how well the teams perform, but rather how much control each player has over his or her team.
On novice-level offense, players begin by controlling the quarterback. Fade back, keeping in mind the defeasive rush count, and allow the receivers to run their patterns. Holding the joystick in the rela
plete. Advanced-level offense allows you to se
species in the computer gaming world.
The three parts of Time and Magik are 'lords of Time," "Red Moon" and "The Price of Magik." Each has an interesting
3885 Bohannon Drive
the ball carrier into an obstacle and watch for fumbles. A sack in the end zone results in a two-point safety. Two levels of play-
transferred only alter the pass is com
the alien invasion. The Thunder Cloud H is easy to handle, and you can expect to work hard to stay alive in this ship. In any
F-14 Tomcat **** Acti vision
time, go for the interception or rush the quarterback for a sack. If you're in the wrong place, quickly switch control to the player nearest the ball. Attempt to drive
the button to pass. Joystick control is
Commodore 64: $29.95/Amiga:$39.95 Text adventures are becoming a rare
liberate in order to save the world from
in Galactic Frontier.
and try to guess how the play will unfold. If you're in the right place at the right
Chatsworth, CA 91311
gik is a three-part text-and-graphics ad venture that really tests your problemsolving abilities and intelligence. Each of the three parts of Time and Magik is an adventure unto itself. The only way for you to appreciate these games is to try them out yourself.
case, the strategy and action combine well
Continued from page 18
g
lect which player to control before hiking the ball. If you select quarterback, play proceeds as described above. If you choose one of the two receivers, you control that player's pass pattern. Press the fire button to signal the quarterback to pass the ball to you.
Although this is primarily a passing
game, players can also run, but with less chance for success. Quarterbacks may break the line of scrimmage, but prepare
to draw a crowd. One type of play unique to this game allows lateral passing. Dur
ing play execution, this means the quar terback can lateral the ball back to a re ceiver and run down field as an eligible re
ceiver. Likewise, runners about to be tack led can lateral back to a teammate for
extra yardage. What seems like a small detail adds extra kick to the game. The otherwise excellent instruction manual falters a bit when explaining how
to keep your play selection secret during two-player games. The manual goes into some complicated nonsense about making false joystick movements to confuse your opponent. Forget it—youll only confuse yourself. The only way possible is to have
the other player turn their head. Simple, but effective. I consider myself a diehard computer
football fanatic, and I like Street Sports Football a lot. It doesn't pretend to play by official rules, but in backyard sports, non conformity is the name of the game. Q|
ESTABLISHED COMMODORE
1968
7 89
Retail Outlet: Perm Station, Main Concourse
OUTSIDE USA....CALL
(718)692-0071
(Beneath Madison Square Garden) NYC, N.Y. 10001 Store Hrs: Mon-Thurs 8:30-8/Frl 8:30-6/Sat-CLOSED/Sun 9:30-7
Call Mon-Fn: 9:30-4:30 (718)692-1148
1-800-759-6565
OR WRITE TO: Montgomory Grant
Maiforder Dept.
FAX NO. 7186923372
TELEX 422132 MGRANT
commodore
commodore
commodore
PRINTERS
DISKDRIVES 1541-11
MPS-1000
$15995 PRINTER$169
1ST, $239 95 i»i$17995
NEWC-128Dm{h Built-in Disk Drive
M09
MPS-12SD
PRINTER
$219 ■■ wmmm commodore commodore COMPLETE C0L0R PACKAGE C= 128- D pACKAGE Com modofe C -64 C Computer Commodore CMC Compute! Commodore 1S41C Di* Driva Commodore IBJ1C DsX Onvo Com matoe Color Pflnw Commodore Color Primer ■ Com modo™ 1802 Color RGB Monflor ■ O128-0 Computer wf&jltHri Disk Drrve * CommodoreColorPrwar ■ Commodore Cotor Pnnlsr S629 ■ 12"Monfloi$469
$349$459
DELUXE PACKAGE ■ C-12eOCorrpirt8rw/Buil-loDsK Drive
COMPLETEPACKAGE
Geos Software Program
GsosSotnrate
commodorei
commodore
CommodoreiaSDwiCiiS SCCO
COLOR MONITOR
DOB
We Can Reconfigure Any of Our Computer Packages To Your Specifications.
Call for Information. '
PERIPHERALS xpansion Module
$114.35 XaieeSuperGraptaJr. 5S9.95 XBiecSuperGrapfiaSr. XelecSuparGrapliLiGokl Ms 95 579 95 C64/C64-C Power Supply.$29 95
C1660 Modem.ti9.95 C1G70 Modem {56.95
C-1350 Mouse 126.95 C-1351 Moum J34.95
PRINTER c o
EPSON
FX-E50 . LO-500... LX-BOO..
PRINTERS
^
...S339.95 /LZ~~
NX-1000 .. S1B995
...SI 73.95 ^"^5; Panasonic
KXP-4450 LASER
^^?
IBM XT COMPATIBLE
CALL
COMMODORE COLT Computer
CITIZEN PRINTERS
MSP-15E....S329 95 J2B9.95 HSP-40
%im |
..S15995 KXP-1180. S181 35 S3O995 KXP-1191. .1239.95 1092 1313 95 KXP-1124 CALL
MSP-45 MSP-50
HEWLETT HP LASER JET II
10SQNI..
P2200...
NX-1000C RAINBOW
RAINBOW. S3I9 95
^S^JTr^
4.77-7.1BMHt 2 Floppy Drives 12" Hnfi Resokitton MonoMorttor MS DOS
349 95
PACKARD $1629 95$599
1239.95 $349 95 Commodore Colt wttOMS COLOR MONITOR PR-3000A DAISY WHEEL PRINTER IBM XT CQMPA TIBLE PKG. ■51SKRAM 20MB HARD DRIVES FOR: C-64C ■:■.•■•: :.-!om.-; S799I |C-64,C,C-128 IC-128D Commodore 1034SRGB$07095
commodorecOLORMONiTOR
AMIGA
COLOR MONITOR
iif
l
r
■ Serial & Parallel ■Ports Keyboard
tL I <J
CommodoralBOS
commodore
$1199 AMIGA 500 ■ 360K Floppy Drive MONITORS 128/128D$849 40MB HARD DRIVES FOR:
$829 COMMODORE PC10-1 LETTERQUflLITY QSPECIALJ) .monitor;; | included ' GWBiu$139.95
OKIDATA-180 OKIDATA-320
.$339.95 HOK 369 95 ee,^::_i:, WECARRY ALL MAJOR BRAND SOFTWARE COLTPACKAGE HX-2I0O.. NX-10COC..SI69.S5 NX-1000 ,...S299 95CS-^ commodore$-j 3995
■GWBasi:
lAMIGA 2000
commodore PC-10
AMIGA 2500 ALL AMIGA ACCESSORIES & PERIPHERALS
S1699
IN STOCK-CALL FOR PRICES
Ciiiir.'jciiftk 9irkCiw:i.'-'oncyOrd«is, t*.iu?iciriS,Vm, Amci. Dncr'sCiutCsttpB'sndw.CO Oijudacppcica P 0 'saceepwd.
Noadtfilienii vjrchaigc lot ctcdil uid otdeis. Non remIied thetVs mustwaa 4 6 wc«Vsf01 dc*rantc. Piimu Ada £■. jhip^mr) & nindi.rq
Uipimijmahipping4hjndlLpgch3igcisS6D& APOFI10adarra&c5aCdl&LB)oryiipfHrnianrlhandling AIIAPO FPOarcshipped Inslclj^ niirurrDWi^c mi ah
Crtn ncT All C
nUoM OtHvlljt AVHILhDLC-I^HLL I"UH UC I M1L3
pnociiyapr Ui jcudpnuadaapDiJcablosjrcBtiK PiiuisLj&^ciiocturigcwitiQuinoiic? NolrespcmiBlelorlYpMiapnitaleuo's Hoturn ldlli
l
h
b
l
b
d IBMCCt Al
Welcome to My World Explore the inner workings of the
service with network pro Bob Baker.
by Robert W. Baker
input buffer at the bottom of your screen. This text is transmitted to everyone in the same area of PC when you press your RE
TURN key. If you make a mistake, you
more just than a "party line" or a place to meet other users. PC is also your gateway to playing interactive online games or to
attending special events in the audito rium. Plus you can create your own "rooms" for get-togethers with friends, meetings for clubs or organizations, and more. It's all just a few keystrokes away! When you first enter People Connection you usually wind up in the Lobby. This is
the central hub of People Connection, and everyone enters through this "room" be
fore selecting their final destination. Keep in mind that there may be several Lobbies that are automatically created, since each room or lobby can hold only 22 people.
You can easily determine where you are by looking at the room name displayed at the top of your screen whenever you enter a room. Occasionally, there might be an extra letter or number displayed after the word "Lobby" if you wound up in one of
the alternate lobbies when the main lobby is full. If you entered PC and expected to meet someone in the Lobby, be sure to check the room name to see where you landed. If you're in a different room, then you can use E-Mail or online messages to contact the other users and pick a new meeting
place. The best idea is to create your own room and let everyone else know where to go. The lobby is usually just too busy to have any sort of conversation with some one anyway.
Always remember that you can press
F7 anywhere in People Connection to ac cess the menu to move to various rooms, see who's in a room, identify a user, send mail, move to another area of Q-Link or
leave PC, etc. Also, you'll see a list of user names displayed at the top of your screen along with the current room name, indi cating where you are and who else is in the room with you. When you're in the Lobby, or any of the public or private rooms, whatever you type on your keyboard is entered into the 38
JULY 1989
are actually points or coupons that you can save and accumulate, or cash them in for all sorts of things. All you have to do is
can press the CLR key to erase the cur rent contents of the input buffer—but only
be in the auditorium when they pick the
before you press the RETURN key.
like going to any other room, but the sys
As you type, the text scrolls to the left in your input buffer to allow entering a
The People Connection is one of QLink's most active areas. It's much
scriptions and more. Some of the prizes
reasonable size message. If you need to, you can use the cursor left or use the HOME key to go back and edit earlier text. The INSert and DELete keys work as expected, or you can simply retype the text and overwrite the original contents. However, once you press the RETURN
key it's too late to make any changes; there's nothing you can do with the text you just entered. As I mentioned, the input buffer scrolls to allow entering longer text than can fit in the single-line input buffer. However, each line of text that's displayed in the room or lobby is typically shorter than your actual input buffer. So, the text is automatically wrapped on word breaks by the system and may in fact take up sever al lines on your screen when it's displayed. This is sometimes used to create very fan cy and interesting graphics online. In fact, there are a number of users who spend a lot of time experimenting with this to see
what they can create. If you're interested, there are several text files available on line that describe this unusual art form and how it's created.
There have been a number of new on line games added over the past months,
winner! Entering the auditorium is just
tem is slightly different once you're inside. Each auditorium event is hosted by one or more auditorium masters who control
the flow of events. You'll see the names of the auditorium masters displayed at the top of your screen instead of the names of other users in the auditorium. To find out who is in the auditorium, you'd have to leave the auditorium and use the menu options that let you see who is in a given
room. This will let you see who is in the auditorium too. Whenever you enter the auditorium
you become a spectator and can normally only participate by the "Ask a Question" function available in the Auditorium
Menu. 'lb access the menu, simply press F7 and you should see the entry for ask ing questions and more. The auditorium masters can also invite users to come "on stage" and actually participate live. When this happens, any question you enter is
automatically displayed in the audito rium instead of going into the normal question queue. There may be many people asking questions at the same time, and the audi torium masters have to process the ques tions one at a time in the order they were
entered. They have to display a question
including Boxes and others that I've men
to read it, decide to post or discard the question, and then enter their response.
tioned in past columns. These are in addi
This process may take several minutes,
tion to the original games and the Rabbit Jack Casino that are all accessed through
especially if one of the auditorium mas ters has a slow input node to the system.
People Connection. Most of the games are
So try to be patient, it might just take a
designed for two or more players, but the
little while for your question to be handled in an active auditorium event. If you have
system can help locate an opponent for you if you need one. Just about all of the games feature graphics, sound effects and even a chat mode to talk with your oppo
nent while you play. If you want to play, give it a try and don't be bashful. And if you like competition, watch for announce
ments about online game tournaments and special games with all sorts of prizes.
Speaking of prizes, don't forget that there is almost always some sort of prize given at each auditorium event. If you at tend one of these events and stick around
long enough, you might just get picked for free plus time, software, magazine sub
to leave early, you may want to check the auditorium archives when they're avail able. You may just find that your question was eventually answered.
Besides the typical question-and-answer auditorium events, there are all sorts of forums, game shows, talent nights, talk shows and more. Be sure to check your is sue of the Q-Link Update magazine or the listings of coming events posted in the on line Customer Service area. You may get a chance to talk directly with the design engineers at Commodore, some of the softConlinufd on pane 86
TECHNOLOGY-
by Howard Millman
System Crackers Indicted for Espionage Three West Germans were arrested in what may become this decade's most serious case of computer espionage. Alleg edly paid hundreds of thousands of dollars by the KGB for their information, the three men used computers and modems from their homes in Hanover, West Ger many to access U.S. military computers
worldwide. Their success threatens to un dermine the effectiveness the U.S. espio nage network. First recruited by the KGB in 1985, the crackers gained access to the United States Department of Defense Optimus
military database, a NASA database as well as computers dedicated to nuclear weapons research in Los Alamos. Report
edly, the Soviet agents also received pass words and classified materials illegally downloaded from military and commer cial databases in West Germany, France, Switzerland, Britain and Japan—all by modem from computers located in West Germany. The trio smuggled disks containing the
classified data into East Berlin. There they met with two Soviet agents who re portedly paid them $3000 per disk. Ger hard Boeden, president of West Ger many's Federal Constitutional Protection Office and Chief of Domestic Counteres pionage said that existing computer sys tems are "not sufficiently" secured. He added, 'Tf current suspicions are con firmed, what we surely have is a new quality of espionage." Investigators in Bonn, West Germany believe there may be as many as eight other conspirators involved, more arrests and indictments are expected. Truth Stranger Than Fiction The crackers' activities were first spot ted by an alert 30-year-old Cambridge, Massachusetts astronomer. Clifford Stoll noticed a seventy-five cent discrepancy in his online access account at Lawrence- Berkeley Labs. 'Tf it had been$1000 off, I wouldn't have thought anything of it, it's the little problems that are the most fasci-
nating," said Stoll. Intrigued, he investi gated and discovered the illegal system
tion, details of a nonexistent database called "SDI Net." Three months later,
access.
when a suspected KGB agent contacted
Randomly, over the next four months Stoll watched what the intruder typed in.
Stoll to verify the information, the FBI
The cracker, according to Stoll, was
moved in. His adventure isn't quite over yet^-
"searching for keywords like ICBM, SDI, Norad and nuclear." initially, the FBI discounted his warn ings. Stoll then planted fictitious informa
there's obviously more to tell. Before as tronomer Stoll turns his attention back to the stars he has contracted to write a book about his experiences. H
Win, Lose or Draw
The Write Stuff 128
Continued from page 23
Continued from page 24
excitement of the TV show. In fact, having real teams around the computer with team captains who do the typing adds a
corporating nearly every imaginable type
new level of excitement. Team members yelled answers and got into the same heated frenzy as they do when plajing for valuable cash prizes on the TV show.
Captains should be chosen based on
setting effect. Also available at minimal extra charge is "BB Talker 64," a "talking" version of "BB Writer 64" featuring SAM. (Soft ware Automatic Mouth). The program comes with over 30 nursery rhymes, fa bles, songs and fairy tales. SAM. is easily
their ability to type quickly. Team play is also interesting because everyone sees the drawn object a little differently. The drawn objects are excellent, but one play er may see the result before another.
controlled through a menu system or em bedded commands, enabling you to create
It's a Win
tridge that autoboots in seconds. Alter
disk, but I am sure that this program will
the term "personal software." Most people learn to use one and then find it difficult
I have a marketing idea for Hi Tech Ex pressions. They should start producing more puzzle disks now. There are plenty of puzzles on the second side of this two-sided become so popular that more will be need
audio text previews. Finally, Busy Bee offers a Quick Brown Box version of The Write Stuff 128. This is a 64K battery-backed CMOS RAM car nate versions boot the program from disk and use the cartridge's entire memory as a non-volatile text area.
Word processors give true meaning to
ed. Additional disks would lengthen the
to switch, even when the program has out
life-span of this very worthwhile program. I predict that Win, Lose or Draw will be
invites users of all levels to explore the
popular with many age groups. I tested it with children as well as adults, with the same resounding success and approval. This game is challenging and makes a
great survival kit to perk up parties.
grown its usefulness. The Write Stuff 128 possibilities and grow together. Its open-
ended architecture and extensive user support assure long, productive relation ships,
Q
g
*Also available for the Commodore 64. COMMODORE MAGAZINE
39
PROJECTS"
by John lovine
X-10 Power Line Interface
points are interpreted as the familiar bi nary 1 and binary 0, respectively. These
for the Commodore 64
binary signals are coded to build a 22-bit control sequence command.
and 128
True Complement
The house codes and the key codes fol low a procedure of true complement,
â– JJ egular readers of this column may re-
-E\jnember an appliance controller we
meaning that when a hit is transmitted it
built some time ago. The controller al
lowed one to power 120-volt standard household appliances or equipment with the user port. This controller has a few major inconveniences that didn't allow one to fully implement home power con trol. Mainly the power lines to the equip ment had to be coupled to the user port. This created the hassle of running power line wires through the computer's user port to the equipment. I don't imagine many people ran secondary power lines through their homes to control a few ap pliances. This project alleviates those problems. We will build and install an X-10 home control system. The X-10 control system uses the house wiring for both control power and signal transmission. A module connected from the computer into a wall socket forms the computer controller to
power line interface. At the other end of the system is a receiver module plugged into a wall socket that has the appli:ince
to be controlled plugged into it. The com
puter signals through the interface via the house wiring to the receiver module to turn the appliance on or off. A tremendous advantage to this system is that the receiver modules are available at a number of retail stores throughout the country. Radio Shack's Plug and Pow er and Sears' Home Control System are
both X-10-based systems packaged under different names, and both are compatible. These inexpensive modules cost approxi mately $12 each. Each receiver module can be assigned one of 256 discrete ad dress codes. This allows us to use 256 dis crete modules throughout the system. How the X-10 System Works The X-10 is a current carrier communi cation system. The transmitter impresses 120 kHz pulses onto the 60 Hz power line cycle that are received by the remote ap pliance modules. The controller for the transmitter—in this case the Commodore 64 or 128—codes the pulses to activate a particular module and control function. 40 JULY 1989 As stated earlier, one X-10 system can control up to 256 discrete receiver mod ules. Pulse transmission is sent right after zero crossing on the 60 Hz power line (see drawing). Zero crossing means what its name implies. It is when the 60 Hz sine wave that makes up the AC power line in your home crosses the 0 volt as shown in the drawing. The 120 kHz pulse must be sent within 200 usec of zero crossing and held for one millisecond. The reason the pulses are sent right after zero crossing is that this is the quietest moment on the power line, which helps reception of the signals at the receiver modules. The pulses and absences of pulses on the 60 Hz power line at zero crossing X-10 Codes All X-10 code sequences begin with a 4 bit Start Code: START CODE "1110" This is followed by a letter house code and key code. HOUSE CODES: KEY CODES: A 0110 1 B 1110 2 01100 11100 c ooio n ooioo D 1010 4 10100 E 0001 5 00010 F 1001 6 10010 G 0101 7 01010 H 1101 8 11010 1 0111 9 OHIO J 1111 10 11110 K 0011 U 00110 L 1011 12 10110 M 0000 13 00000 N 1000 14 10000 O 0100 15 01000 P 1100 Hi 11000 is followed by its inverse form at the next zero crossing. So a binary 1 is followed by its inverse form binary 0 at the next cross ing. This isn't as difficult as it may appear. Let's look at the house code for A that is equal to binary 0110. Using the true com plement described we expand the binary number to 0110 1001. Our basic program does this for us, but this information is im portant to understand how the system op erates. Code Transmission Transmission of the code follows this procedure: 1. Start Code 2. House Code 3. Number Code (Key Code) Repeat three steps above, wait three pow er cycles, then continue. 4. Start Code 5. House Code 6. Function Code (Key Codel Repeat three steps above, wait three pow er cycles, then continue, Points to remember: the start code is transmitted as seen, there is no true com pliment with the start code. The house and key codes are true compliment. Re peat each three-step code once, wait a minimum of three power cycles between the three-step codes transmission, hi addi tion, when using the bright or dim func tions, transmit the function section only once. Again our program handles all these conditions required by the X-10 system; I'm going over it so that you understand how the system operates. PL513 The PL513 power line interface module plugs into a wall socket and is connected On 00101 All Units Off 00001 to the user port via a standard telephone line. The modular plug at the end of the telephone line plugs into the PL513 mod ule. The other end of the telephone cord Off 00111 All Lights On 00011 that has spade lugs are soldered directly Dim 01001 Bright 01011 FUNCTION CODES: to the user port card connector (see sche matic). Before I soldered the wires to the Projects/X-10 Power Line Interface* Block 60 Hz Power Cycle U5ec deloy PL513 X-10 Power Line Interface Modular Telephone To PL513 Cor-iputer Plug Parts List PL513 Power Line Interface$14.00
$12.95 Card Connector Digi-Key (As Had Last! X-10 Applianre Module$ 4.95 $1195 X-10 Appliance Mvduks are mailable from Im ages, Ratlin Shack, Sears and a number of Mali ₏ outlets. X-10 Appliance module Radio Shack #61-2681 [mages Company Systen P.O. Box 313 Jamaica, NY 11418 Overview Qntos to Images wi<i$2.50 shipping and handling. NY state residents add 825% safes lax.
card connector I cut one ear off the spade lug (see photo).
The PL513 has a zero crossing detector and a 120 kHz signal generator. This makes interfacing our computer pretty easy. The machine-language (ML) portion
of the program listens to the line and out puts a one millisecond bit at zero crossing.
The coding is handled by the basic pro gram based on your responses, before call ing the ML program.
Program
You'll notice the basic program contains
only four house codes and four code num bers for a total operation of 16 discrete
modules. I did this to keep the overall size of the program short. I don't think anyone
will need to use 256 discrete modules right off the bat.
However, with a little analysis you will see that it is very easy to add additional house codes and numbers. The program adds the true complement to the binary codes, which simplifies your involvement
When you run the program, it queries you for the house code, unit number and function, then jumps to the ML program to initiate the function. Upon completion
the ring detector and phone line pickup
ML jumps back to the BASIC program. The house codes and unit numbers are ad
ceive messages and/or enable appliances remotely. That may be useful for things like turning on an air conditioner in the summer via the telephone before leaving work so your home will be comfortable on
justable on the front of the appliance con troller.
basic control of the X-10 system. You can modify the basic program to send various codes depending upon external events, like sensor input. This is similar to the automatic ventilation project we con
from last month's project and just use the decoder section in conjunction with the
answering machine. That way you can re
arrival. The X-10 system is still under develop ment. Although we have only dealt with
the basic 120V appliance receiver mod ules, X-10 also manufactures wall switchas, three-way switches, lamp modules, etc.
structed previously using the toxic gas
that are all compatible with our interface. Currently the X-10 Company is develop
sensor.
ing smart receiver modules that report
You may notice that the two PB lines off
back to the main controller their current
the user port we are using this month ait!
status (on-offl, and have a few additional
the two uncommitted lines left on the tele
functions. So wo can look forward to add
phone answer and DTMF decode project from last month. This enables you to merge these two projects to give you a re mote telephone home control system.
ing new types of modules to our X-10 sys
Also, if you currently have a telephone answering machine, you can eliminate
In an upcoming issue Fll write an X-10 interface for Amiga computers. H
tem in the future.
Amiga Interface
COMMODORE MAGAZINE
41
Projects/X-10 Power Line Interface-
15
REM
JOHN
IOVINE'BKKA
ROUTINE
20
FOR
A
25
:POKE I.A'FPAE CS=CS+A:NEXT'DGHG
X-10
30
IF
PROJECT'BJYM
1=4864
CSO15116
DATA
50
TO
THEN
PRINT"ERROR
IN
DATA
120
DATA
130
DATA
140
169,016,013,001,221,141,001,
150 160
DATA
170
DATA
221,096,173,001,221'BWPK
60
DATA
041,239,141,001,221,096,142,
163,019,162,197,20 2'BWQL
70
DATA
208,253,174,163,019,096,173,
001,221,041,032,240' BWNM
80
DATA
249,096,173,001,221,041,032,
180
208,249,096,189,164'BWON
90
DATA
046, 319, 032, 338, 019'BWXG ,076,083,019,162, 032 ,046 ,019 000 , 200, 192, 004, 240'BWFH ,240,009,032,030, DATA 234 ,192 ,005
019, 032, 038, 019, 076'BWLI ,224,004,240,009, DATA 104 ,019 ,232 038'BWVJ 032, 030, 019, 032,
STATEMENTS"' FHWK
DATA
232 ,096 ,234 ,234,162,000,160, 000 ,i332, 338 ,< 319, 224'BWDF 022 ,240 ,015 ,032,030,019,032,
110
019,240,015,032,000,019,032,
019 ,076 ,122 ,019,173,162,019,
208, 011, 169, 186, 141'BWFK
,162,019,076,076, 047 ,019 ,238 019, 169, 164, 141, 047'BWVL ,019,096,234, DATA 019 ,206 ,162 END 000' BCII
100
018,019,032,0 09,019"BWXO DATA
032,018,019,032,000,019,032,
018,019,032,009,019'BWAE
X-10 Control Program 6
78
IF(X<1 OR
X>6)
THEN
PRINT"ENTER
7
SA=5032:POKE 5027,0:POKE 5026,0 :POKE 56579,16:POKE 56577,0'FMEO POKE 5028,1:POKE 5029,1:POKE 5030,1
81 ON X GOSUB 140,141,142,143,144,
8
POKE
93 DS=A5+BS:E$=AS+C5:'EOWN 9 PRINT"[CLEAR,DOWN7]":PR I NT"ENTER :POKE :POKE 5031,0'ECWM 5050,1:POKE 5053,0'ECUN HOUSECODE FOR :PRINT'EDDT 12 5051,1:POKE X-10 5052,1 MODULE":PRINT PRINT" 1) = A[SPACE16]3) = CMIBATD 15 PRINT" 2) = = D'"BAXG 36 B[SPACE16]4) PRINT:PRINT:INPUT"ENTER NUMBER 1-4";X'DEDL 39 42 45 IF (X<1 OR X>4)THEN PRINT"ENTER NUMBERS 1-4 ONLY":GOTO 36'HJUU ON X GOSUB 100,101,102,103'CQRG PRINT"[CLEAR,D0WN7]" :PRINT"ENTER MODULE rPRINT'EDWO 48 51 54 PRINT" PRINT" 1) 2) = - NUMBER":PRINT 1[SPACE21]3) 2[SPACE21]4) PRINT:PRINT:INPUT"ENTER = = 3"'BAQN 4"'BAUH NUMBER 1-4";X'DEDL 57 IF (X<1 NUMBERS 60 ON 63 OR X>4) THEN PRINT"ENTER 1-4 ONLY":GOTO 54'HJUU X GOSUB 120,121,122,123'CQAG PRINT"[CLEAR,D0WN7]" :PRINT"ENTER :PRINT'EDUN FUNCTION":PRINT 66 PRINT"1) = ALL 4) = OFF'"BANP 69 PRINT"2) 72 75 42 LIGHTS OFF[SPACE3] = ALL LIGHTS ON[SPACE4] 5) = DIMM1BAIS PRINT"3) = ON[SPACE15] 6) = BRIGHT"'BACL PRINT:PRINT:INPUT"ENTER 1-6"JX'DEFO JULY 1989 NUMBERS 1-6 ONLY":GOTO 75'HJCX 145'CYWK 96 F$=D$:GOSUB 200:Y=Y+4:F$=E$:GOSUB 99 SYS 203'GVPT 4940:GOTO 3'CGAQ 100 A$="0110";RETURN :REM
HOUSE
CODES'DOUB
101 AS="1110":RETURN'CDPX 102 AS="0010":RETURN'CDNY
103
A$="1010":RETURN'CDOA 121 B$="11100":RETURN1CDPA
120 BS="01100":RETURN
122
:REM
NUMBER CODES'DPOD
B$="00100":RETURN'CDNB 123 BS="10100":RETURN'CDOC 140 CS="00001":RETURN :REM FUNCTION CODES'DRPG 141 C$="00011":RETURN'CDPC 142 C$="00101":RETURN'CDPD 143 C$="00111":RETURN'CDQE
144 CS="01001":RETURN'CDPF 145 CS="01011":RETURN'CDQG
200
Y=0'BCIW
203 206
FOR X=l TO 9'DDCB L$=MIDS(F$,X,1)'CKKF
209
IF LS="0"THEN :POKE
211
IF LS="1"THEN POKE :POKE
213
POKE
SA+Y,0:Y=Y+1
SA+Y,1'JRBP
SA+Y,1:Y=Y+1
SA+Y,0'JRCI
Y=Y+1:NEXT:RETURN'EFTD END
NUMBER
Fishing for the Death Angel with a Magic Candle News and opinion from a leading
explorer of those fantasy realms called adventure games.
What does a columnist do when he can't decide which game to mention in the name of the column? Put them all
in, as I did this month. (At least I had the good sense not to combine the reviews.) Since they're both graphic adventures, let's look at FISH and Police Quest II: The Vengeance first.
For the Commodore 64 and Amiga, FISH is from Magnetic Scrolls, who did ThePawn and Guild of Thieves. It's their strangest story yet, casting you in the role of an interdimensional secret agent who warps from one world to another to fight wacky terrorist groups like the Seven Deadly Fins. In the first scene, however, you find yourself in a fishbow!—and in the body of a fish! Due to job-related stress, the only way you can relax alter a mission is by warp ing into the body of a fish and floating around in the bowl. Not for long though, for your boss—Sir Playfair Panchax, who heads up the spy agency where you
work—soon informs you the Seven Dead ly Fins have launched another of their riotous rampages. Then three "warps" ap
pear in the bowl. Upon entering one,
tery world, which means you'll have to dredge up several more objects and con struct another device. Like Magnetic Scrolls' previous adventures, this one fea tures lots of clever and logical puzzles; hints are hidden in the text, not the pic tures. The graphics reflect a more contem porary style than those in other games from this outfit, but even so, FISH is more of an illustrated text adventure than a graphic game—there are just a few dozen pictures, so each one stays on screen through a number of moves to the new lo cations, If you're looking for laughs along with your logical puzzles, I suggest you go FlSHing soon. Each chunk of text and line of response from the parser is riddled with the bizarre sense of humor that has become Magnetic Scrolls' hallmark.
Amiga detectives can also "fish" for
clues in Police Quest II: The Vengeance, in which several important tips lie at the bottom of a lake and can only be recovered by scuba diving. The goal is to recapture Jesse Bains, who escaped the jail cell you
put him in at the end ofPolice Quest I (you did nail him in the game, didn't you?) Several aspects make the sequel superi or to the original. The arcade sequence, in
which you steered a little car around an aerial-view map of the town was replaced with an animated sequence that shows a
est, or the back of a British rock group's van. In each location you've got to solve several puzzles in order to obtain one part
first-person view through the car's wind shield—no more wrecking that little car and having to start over every two min
of a device. Fail to unravel the main rid
utes. Ifyou're one of those who would have
dle in time, and you'll be zapped right
groaned at the idea of playing yet another of the card games that have been a key part of so many Sierra adventures, you'll be relieved to hear the poker game from Police Quest I was replaced with an ani mated sequence in which you visit a firing range and practice adjusting the sights of your pistol until you're a crack shot. This skill proves crucial later in the game. It's also harder to solve than Police
will prefer this "back to square one" ap proach over being killed for making a mis take. After solving each warp's central puz
zle, you'll use the three items to build a device that opens a major warp to the world of Fish. Here you've got to foil those felonious Fins before they destroy this wa
from one "scene of the crime" to the next,
you'll use it to obtain fingerprints, get blood samples and make a plaster cast of a footprint—evidence that ultimately leads to Bains' apprehension, which takes you out of town this time.
Graphics and sound effects make even more of a splash than in the original, for Sierra's new development system presents the story with double the resolution and much better music and more authentic noises. Animated effects, such as smoke
from your partner's cigarette, lend an at mospheric touch to the tale. The parser has also been improved, if it's a contempo rary setting you seek for your next quest,
this is one of Sierra's best. (Gold Rush is also out for the Amiga,
Trolling for the Death Angel
you'll be warped into the body of another being (human, thankfully) in some faraway locale: a recording studio, a for
back to the bowl. I imagine most people
Quest I, which most gamers will appreci ate. Ibting your field investigation kit
but it employs the old game system and is best suited for those intrigued with the history of the Old West)
The Magic Candle: We Drip No Wax Before Its Time
The six-character rale-playing game held my interest much longer than many of the other RPG's whose designs were in fluenced by Ultima. It poses an original quest: to prevent the demon Dreax from
escaping a Magic Candle where it's been imprisoned for centuries. The Candle's guardians have disappeared, and since it was their magic that kept the Candle from burning down, it's only a matter of time before Dreax once again ravages the
fair land of Deruvia. Your choice of three difficulty settings determines how much time you get: 1,000 days with the easy set ting, 800 at intermediate level and 600 for difficult. Each move eats five seconds of game time, so count on at least 100 hours to finish it, even at the easy level.
It's a Commodore 64 program (no plans for an Amiga version) that blankets four
disk sides. The second game by Ali N. Continued on jutge 8!) COMMODORE MAGAZINE
43
COMPUTER DIRECT WE WON'T BE UNDERSOLD!*
Since 1979
EXPIRES 7/31/89
SUMMER SIZZLER SALE Super Commodore 64C System C64C Computer 1541-11 Disk Drive
$229.95$249.95
2Epyx
$39.90$14.95
Free Membership
$19.95 Free GEOS deskTOP Software Total Value With 1541-11$24.95
Disk Drive
$579.65 You get all the above for only Low Sizzler Price 5'/4 FLOPPY DISKS Lowest Price In The Country!! IF Purchased Separately...List$629.65
1 00% Certified • Lifetime Guarantee
Free Game
Clearance
C64C Computer Free Membership in QuantumLink!
Each
Double Sided
Qtyof25
$4.75 O(y of 25 wMdovds$5.25
Double Density Qtyof 100 w/sleevcs
IntUti Ok
Epfi Action Came!
$24.00 Limilof 250 FREE Epyx Game$19.95
1541-11 Disk Drive Includes One Epyx Aclion Game!!
129"
M^ | g List 52: S229.95
Low
Sizzler Price
■ BUY-WISE EXT. 800-289-9473 IXT. 14 Oulside Servica Area call 31 2-382-5058
174 1 4
This prinler stand is specifically designed for the home compute user. The
genuine oak finish is compatible with any decor.
A$19.95 Value!! low Sizzler Price Oak Printer Stand List$129.95
Low
95
Sizzler
Lisi $249.95 Price 59" We Love Our Customers COMPUTER DIRECT 22292 N. Pepper Rd. Borrington, IL 60010 BEST SERVICE IN THE USA • Free Technkal Aiiliianio • 90 Day Immediata Replatananl • Ixpertf In Customer Sntlifadlon • Hullafin Board Sorvkc PRICE IS NOT ENOUGH! IS Day Home Trial Free Catalogs • Fail, low Coil Delivery • No Credit Card Feat LOWEST PRICES EVER! No One Can Sell This Printer For Less 1 2OO Baud Migent 1 8O CPS Printer Pocket Modem • Kmi> on A/Cw Battery • Turmoil 'nffauioniatelly ■ I'liif," directly into [lit serial pun mi many compulen • OrvScri'cn mjilu UgbtS sh(m call prngres • RSKS Compatible • Ffee Siiiun1 Wiih SI'i ()i Oii-I.imlllllr • NLQ Selectable from From 2yr. Immediate Itejitacciiinit Hoi Addressable GntphJci • Freo OHU'iiil Ah liiir Cuidi- Electronli Panel Italics, Elite, Pica, Continued Centronics Parallel Pen •' Low Cosi Adapter! Available 8K Primer Buffer •' Includes Two Kihbnns Edition • Free Compiuervi! TOih Sl.i Of On •' Pressure Sensitive Controls line Time Our Low Sate Price Our Low Sale Price$1AA95
149
59
FREE CATALOG!!! With Thousands of Items In Stock
List $299.00 List$413.24
3O% Off
Over
Micro Disks
100% Certified • Lilerime Guarantee
rt
1/2 Off
60% clip rate mokes this the best deal in ihe country I
Double Sided
Deluxe Paper
Double Density
9 1/2x11 Tractor Feed 1100 Sheet Carton
Call For Your Free Catalog With
^^ ^^c
Everything You Neei For Commodore/Amiga
No Limit
Lots of 25O — 69 C
Lots of SO — 99 C VISA MASTERCARD
COD
or Home Office
$16.95 ea. RECE *^lf maKh v>j tv"**' |~ilriin i speci iti □ mmparabln pOym#nl rr*lhod. anj sqp"C=t:* sat* Uw Vviricofion pwf include shipping dvp^tt CtH Wfl -r^'^i I *r- ;>~*-irnjH ™ *"fa ;atf "0 you' All t*tkog<i or* nonnaltp iJirpped UPS Gio^rJ ! J3 ?5. llf-no-i ni'uW'T od<J4 5^ m'ci >c Wt ii"B "0"I P*1*1'" 'n *■* U S AVAHAfiiUTY SUBJta TO CHANGE WlTKXrT NOTKC Cj^oio p.«''3 P'fn A'n«u It-u. Co™ j PUMPING GEOS by Mark Jordan Spreading the GEOSpel Berkeley Softworks' series of GEOS-compatible products opens up a world of opportunity to Commodore users. Take some tips from Mark Jordan and soon you too will be Pumping GEOS. All non-GEOS users—Halt! I repeat, all non-GEOS users, halt. Do not try to escape from this page. You are sur rounded. (There one goes! BAM! Got'm.) It could be very dangerous for you to try to flee. Strange opening. Chances are, if you're reading this column, you are a GEOS user. So why start out with a melodramat ic attempt to arrest a bunch of people who may not even read this piece? Have I for gotten my true audience? No. I started out that way to get your at tention. Perhaps many of you don't realize the need to go to war for GEOS. It's time to put an icon on every screen, a mouse in every hand. Because the more people use GEOS, the more activity in the GEOS world. And where there is activity, there is money. And where there is money, there is commerce. And that all equals up to faster and better GEOS products. So it is in our own interest to proselytize, propagandize, convert, and, if need be, use physical force to get more people using GEOS. This article is dedicated to that end. I will share with you the fine art of brain washing people into using our favorite The graphics interface is based on a time-honored concept of human learning: the metaphor. A metaphor is nothing more than a comparison. All of us mere mortals try to understand new things in terms of things we already know. And most mere mortals know what a desktop looks like. We know what file folders are. We are quite familiar with wastebaskets. By turning the computer screen into a type of desktop, we users intuitively have some idea how to go about things. Say this to a non-GEOS fan and be pre pared for a sudden thrust from below: 'Tine, but I know my system, inside and out. I don't need any metaphors." Deflect it by pointing out to your oppo nent that he may not need one now, but he will someday. Point out that all new com puter systems are sporting some sort of graphics interface from the Amiga to the Mac to NeXT. Even MS DOS is attempt ing to join the fray. Be prepared for a second, quick under hand jab: "But I'm not changing systems. 1 will be buried with my 64 in the coffin graphics interface. First we will work from the defensive end, parrying every argu mentative thrust that a non-user might jab at us. Then we will go on the attack, next to me." A surprise move is useful here—agree slicing and dicing our victim into submis sion. For those faint of heart or weak of Reverso: nonchalantly ask him if he's ever stomach, be prepared: this could get bloody. Ready? Grab your saber and pay atten tion. First Attack: Who Needs a Graphics Interface, Anyway? This is the first thing most non-GEOS users will say to you. You need to know how to show them that they do. Start with an explanation of the theory behind the graphics interface. Here is that theory, as briefly as I can tell it: 46 JULY 1989 with Mm. Praise him for his loyalty. Then, while he's basking in glory, use the Grippo changed word processors. He will snort, caught off guard, yeah, he's changed and it ain't worth it. Now advance with El Sneak Commento: "Yeah, wouldn't it be nice if they all were based on some stan dard?" As he snorts again, use the Double Whammy to add, "Of course, if we wait on the competing software companies to es tablish the standard, it may never hap pen. What we need is a standard based on something that transcends capitalism." Then quietly, subtly add, "Like a meta phor." He will nod in agreement before he realizes you've drawn blood. Second Attack: It's Too Inconvenient At this point the non-GEOphyte will slip ink) the "It's Ux) much bother" line of attack. He'll usually start by saying, "Who wants to wait two minutes to boot GEOS up every time you turn the com puter on?" This is a tough move to defend against. None of us enjoys waiting for GEOS to boot up. It takes three quick, slick moves to thwart this one. First, we must employ the Kebab Strat egy (you know what kebabs are—meat skewered on a rod): we must let his saber spear not only GEOS but also all other software in the process. Do this by saying, "Yeah, I hate loading programs." Then deftly shift footing by reminding him of how bad it used to be hack in the days of loading with cassette tapes (most GEOS opponents have been around since the cas sette days). Finish the maneuver and turn the entire situation in your favor by re marking how Berkeley's quick disk rou tines are so effective. Don't expect, him to drop the inconve nience strategy yet. He will counter with a now-famous lament: "I hate taking my hands off the keyboard to pick up a mouse." Again, his shot is well-aimed: touch-typists (I'm one) hate, I mean HATE, lifting their fingers off the home row. Just typing numbers puts us in bad moods. But this blow can be met head on. We simply inform our opponent that he is be hind the times. Yes, in version 1.0 days there weren't many keyboard options. But no more. In version 2.0 all but two alpha betic keys used with the COMMODORE key do something (see Pumping GEOS document). "Well," he'll say, "what about drawing, you've got to use the mouse for that." A Continued on page 88 Pumping GEOS/Spreading the GEOSpel Little Known Facts About GEDS12S Version 2,0 By now I'm sure you've heard about version 2.0 of GEOS 128. You probably know about most of the new features that arc offered. But there arc a few little cxlras lhat come with the system lhat you may not know about. One of the nicest of these is the extra printer drivers lhat have been added: double-strike, quad-sirike and areducing driver are available for some printers. The double-strike and quad-strike drivers print darker and fill in the voids around dots. The improvement in printing quality is quite significant (though it does lake longer). The following printers are supported: ImagcWritcr, Epson FX-80, MPS-1200, C.lloh 8510, IBM 5152, Star NX-10, and Gemini There are only two reducing drivers so far: C. Itoh and Epson. However, Ihese arc two of ihe most common printer formals so many others will likely be able to use them. The C. Itoh driver reduces a page to 50% its original size while the Epson does a 66% reduction. Another little-known feature on 2.0 is the ability to select a group of files pointer to the first file Commodore key, click appear. Once you've with the mouse. To do so, move the icon you wish to select, hold down the and drag. A rubber-band rectangle will encompassed the files you want, click again. Finally, tons of keyboard shonculs have been added (see below) along with many other small conveniences that make using the system so much easier. The Adventures of Ted and Jed Desktop Shortcuts The manual and addendum for the 128 version 2.0 don'l list the keyboard shortcuts for the Desktop in alphabetical order so I'll do that for you. As always, the Commodore key must be held down with the shortcut key. (Shift) Switch dr. C to A M - Rename file (Ctrl) Copy files to dr. A N - Rename disk (Shift) Switch dr. C to B P (Ctrl) Copy files to dr. B Q --Fileinfo S D -Deletefile (Ctrl) Move files to border -Erasedisk F - Format disk Girl --Printfile Jordan - Add note pad page T ~ Delete notepad page U -Undodelete (Ctrl) Move border files G --View 1st file selected V - Validate disk H -- Duplicates file W - Select all files on disk I - Select input driver X -- Select all files on page J - (none) K -Copy disk Vou're just her type, R - Reset desktop C --Closedisk E — she'll o.;f gou. a 0 - Open disk B ~ Open disk drive B Stop ujoÂŤymg Ted L --(none) A - Open disk drive A Jed finds Y - Select all border file Z ~ Load current file Hacked and Ready to Pump The GEOS world is finally starting to be populated wilh This shareware product ($5.00 -- 7137 Snake Rd., Oakland CA 94611) will
hackers are hacking at last.
animate Photo Albums. I got a couple of impressive demos,
Here's a brief look at three
programs I've come across that have made my life a lot better. Quickview, by Bill Sharp (PO Box 7533, Waco TX Vol. 1.Num. 11
Album Animator, by Dennis Seitz.
programs from outside the parent company. In olher words,
76714). This application allows you to take a look al your Write files from the desktop.
It is very useful for seeing
one of a young lady taking a stroll.
You can set the
animation speed. Lots of potential fun in this one. Dump and Double-Dump, by Doug Fulls. These two
let you dump your screen to ihc printer. Used with the Paint
Drivers, you can convert your desklop into a geoPaint file.
documentation for new programs. Highly recommended.
Quite useful for illustrating articles about GEOS.
COMMODORE MAGAZINE
47
Tips & Tricks-
tions. The common use of CP/M allowed interchange of software
Continued from page II
BINARY 0000 0001 0010
0011 0100 0101 0110 0111
HEX 0
BINARY 1000
HEX
1 2
1001
9 A
8
3
1010 1011
4
1100
5
1101
6
1110
C D E
7
1111
F
When the IBM PC was introduced, it created a hardware standard for other computer makers to follow. Most of them switched from CP/M to MS DOS, a twin of the IBM's PC DOS. Commodore and Apple remained as exceptions, but Radio
B
Shack switched to MS DOS. With the CP/M disk that came with your 128, your computer can run under the CP/M operating system. When it does so, it
requires totally different commands for formatting disks, dis
Once you know these four-bit conversions, converting a longer
binary numeral is simple: just divide it into four-bit groups and write the hex equivalent for each group. Here are some complet
ed conversions; use this chapter's base conversion programs to prove that they are correct
A. W. Grym London, England
1000 0000 binary - 80 1000 0000 0001 binary - 801 00010010 11011100 binary = 12DC 1010 1010 1010 1010 binary = AAAA
between computers, although many hardware incompatibilities remained.
hex hex hex hex
Telling Numerals Apart: Since binary, hex and decimal numer als use many of the same symbols, it can be difficult to tell which base a numeral is expressed in. If you see the numeral 1000, for example, how do you know whether it's decimal, binary or hex? If it's decimal, it's one thou sand. If binary, it's eight. If it's hexadecimal, it's four thousand ninety-six. Those are very dissimilar numbers! When confusion like that is possible, it's good practice always to specify the base of the numeral in question. There are a half dozen widely used conventions for making the distinction, but only three are common in the Commodore world. First of all, the name of the base can be spelled out next to the numeral. "1010 binary" isn't likely to be confused with "1010 hex."
Second, the base can be specified in a subscript: 10102 is bina
ry, 1010i6 is hexadecimal and 101010 is decimal, without much
playing directories, loading programs and other similar oper ations. hi CP/M mode, you can run much of the CP/M applications software that was so popular before IBM standardization. Much of it is very good, and most of it is inexpensive or free.
Even if the applications software doesn't interest you, you can gain a lot by becoming familiar with CP/M. It has the look and
feel of MS DOS, so if you learn how to work with CP/M, much of your skill will transfer to the IBM world. It's a good idea to order the CP/M book and disk that are of fered in the 128 System Guide. For under $'20, you get a very complete manual and two useful utility disks. Without the man ual, it's next to impossible to puzzle out CP/M. There are many commercial books on CP/M as well. When looking at them, remember that your computer runs CP/M + version 3.0, which is quite different from earlier versions. LoutS F, Sander Pittsburgh, PA Locating CP/M Software: There's a huge amount of CP/M soft ware available, but it's often not easy to find. Here are two good sources: Poseidon Electronics, 103 Waverley Place, New York, NY 10011, (212) 777-9515. FOG, P.O. Box 3474, Daly City, CA 94015. Poseidon is a company, FOG is a user group. Stewart Terrier Alton, IL Changing CP/M Screen Width: When loading the CP/M+ sys spectively, and 1010 for decimal. tems disk, I occasionally forget to put the 4080-column switch in the proper position. A simple solution avoids having to reboot the system. Tb go into 80-column mode, just tvpe this at the A prompt: DEVICE CONOUT =80 COL If you wish to go the oth er way, use 40 COL instead. Herbert Nelson Chicago, IL Alton, IL CP/M Disk Swapping: You can easily use files on one disk to op chance for confusion. The subscripts are always in decimal. The final convention uses the symbols percent (%) to desig nate binary and dollar sign ($) to designate hex. The absence of a symbol designates decimal. In this convention, our examples would be written as %1010 and $1010 for binary and hex, re Stewart Terrier erate on files on another, even if you have only one drive. The What IS CP/M? The 128 has a sometimes mysterious mode called CP/M, about which we read very little. In CP/M mode, your computer behaves very much unlike a Commodore, and key is to use drive E, the so-called virtual drive. For example, if the DIR file is on the disk in drive A, you can very much like an IBM or clone. CP/M is an operating system or DIR E:[FULL] When you're prompted to insert the other disk (disk E), just insert it into your drive and press RETURN. group of programs that coordinates all the workings of your computer. In its normal mode, your 128 uses a built-in operating system designed specifically for the 128. The 128 operating system lets you do things like format disks, display directories, load pro grams and change colors. Since it's built into the computer, you seldom even notice it. CP/M is a totally different operating system that is loaded in from disk. In the early 1980's it was used by many manufactur ers; Commodore, Apple and Radio Shack were notable excep 48 JULY 1989 use it to examine another disk by entering Tom Malcom Mount Pleasant, IA Exiting CP/M Mode: You don't have to reset to return to 128 mode from CP/M mode. Just press CONTROL and the ENTER key on the keypad. Before your eyes, the computer will jump back to BASIC. James Frankland Belleviie, NE ATTENTION Tips & Tricks Joysticks for Southpaws: If you're left-handed, you know how hard it is to press the fire button on standard joysticks. By mak ing some wiring changes, you can put the button in a better po sition for your hand. Disassemble the joystick and see where the cable is connected to the printed circuit board. There will be six wires going to push-on connectors that are easily removed. Take note of their order on the board, which should be brawn, white, black, blue, green and orange. Pull off the connectors, then reinsert them in this order blue, brown, black, green, white, orange. (Notice that the orange and ALL COMMODORE 64/64C, COMMODORE 128/128D AND AMIGA OWNERS A complete self-tutoring BASIC programming course is available that starts with turning your computer on, to programming just about anything you want! This course is currently used in both High School and Adult Evening black wires don't move). Education classes and has also formed the basis of Reassemble your joystick, hold it with the fire button to your right, and attack your favorite game. Mary Lee Resnick after having taught the course several times, has put together one of the finest programming courses avail teacher literacy programs. Written by a teacher, who Butler, PA able today. This complete course of over 220 pages is now available for the COMMODORE 64/64C. Using Non-Commodore Joysticks: Many brands of joystick will 2000 computers. This course will take you step by step COMMODORE 128/128D and the AMIGA 500/1000/ work fine in your Commodore computer. The ones from the old Atari 2600, which nearly everybody in the world owned at one time, work perfectly. Coleco is another company whose once widely sold joysticks are compatible with your machine. You can often get used joysticks for pennies at flea markets and garage sales. The Terrier Twins Alton, IL through a discovery approach to programming and you can do it all in your leisure time! The lessons are filled with examples and easy to understand explanations as well as many programs for you to make up. At the end of each lesson is a test of the information presented. Furthermore, ALL answers are supplied to all the questions and programs, including the answers to the tests. Follow this course step by step, lesson by lesson, and turn yourself into a real programmer! You won't be disappointed! Joysticks and Keyboard Errors: If you leave your joystick plugged in when you're not running joystick software, you may get an unpleasant surprise. Depending on the port it's in, mov ing the joystick or pressing the button can make the computer think that you've pressed one of the keys on the keyboard. To prevent this happening at unanticipated moments, unplug your joystick whenever it's not being used. FOLLOW-UP - A 200 page dealing exclusively with sequential self- and relative files using a unique approach for those with very limited file programming experience. Set up your own personal and business records! AmigaDOS COURSE for all Amiga Owners - Take control Stewart Terrier Alton, IL COURSE learning courSB for each of the above named computers of your Amiga with our step by step, self- learning AmigaDOS course that addresses all Amiga- Plus/4 Machine Language Storage: Memory locations 16301771 were designed for speech software. Since the area is almost never used for that purpose, it's a good place to put short ma chine-language programs. It's protected and hidden from BA SIC, so you don't have to manipulate any zero-page pointers to protect it, and using it doesn't steal any memory from the BA SIC program area. Be careful not to go past location 1771, since the BASIC stack begins there. Michael Kaizubski Baltimore, MD DOS versions, including 1.3. Each course is only$21.95 plus $3.00 for ship ping and handling. We have been developing and selling Commodore courses for over 6 years now and if you do not think that we have the best selftutoring course you have yet come across, then just send the course back to us within 10 days of receipt for the FULL$24.95 refund. NAME:
CO
CODE:
I desire the BASIC programming course â–Ą
Schematic Diagrams: The Programmers Reference Guides for
the 64 and 128 contain schematic diagrams for their respective computers. You can use this information to narrow your search
for trouble. If you want even more thorough service data, it's available in the Computerfacts series of publications from Howard W. Sams. A Computerfacts folder includes schematics, troubleshooting tips, preliminary service checks, replacement parts cross refer ence lists and other similar information. Computerfacts are available for the 64,128, Plus/4, VIC-20,
Amiga 500 and their peripherals. They cost from S20-S40, deCoittinuetl fin page 96
FOLLOW-UP course on file handling^ AmigaDOSQ The computer that the course is needed for:
COMMODORE 64/64C D COMMODORE 128/128dD AMIGA 500 G AMIGA 1000 â–Ą AMIGA 2000 D For each desired course, send S24.95 cheque or money order {in the currency of your country) to:
Brantford Educational Services 222 Portage Road
P.O. Box 1327 Lewiston, New York 14092 Fax:
(519)758-27-13
6 Pioneer Place
or Brantford, Ontario N3R 7G7 Telex: 061-81260
COMMODORE MAGAZINE
49
The history of Activision reminds me of the month of March. The company came in like a lamb (in September 1979) and
has become a true lion in the industry. Parent company Mediagenic is now financially sound; they've posted eight quar ters of profitability after four years of losses. The company started as a video game developer and has beaten the odds and survived a rapidly changing home entertainment industry (and internal turmoil) that might have destroyed the average software developer. What is the secret of their success? Once upon a time ...
The Early Days 1979 to 1983 Larry Kaplan was one of the founders ofActivision Vkieo Games Division. He can give us an inside look at how the com
as video game designers at Atari. So naturally, we continued developing video games for the Atari 2600. Atari had the larg est market share for hardware systems at that time. Jermaine: How was the company name selected? Kaplan: Prior to choosing the name Activieion, several others were actually considered. Computervision sounded pretty good, but that title was already taken. The company was finally in
corporated under the name VSYNC, Inc., a hardware signal
term from the VCS (it stands for vertical sync). The founders wanted a name that reflected various forms of art, television, computers, games, etc. Jim Levy derived the name Activision
from a combination of action and vision. Jermaine: Tell me about the creation of the corporate logo. Kaplan: The first Activision logo, displayed on all the com-
'I
pany got off the ground. John Jermaine: What led to the founding of Activision? Larry Kaplan: hi the late 1970's, after Atari introduced their 2600 home video game system, the video game market
began building up speed. With
millions of hardware units and game cartridges sold, industry sales revenues for the year topped the $330 million level. Activision was founded to take advantage of this lucrative market. Activision was founded by four designers—Alan Miller, David Crane, Bob Whitehead and myself—and Jim Levy, president. The designers were all working at Atari Inc., on Video Computer System (VCS) 2600 games. We decided to form a company to make games for the VCS on our own, and through a mutual friend and lawyer, met Jim Levy, who was then a vice-president at GIvT (a cassette tape company in Sunnyvale, California). Over the summer of 1979, a business plan was written and submitted to a venture capital firm, Sutter Hill Ventures. The plan was approved in late Sep tember. All four designers left Atari at that time. We were a very close-knit group in those days. We ate lunch together almost every day. David and Alan lived at the same apartment complex and played a lot of tennis together, which is how they met in the first place. The four of us spent a lot of time at local video game arcades and movie theaters. Jermaine: Why was the focus on the Atari 2600? Kaplan: At the time Activision was founded, a great deal of ex citement was focused on the home video game market, which pony's original video game titles and some of the early com puter entertainment titles, is internally referred to as "the flying V" logo. One of the factors considered in its initial de sign was that it had to fit in a 32-pixel eight-line space on the bottom of all game screens. To accomplish this feat, the "T" and "V" in Activision were connected. In 1988, the flying V logo was reinstated and is now used for all computer entertain ment titles published by Activision Entertainment and all vid eo games published by Activision Video Games. Jermaine: Was your business originally a "back bedroom" op was beginning a rapid growth curve. Realizing that a large eration? market for multi-function home computer software was still several years away, Activision funded its long-range software plans by entering the growing video game industry. The com pany was founded by a group of programmers who had worked accomplished in David Crane's spare bedroom in his Sunny vale apartment. 50 JULY 1989 Kaplan: The first company operation—reverse engineering the VCS and building a software development system—was By the 1980 Winter Consumer Electronics Show—the first trade show attended by Activision—the company employed eight people. Later that year, the number had grown to 15. By The first line of products for the Atari 2600 was available for the 1980 holiday season. Once these games hit the market, calls from enthusiastic consumers began pouring in. One el 1983, we were over 400 strong. derly woman who had purchased Bridge called to ask us how Jermaine: Tell me about the early days at Activision. to insert the game cartridge into her system. Activision's con sumer relations representative asked if she had a VCS (mean Kaplan: Wo all worked long hours in a very hectic environ ment in order to do something no one else had ever done before ing a Video Compute]- System). She innocently responded, "No, I have an RCA!" Another customer called to say he was close to reaching one million points on Laser Blast Incidentally, when a player reaches one million points in the game, the points displayed on the screen become exclamation marks! He later admitted that when his pregnant wife told him it was time to go to the hospi (make third-party cartridges for the VCS). Employees played games for fun and created them for work. The kitchen was al ways full of doughnuts and candy, the favorite snacks of de signers. Everyone was always munching on something. By Christmas of 1980, the company was growing out of its 1,000-square-foot office space. Since there was no space to set up a Christmas tree, David Crane programmed one and dis- tal, he asked her to wait a few minutes because he was only a | few points away from his onemillion-point goal. At the height of the video game craze (mid 1983), Activi sion was receiving more than 10,000 pieces of fan mail per week. The company was also mailing approximately 400,000 newsletters to Activi sion customers around the world. Close to 50 original vid eo game titles have been pro CELEBRATES A MEMORABLE DECADE by John Jermaine ■.i played it on a television set. The TV was put on a chair outside one of the offices, and employee Christmas gifts were placed beneath the chair. During the early days, we also had our share of practical jokes. One year the vice-president of human resources became the victim of an April Fool's joke. Several employees moved his office furnishings into the men's bathroom. Then they dupli cated his office with other rumiture and even replaced his chil dren's pictures with photos of someone else's kids. Another time, some crafty individuals lined the floor of the finance controller's office with Dixie cups filled with water. On one of his birthdays, the marketing research manager (respon sible for sales forecasting) received a crystal ball that looked a lot like his IBM personal computer. His office was also decorat ed to look like a fortune teller's den. duced from 1980 to the present day. Activision sold several million cartridges from the time of the boom in the early 1980's, through the less popu lar mid-1980s, and again dur ing the current revival of the industry. I recently talked to Cliarlotte Taylor Sheet, a former Activi sion employee, about her tenure at Activision. Today Charlotte is public relations manager at Accolade, Inc. Jermaine: What do you re member about the "good old days" at Activision? Charlotte Taylor Skeel: The company became famous for throwing huge Consumer Elec tronics Show parties. Among the most memorable galas were the 1982 "Rumble in the Jungle," to promote the game Pitfall!, and the 1983 "Decathlon party" to promote, of course, the De cathlon game. Bruce Jenner, who provided the celebrity en dorsement for the program, made a special guest appearance. In 1983, we also held the infamous "Barnstorming Parade," to introduce the Barnstorming cartridge to the media. At 6:30 a.m. three busloads of press, trade, Activision employees and friends were taken to the street in front of the Las Vegas Con vention Center and presented with authentic Barnstorming jackets, flight scarves and old-fashioned pilots helmets. They were then greeted by a real bi-plane that taxied down Las Vegas Boulevard carrying none other than Steve Cartwright, Bamstorming's designer. Afterwards, the entire group was treated to a sunrise breakfast at the nearby Desert Inn. COMMODORE MAGAZINE 51 In 1982, Jim Levy rewarded his hard-working employees by taking the entire company (along with their spouses or "spouse equivalents") to the island of Maui for four days. It was there that the famed Beach Olympiad was held. The company was divided into teams named for tropical fruits, and events in cluded sand-castle building, canoe racing, hula hooping, and the lei pass. The gold medal went to the Kumquat team (and I was a member of that team!). Charlotte also recalled Activision's darkest day. Skeel: No one will ever forget the big layoff on November 10, 1983. As people carried boxes of personal items to their cars, they were met by local news cameras. One individual com mented to reporters, "There will never be another Activision." It was a very sad day because most of us thought of the com pany as sort of a modern-day Camelot, and here we were leav ing it for the last time. No one will remember that day better than Jim Levy, the president of Activision at the time. It was also his birthday. The Transitional Years: 1984 to 1987 Jermaine: Can you give me some information about Gamestar? Stagnitto: Activision acquired Gamestar in January of 1985. Scott Orr stayed on to head the group, while his people created a series of popular microcomputer sports games. They include: Star Rank Boxing I and //, GBA iho-on-Two Cliampionship Basketball, Star League Baseball, GFL Championship Foot ball, Pete Rose Pennant Fever and many others. Scott Orr and his team of experts are gone, but Gamestar continues to turn out quality sports entertainment software. The year 1984 saw the release o/'Ghostbusters, Activision's most popular computer game to date. Two years ago, David Crane (a founder ofActivision and tfie program's creator) and Dick Lekrberg (Activision's uice-president ofproduct acquisi tion at the time) told me how the project came together. Little did they know it was destined to become the best-selling Activi sion product of all time. Jermaine: Tell me about the development oWhostbusters. Dick Lehrberg: Ghostbusters appealed to us for several rea period of the company's history, as Loretta Stagnitto, director of sons. It was a very popular movie, the subject was original, and the basic story itself provided a number of interesting ele ments for David Crane to work with. Columbia Pictures aLo contributed a great deal to the project. They were very strict corporate communications, explains. .Icrmaine: In December of 1984, Activision computer games took on a new appearance. Why did this happen? Loretta Stagnitto: In terms of packaging, Activision computer worked closely with us throughout the entire project. Once the initial storyboards were completed, the rest of the approvals were fairly routine. There were no last-minute changes in our As the video game market faded into oblivion, Activision started on the path to become a major force in the microcom puter software industry. It wasn't all fun and games during that entertainment products took on a different look to help distin guish the computer games from the video games, thus the "al bum style" was adopted. In addition, original artwork or pho tography was used for package displays instead of generating artwork that resembled the game screens from the video games. Jermaine: Tell me more about what Activision was like during this period. Stagnitto: When Activision began publishing computer enter tainment titles, the strategy at the time (and prior to the di versification strategy that led to the acquisition of Gamester and Infocom in 1985 and 1986, respectively) was to create tru ly innovative games. Most of the subsequent titles featured state-of-the-art grapliics and sound, but they lacked depth of gameplay—an important element that can determine the suc cess or failure of a product. Games like Web Dimension, Alter Ego and Portal were truly innovative, but the consumer was more interested in action-oriented, strategy games, and/or fan tasy/role-playing titles. In other words, the programs weren't geared to the needs of the average user. Then the company spent a lot of money trying to convince everybody they wanted these types of programs, instead of publishing what the people really wanted. It was a very confusing time in lActivision's] history. Jermaine: Is it true that Accolade was founded by former members of the Activision team? Why did thoy leave the com when it came to approving our ideas for the program, but they game concept. David Crane: Ghostbusters was a strange project. At the time, I was in the process of creating an animated city-wide adven ture. The player would be able to drive a vehicle, use a map to plot his way and add equipment to the car to give it special ca pabilities. This program might have evolved into a James Bond-type game if Ghostbusters hadn't come along. Anyway, I had worked on this concept for several months when I took a night off to see Ghostbusters at a local movie the ater. I really enjoyed the film. A day later, I went to work and ran into one of the people from our acquisition group. He asked me if I'd be interested in doing a Ghostbusters computer game. I was truly interested in the project, but they wanted it to be completed by the end of August so the game could be released before Christmas. This was May of 1984, which gave me ap proximately ten weeks to develop the program. Normally I couldn't possibly program a game in that amount of time, but my new untitled creation could be adapted to fit the Ghostbusiers storyline, so I agreed to do the project. In the weeks that followed, I found myself attending several showings of Ghostbusters. Looking back, I wonder what (he people thought I was doing—there I was seriously studying the movie, taking notes and drawing diagrams. Later in the pro ject, Columbia (under strictest security) provided me a video tape of the film. They also sent a copy of the shooting script and hundreds of slides and stills from the movie. pany in the first place? Stagnitto: In 1984 Alan Miller and Bob Whitehead, successful software designers and co-founders of Activision, thought we should be working on other forms of entertainment software. These individuals finally broke away from the company and did their own thing at their own company. Accolade was found ed in December 1984, and their first product (Hardball!) was released in July of 1985. 52 JULY 1989 Activision has also produced other games based on popular movies. In 1986, Aliens (the movie) became the model for Aliens: The Computer Game. Steve Cartwright (the creator of programs like Hacker, Hacker II, and GeeBee Air Rally) devel oped this software classic, and here is how it was done. Jermaine: What led to the development of Aliens? Steve CartwriRht: Believe it or not, Activision owned the rights to A liens a year before the movie appeared in theaters. However, the in-house programmers, artists and game design around on the floor. These little devils are called "Face Hug- one afternoon, we all left the theater with the same idea: Aliens would be the perfect subject for a computer game. The this time. We had kept in close contact with Twentieth Cen tury Fox throughout the making of the program, so they knew ers knew nothing about that arrangement. After seeing Aliens gers." hi short, the owners of the license were concerned about legal technicalities, correct terminology and "good taste" at next day I brought up the idea and found out that Activision al! about the games and really liked the finished product. already owned the rights to that particular property. Not many people know that the company had an east coast design center. Back in 1982, Garry and Dan Kitchen, John Van Jermaine: Tfell me more about how the project began. Cartwright: We planned out the entire program in 15 minutes. Ryzin, Paul Willson and Kevin Kalkut started the east coast de creates each particular situation. Jermaine: How did you start out? It was just a matter of analyzing the movie, breaking it down into key scenes, and coming up with a game concept which re sign center (based in Glen Rock, New Jersey). I talked with Garry Kitchen to learn the secrets of this lost tribe ofActiuision. The games were designed to share a common quality. When you participate in an Aliens challenge, your fate is truly in Garry h il <â– ! in r We joined Activision because they needed de velopers with innovative ideas, and we wanted to keep busy. your own hands. Each game is a tough little assignment where experience is the best teacher. You can play to win or experi In 1980 my older brother Steve moved to the west coast and , started his own company, Woodsicle Design Associates. Wood- ment with different ideas, but you can't blame your failure on random events or bad luck. Those factors don't exist. Jermaine: Did Twentieth Century Fox ask you to make many changes in the final program? Cartwright: There were some minor changes alright, but noth ing we couldn't take care of right away. Twentieth Century Fox was very concerned about the fact that our transitional scenes contained direct quotes from the shooting script. I was led to believe that Activision might have to pay for the privilege of using that material in the program. Thank goodness our legal people investigated the situation and said everything was fine. Another problem concerned the fact that you couldn't say the aliens were killing people. They were actually capturing human beings for later use (which would be the cause of their death). We also had to use the correct terminology for every thing. You couldn't talk about a small alien creature crawling side did a lot of military contracting as well as designing games. Steve also knew a number of people at NASA. So he eventually contacted Activision and negotiated a deal to pro duce Space Shuttle: A Journey Into Space. Space Shuttle was more than just an arcade-style game because the product was designed in concert with NASA. It was an accurate simulation of a space shuttle mission, containing the orbital mathematics and physics of a real space flight. We still think its the best spaa* shuttle simulation ever done on any machine. Meanwhile, back in New Jersey, we started working on Atari video game projects. Keystone Kapers featured a littleman chasing crooks through a department store, while Pres sure Cooker simulated a chef cooking hamburgers in a fast food restaurant. These early games were humorous and a lot of fun to play, but the video game market was losing ground. So I started playing around with the Commodore 64. Continued on puge 71 COMMODORE MAGAZINE 53 ., - by Gary V. Fields f you could peek into the future you would see a world increasingly J dependent upon video productions. Video is perhaps the best communica tion tool yet developed. Video record ings can inform, inspire, instruct, sell a product or simply entertain the viewer. A full-featured video mixes real-life images, text displays, voices, sound ef fects and music, animated characters and three-dimensional images to con vey a message. But the exciting aspect of video productions is that one of die most powerful, professional tools used to create them today is already sitting than different screen displays (e.g., di gitized pictures or graphics created on a paint program) which are then auto matically loaded into the computer's memory and are flipped to the screen like an electronic slide show. At the next level, transitional wipes (to make the changes between images interesting) and text are added be tween and over images—text begins to move, rotate, flash. Next come animat- ed characters, sound effects, scrolling backgrounds. Eventually three-dimen sional images could be added which would appear to spin and move inside a on your desk—your Amiga. perfectly proportioned, computer-gen Getting Started out exaggerating, that a talented indi Have you ever watched the computer- erated world. At the ultimate level of production, generated special effects on TV and thought how great it would be to be to videos include text, real-time anima tion and three-dimensional images create them yourself? Have you ever mixed with real-life images captured aspired to being an animation artist with a video camera enhanced with like Walt Disney? Or maybe you just music, voice-over or sound effects and wanted to add a professional flair to your home videos by adding titles and stored on videotapes (VHS or Beta). At this professional level, the results are credits. If you have any video aspira "broadcast quality"—like those you see tions, read on. on any network- It is fair to say, with Let's begin with an overview of how the Amiga enhances "video produc tion." I use quotes because when used with the Amiga, the term video pro g! duction covers a lot of territory. At the entry level, videos can simply mean electronically-created and stored slide shows—images are stored on disk and require a computer (not a VCR) to show. At this level an Amiga-generated video might consist of nothing more ';.-■■ vidual with an Amiga, genlock, cam corder, a couple thousand dollar's worth of video equipment and some time could tape, edit and create a fulllength video movie, complete with ti tles, credits and soundtracks. And if done with skill, a viewer would not be able to distinguish the Amiga-aided video from those created in Hollywood. Why Video Production? In the past 20 years, video record- ings have all but replaced the use of film for capturing and displaying mo tion. Most of us have become so accus tomed to video programs which feature mercials, weddings, in-house training tapes, promotion, etc. John owns Cap tain Video in Candler, North Carolina, and Bruce is the proprietor of Focal special effects and realistic animation Point Productions, AsheviUe, North that it is hard to believe my 15-yearold dictionary doesn't even include the word video. So let's define video as it re lates to image production using the Carolina. John and Bruce live a few miles Amiga. For this article, video will refer to any recordable image which can be displayed on a monitor, and video pro duction will include any process used to design and control screen images. Video production is not for everyone, but if you have the urge, the talent and from each other and first met at an Amiga users group meeting. Chandley came to the meeting to learn more about the system he was using, and In man came to investigate the computer he had heard could solve many of his video needs. While they entered the video field with different backgrounds, their ini Video production is not for everyone, tial reason for turning to the Amiga was identical—they both needed a character generator. One of the most but if you have the broadcast-quality videos required a studio filled with equipment costing difficult and yet elementary chores to tackle before you can turn out profes some cash, you hundreds of thousands of dollars. A very limited, entry-lovcl character gen erator alone (required to display text on a TV) was priced in the thousands of sional videos is creating broadcasts some cash, you couldn't have picked a better time to begin than now. Until the introduction of the Amiga, creating dollars. But with the Amiga and some reasonably-priced video hardware (camcorders, recorders, genlocks, etc.), you can set up your own video produc tion studio capable of creating incomegenerating, broadcast-quality, movies and clips. Entering Video Before you are scared off by the men tion of expensive-sounding hardware add-ons, keep in mind that you can be gin to experiment with video produc quality text on the screen. Since both men owned MS-DOS compatibles, they naturally investigated the possibilities of using them as character generators. They quickly abandoned that avenue urge, the talent and couldn't have picked a better time to begin than now. when they learned that upgrading a PC compatible to serve as even a limit ed character generator would cost around$3000. Inman flirted with the
idea of buying an entry-level dedicated character generator, but the one that fit his budget offered only four fonts
and could perform only a restricted number of wipes and dissolves. In the
tions with nothing more than an Amiga and one animation program, hi fact, if you aren't sure of your interest in video production, by all means play
W
around with your present setup before going into hock for more hardware.
Once you've seen the potential of create ing videos on your own desktop, don't be surprised if you want to go further. Putting Their Talents to the Test John Inman and Bruce Chandley were both operating successful video production studios before they bought an Amiga. Both were taping, editing and selling videos for cable TV com
Bruce Chandley, using Deluxe Paint II and Kara Fonts builds a screen (or cable TV use.
end, both solved their character-gen
eration problems with an Amiga 500, Pro Video Plus software and a Super-
Gen genlock. During separate interviews I asked Bruce and John to suggest configura
tions for both a entry- and professionallevel video setup. Both described near
ly identical systems. Personal Production Here's what our experts say a user
would need to begin producing videos.
Once you've seen
the potential of creating videos on your own desktop, don't be surprised if you want to go
further.
Remember, even with this bare-bones setup you can create professional-look ing videos, complete with recorded im ages, animated cartoons, scrolling text, etc.
IT you don't already own one you'll need to invest in a camcorder (about
$1000) for taping live video; a good line consumer video deck with flying erase head ($750 plus) for recording
mixed signals from the camcorder and computer, a genlock device (150 plus) for mixing RGB and NTSC images; an Amiga 500 with at least one megabyte of RAM, monitor and external drive; and an NTSC {National Television System Committee, or in other words—a television set) monitor for displaying the edited video. If you own a Commodore 1084S monitor, you can postpone buying an NTSC monitor if you don't mind constantly switching between its RGB and NTSC signals. (Any Commodore 64-compatible moniâ– tor would also fit this description.) Once you have all the hardware on hand, alt you'll need to begin produc ing is some software. When asked which software packages the beginner should buy, both Bruce and John named Electronic Arts' DeluxePaint II as their choice for creating graphics. They suggested TV*TEXT from Brown Wagh as the entry-level titling program (character generator) for first-time users (primarily because of its price). To complete the beginner's setup they felt you should have at least one animation tool. Their person al choices were Microlllusions' Cel Animator, Broderbund's Fantavision or Mindware's PageFlipper. Pro Production As you might expect, when describ ing a professional setup, the tools they named were also the tools they use. To create broadcast-quality videos, John and Bruce felt the user should own two good camcorders, two video editing decks (with shuttle controls for quick scanning), an Amiga equipped with at least one megabyte and a hard drive, a good NTSC monitor and a top-line genlock device (they both use Digital Creations' SuperGen). To complete their setup both turned to Digi-View by NewTek, for a simple way to cap ture company logos and still photos to be added to live video. In addition to the programs men tioned in the entry-level setup, John and Bruce recommend rounding out a professional setup with a professional titling program (they use Shereff Sys tems' Pro Video Plus), as many good fonts as you can get your hands on, and any 3D animation program you can handle. In discussing sculpt (3D) software, both fellows agree on two points: (1) Well-sculpted and animated images add greatly to a video's viewing appeal, but (21 mastering a sculpt pro gram is not easily done. How it's Done Here is an overview of how John and John Inman, owner and operator of Captain Video uses Pro Video Plus to fine-tune a screen for a client. Bruce create complete videos. After Cantinuedonpage 15 - . .' . J I reducing successful videos re quires the right mixture of talent, energy and tools. lile you can suppiy the taient and energy yourself, you'll have to buy the tools. Because of the volume, there is not enough room in an entire issue, much less a single article, to properly review all the exciting video software programs and hardware devices avail TV-Show able. We'll talk about the most com mon software tools and follow up with a complete listing of Amiga video soft ware and hardware. For more informa (6 MMW ÂĽOU tion on a specific product, contact the manufacturer. For the most part, the software used to enhance or create videos fits into three categories: titling software (for displaying words and logos), animation (for creating moving images like those you see in cartoons and during TV news productions) and three-dimensional images (where realistic 3D objects or text are displayed and animated). If you simply need a character gen erator for your video productions there are titling programs designed just for that purpose. If you want to create real-time animations which rival Walt Disney's best, there are several power ful programs already on the shelves ready to assist. Do you want full-color, animated 3D graphics? The Amiga and the proper sculpt tool will let you wow the competition. So, if you have been waiting for just the right software package to get seri ous about desktop video, your wait is over. In short, there is no shortage of Continued on paw 71 yjiiÂŤtti Calllgtapher 2.0 PROGRAMMING' by Robert J. Nedreski 1541 Disk Rescue m ■1 There are several conditions besides misalignment of the disk drive which will interfere with loading a disk. There are plenty of horror stories about disks that have "crashed," and the general be lief is that a dust particle has lodged on the surface of the disk or that the disk has been exposed to a magnetic field which has erased or altered part of the data. \ Figure 1 1 Figure 2 While these ideas may be correct in some cases, I have yet to find them true in most cases. If you have a valuable disk that has crashed (won't load), read on. I have found that there are two frequent causes—both rather easily remedied—when a disk will not load. Both of them result from a condi tion in which the disk doesn't rotate in its jacket. There is a third condition which pre vents loading a disk, also easily remedied, but in this case no disks will load. Using the methods described below, I have reclaimed six disks that I thought were lost. One of the disks had been acci dentally folded—actually putting a crease in the disk proper! Five of the disks had been recorded on both sides, although they were single-sided disks. I also sal vaged several programs from a disk that had "crashed" over two years ago, which had actually accumulated a coating of dust on the portion of the disk exposed through the slot in the jacket for the readwrite head. After removing this disk from its jacket, I carefully and lightly wiped off the dust with a piece of paper towel, before putting it into the "rescue" jacket. Disk Diagnosis hi the first case, a disk might have ap peared to "crash" because the spindle drive belt is slipping on the motor pulley. This condition is probably due to frequent occurrence of the second case, described in the next paragraph. Belt slippage re quires treatment only if you can't load any disks or only a few. If a new disk spins freely, the trouble is most probably in the other disks. In the second case, the disk is binding in its jacket so that it doesn't rotate freely. You can sometimes detect a disk with this fault by holding the jacket in one hand 58 JULY 1989 and trying to slide the disk back and forth in its jacket by inserting one or two fin gers in the spindle hole and pressing dust^-whether that dust comes from wear on the disk surface or from the environ ment lightly sidewise, as shown in Figure 1. It The third cause of disk failure results takes a little experience to detect this con from the read-write head in the disk drive dition unless the binding is really severe. I sticking on its guide rails. The remedy is suggest trying it with both a new disk and the suspected disk for a comparison. I'm not sure what causes a disk to bind in its cleaning and lubrication of the rails (as described in the June 1987 issue of Com modore Magazine.) jacket, but I strongly suspect that it is due to fine dust collecting in the jacket liner, especially since it seems to occur only with disks that have been in use for a couple of years. A disk with this problem can be res cued at the expense of a new disk—in ad dition to the disk to which it will be copied. Contrary to some published reports, the disk jackets don't have the same kind of low-friction liners that are used in tape cassettes. The disk liners seem to be a type of very porous tissue paper that is bonded to the inside of the jacket. Being highly porous, it's ideal for picking up Treatment To verify that a non-rotating disk or a sticking read-write head is the cause of your trouble, you'll have to partially disas semble your disk drive. [ Warning: This will mid your manufacturers warranty.] Handle it gently when you do, for some of the inner parts are rather delicate—al though they'll stand a surprising amount of mistreatment. Still, there's no use tak ing unnecessary chances. The only tools you'll need are a Number 2 Phillips screwdriver (it may look too big Programming/1541 Disk Rescue for the screws in the 1541, but it will work better than a Number 1) and either a pair of needle-nose pliers or—preferably—hemostatic forceps. The pliers or forceps are almost a necessity for getting some of the screws started in some of the tight places when you're re-assembling the drive. Start by disconnecting all cables from the 1541 to avoid any risk of electrical shock or damage to the computer. Next Now carefully lift the chassis out of the lower half of the case and turn it upside RUN and press RETURN. If the flywheel down. Be careful not to lift by any of the parts on the printed circuit board, or you might damage them. The fuse holder pro jecting out the back or the receptacles for the serial bus are good places to lift the back end. The bottom of the chassis will turn the disk drive upside-down, and un fasten the four screws located in the holes in the corners of the bottom of the case. Figure 7 You probably can't get the screws com pletely out until you turn the case right- rotates continually until you press "Q," there's no trouble with a slipping belt. If it doesn't rotate, or rotates jerkily, a possible remedy is given later in this article under side up again, so be careful not to lose any of them. When the case is upright, lift off the top cover. If your drive was made by Alps you'll see a shield with small perforations in Figure 5 part of its top surface. If your drive was made by Newtronics the shield will have the sub-head "Slipping Belt." If the fly wheel rotates, but the read-write head— the black object indicated by the arrow in Figure 6—doesn't move back and forth as the test progresses, your trouble is a sticky head carriage, and the rails need cleaning and lubrication. The remedy for this was large holes in most of its top surface. In ei ther case, remove the two screws holding the shield to the main chassis, located on the left side of the drive, as shown by the given in the June 1987 issue of Commo arrows in Figure 2. Now lift the shield off carefully—it's held on the right side only dore Magazine. If your drive is by New by two small projections on its inner sur face, which snap into holes in the side of shield to see the read-write head easily. If the flywheel rotates freely and the read-write head moves back and forth, stop the drive by pressing "Q," remove the test disk and insert the disk that won't load. Be sure to insert it with the label to the chassis. Next remove the three-pin plug shown by arrow 1 in Figure 3. Care fully note its position before removing it^- tronics, you'll probably have to remove the Figure fi the red wire goes toward the back of the drive on mine. Also, note the way the wires from this plug are arranged before removing it, so you can replace them prop erly at final re-assembly. Now replace the metal shield over the printed circuit board and fasten it with the two screws removed earlier. Next re move the six screws holding the chassis to look like either Figure 4 (Alps) or Figure 5 (Newtronics). The wheel visible through the opening in the chassis, shown by the arrow, is the spindle flywheel. Replace the serial bus cable from the computer and connect the power cable, ward what is normally the top of the drive. Now type RUN and press RETURN again. If the flywheel doesn't rotate freely, fbm on the disk drive, the computer and the monitor. Type in the following short program: 10 PRINT'STICKY DISK CHECK" 20 PRINT-PRESS Q TO QUIT' 30 OPEN 15,8,15:OPEN 3,8,3,"#" 40 PRINT#15,"M-W"CHR(180)
CHRSIOCHRSi 1 >CHRS< 0)
Figurei
the bottom of the case. Three of them are
visible in Figure 3, as shown by arrows 2. The other three are in similar positions on
50 PRINT #15,"Ul:"3;0;X;0 60 GET A$:IFA$ ="Q"THEN CLOSE 3:CLOSE 15:END 70 IF D=l THEN 100 80 PRINTTN ";:X=X + 1:IF X = 35 THEND=1
90 GOTO 50 100 PRINTOUT ";:X = X-1:IF X = 1 THEND-0
110 GOTO 50
the other side. You'll probably need the forceps to get the screws out after you loos en them, because the space between the case and the chassis is very narrow.
Stand the disk drive chassis on its right side, so you can observe both the top and bottom. Insert a new blank disk and type
FigureH
the belt is slipping because of a sticky disk. Press "Q" to stop the drive and re move the disk.
Rescuing the Disk For this you'll need a sharp knife and a couple of paper towels or facial tissues. Check them to be sure that they are lint-
free. Take a new disk and holding the jacket in one hand, press the disk toward the edge of the jacket which has the slot for the read-write head, so that is will be COMMODORE MAGAZINE
59
Programming/1541 Disk Rescue as far as possible from the edge where you will open the jacket. Hold the disk jacket on a hard surface with one hand and with the other, cut through the jacket near the edge with the label—the edge opposite the
slot for the read-write head, as shown in Figure 7. Don't try to cut through all three layers of the jacket at once—it's too easy
to make the knife slip and either cut your self, or damage the disk or the jacket. It's best just to score the jacket with the knife on the first cut and make repeated cuts, each a little deeper, using the score as a
sterile gauze pad—it doesn't need to be sterile, but that's the way they come. Un fold the gauze pad until it's about five
inches wide—or a little less—and some what longer, lake a diskette sleeve and fold the gauze over one of the short edges, fastening it in place with a couple of pieces
Insert the sleeve with the attached gauze into the empty old jacket, keeping it
do, don't use a steel straightedge to guide the knife—it might be magnetized, in
as it will go, and work it in and out a few times. Now withdraw the sleeve, turn it
which case it could ruin your disk irretrie vably. When the jacket is cut open, spread the cut edges apart, and holding the jacket in one hand, remove the disk from the jack
peating the steps above. The idea is to ex
the disk, as shown in Figure 8. Place the disk on another tissue and fold the tissue
over it to protect it until you put it back in the jacket, and put it in a sale place. CAUTION! Do not handle any disks with metal tweezers or forceps, unless you have tested the tool with a magnet to en sure that it is non-magnetic. Otherwise, you could ruin a program on the disk. Open the jacket of the sticking disk in the same manner, and transfer the disk to the new jacket. Be certain to have a writeprotect tab over the notch in the new jack et, so there's no chance of accidentally erasing part of the old disk before you
over and re-insert it, keeping it as close as possible to the other edge of the jacket, re pand the jacket slightly and to brush out any dust that may have collected in the liner. Withdraw the sleeve again and re place the old disk in the expanded jacket. Put it in your disk drive and try to load the directoiy or a program. You may be pleasantly surprised. If not, at least you have a copy on a new disk.
CAUTION! Don't seal the cut edge of the old jacket with any kind of tape after you re-insert the disk. Unless you are very
careful, the tape will pull the edges of the jacket together causing the disk to bind again.
Slipping Belt
have made a successful copy. Place it in
If you find in the test described earlier, that the flywheel doesn't rotate with a new disk in the drive, the disassembly
the disk drive and run the test program
must be carried a few steps further. You
again. If the disk rotates freely, go ahead and copy it to a new disk using one i>f the
will need a small amount of some type of solvent to clean the motor pulley, the fly wheel and the belt. I used a solder-flux re moval spray I had available, because it
copy programs which has been published
in recent years, unless it's a copy-protect ed disk. If it's a commercial, copy-protect ed disk, you'll have to use one of the pro grams intended for copying such disks.
The new jacket can be used to rescue
quite a number of old disks. I really don't
know how many, but as 1 stated at the be ginning, I have copied six disks this way, using the same jacket. It might be a good idea to put a special label, such as "First Aid Jacket" on the new jacket and save it in your disk file for future use. Some of the programs on the original disk may not copy successfully, but most of them should. When your copy is com plete, remove the disk from the drive. At this point, you may want to experiment to see if you can rehabilitate the old jacket. To do this, get a two-inch or three-inch 60
JULY 1989
The ones that are susceptible are usually stamped with the letters MOS, although some manufacturers use stylized letters
than the sleeve, keep the edge of the gauze aligned with the bottom of the sleeve.
as close as possible to one edge of the jack et. Press the sleeve into the jacket as far
et, using a tissue or paper towel to hold
charge from your fingers, unless you are using a properly grounded wrist strap.
of "magic" tape. If the gauze is narrower
guide. Make the cut about V1B of an inch
from the edge of the jacket. Whatever you
cuits and can be damaged by a static dis
didn't seem to injure the belt surface. You will need some cotton swabs and a pencil eraser. If you don't have the solvent suggested above—you can buy it at any electronics parts store—I suggest isopropyl dubbing) alcohol. Lighter fluid might work, but if the belt contains any kind of rubber, the lighter fluid could damage it. First, the printed circuit board must be removed to get clearance for removing the
motor assembly. Set the chassis on the bench in its normal position and remove the metal shield mentioned earlier. Note carefully how the plugs on the left edge of the printed circuit board are positioned, and remove them. Don't touch the pins of any of the integrated circuit packages on the board, for some of them are MOS cir
Figure 9
that are hard to recognize as such! You can see what they look like in Figure 3, and also on your own disk drive. Turn the disk drive around so that the
right side is facing you, as shown in Fig ure 9. First, remove the power plug shown by arrow 1. Note that the wires run
behind the plug; be sure to replace the plug in the same position when you recon nect it later. Next remove the two screws holding the heat sinks in place, indicated by the arrows 2. Now remove the five
screws holding the printed circuit board to the chassis. One of these screws is located at the right-front coiner of the board, one at the left-front corner, one at the center of
the left side of the board, one at the leftrear corner and one at the center of the back edge. They are shown by the arrows 3 in Figure 3. Lift off the printed circuit board, handling it by its edges, and put it
in a safe place. Don't lose the screws—
Figure 111
they have metric threads and replace ments are difficult to find in the U.S. Figure 10 shows the right side of the Alps chassis with the printed circuit board removed. The Newtronics chassis is simi lar. To remove the motor assembly, four screws must be removed. Two of them are shown by the arrows in Figure 10, and the other two are in the corresponding posi-
Programming/1541 Disk Rescue tions on the opposite side. Now lift the mo
side, while pulling the belt between the bench and the swab until you have cleaned the entire inner surface of the
tor assembly out of the chassis. You may have to do a little maneuvering, because there are some "ears" on the chassis which
is replaced properly and that the flywheel rotates by twisting the motor pulley with
belt. Lay the belt aside for the moment and with another solvent-moistened swab,
prevent direct withdrawal. Once the motor assembly is free, place
it on the bench upside-down. It will look something like Figure 11. Again, this is the Alps, but the Newtronics is similar. Turn the flywheel while pressing upward on the belt with a finger to remove the belt. Note that the belt has one smooth side and one side with a slight pebbled
shown in Figure 11. With a disk in place in the motor assembly, check that the belt tilt; eraser, as in Figure 12. Replace the
clean the rim of the flywheel. Finally, take a third solvent-moistened cotton swab and
motor assembly in the chassis and fasten it in place with the four screws. Replace
clean the motor pulley by pressing the
the printed circuit board and fasten it with the screws removed earlier. NOTE: It's best to start all of the screws first hold ing the printed circuit board and the heat
swab between the flanges, where the belt rides and rotating the motor pulley by
pressing the eraser against the end of the
pulley and twisting the eraser letween
sink before fully tightening any of them.
Reconnect the plugs from the motor as
texture. The smooth side goes inward.
sembly to the printed circuit board.
Moisten one of the cotton swabs with solvent, lay part of the belt on the bench with the smooth side up, and press the sol
Connect the serial bus and power cables
temporarily and check drive operation us
ing the program given in the beginning of
vent-moistened swab against the smooth
this article before replacing the drive in its case. If everything is all right, remove
the cables, replace the chassis in the lower half of the case and fasten it with the six screws removed earlier. Connect the
three-pin plug from the green indicator
Figure 12
light in the lower half of the case to the PC board, and install the metal shield over the printed circuit board and replace the
your fingers as shown in Figure 12. (Don't have the belt in place as the picture
two screws holding it. Finally, place the top cover on the drive, invert it and re
shows!) Let the solvent dry thoroughly, then re place the belt by reversing the procedure
Figure 11
place the four screws holding the top cover in place.
g
WHAT DO YOU WANT,
FREE SOFTWARE?
If offering free software is what it takes for you to try our GEOS products on your Commodore, then byy golly, we we're re prepared to do it. Just buy any GEOS product from your local Commodore
For every GEOS product you buy, well send
you one of equal or lesser value absolutely free. Which means you can build bui an integrated library for half
OH,ALRIGHT!
dealer and follow the directions on the form below.
n Berkeley
Softworks
the cost.
But hurry. This offer expires August 15,1989. After that, we may not be feeling so generous.
The brightest minds bib working with Beiteky REDEMPTION I AST* I 'LTIIWCi ^fc-r k-i frrt g*q*-i d ™M ■* few obr *> lW rrt lowing »lL'rtiTirtpftCFlftt*'O>llnintftiJt»iC)lin-»frt*1»rDi%b.lS hWKAiftf IS. HH) Sn ,-•-< "• ■ •-■ £ Sr*Kl PW '■** pidKl nlnViA pvltfMCtifdET CuUlWT|i*bth»«ti II
rt*j pnrhr^d I pfld«7 (rwtl GfW I pv in nlPCkd h> 1f f |*u**l Fnri (Invp I
11 H"j h^litad i |nihJm f mm Idtujp IE *vi Mr nfliUrd Li I (c F*1"*" In™ Mltef Gnupi i* dnw II. irTW|Vnhku4l nnLm fruit(nimu III r*i vr mink* bllRC HVfcn Iiehi*™** 1 || a III GROL'P I
■ .'■ I H i
Tlnlvr—n-TtfeinuH-riridlUiitolltr■*<<'*
IT
ttah [V d InrL n
.
Abo tc KO CJurri*. ^mndiir IS
A |n^ranmrrl *jllk*iiw t-J LJul i"rli>V» ■nMwmMer rrtr f.dk-iry ninra
r i i i i
N*MI
UHlREB k.El>
K.I
MM
Ml' tig*
snaBmn
'
or
i i i i
COMMODORE MAGAZINE
61
128 MODE
ML Programming
Via the
Monitor In the next few months, we'll be exploring the technical, the whimsical and a few things in between. If there's a topic you'd
like to see covered, write to Mark in care of Commodore Magazine, 1200 Wilson Drive, West Chester, PA 19380. In the world of the 128, there are three
kinds of people: program users. BASIC programmers and machine-language pro grammers. This is not a fuedal society with users playing the serfs, BASIC pro grammers the knights, and ML (machinelanguage) programmers the lords. That's the theory, anyway. Unfortunately, in the real world a pecking order exists. ML folks spurn the BASICs, who in turn snub the
users. The poor user stands alone. Ugly,
ugly, ugly.
Ifyou are one of the many who look at a machine-language program listing and .start to panic, I've got some good news for
you. With one simple article you are going to acquire enough knowledge about ma
chine-language programming to: (1) not
feel inferior when a bunch of ML'ers are
strutting around, and (2) become a bud
ding ML programmer. You might not be ready to rule the roost, but you'll get a good enough peek inside of machine lan guage to know what it's all about. I actually wrote an article on this topic
about three years ago for the Commodore
64 but I never submitted it for publica tion. The reason was that the Commodore 64 doesn't have a built-in machine-lan guage programming aid called a monitor.
That meant that most of my potential au dience would never be able to try out what I told them. But with the Commodore 128,
this problem does not exist: the 128 has a built-in, quite powerful ML monitor which you can use.
The term monitor is a bit confusing be cause that's what we also call the screen we hook our computers up to. A machinelanguage monitor is simply a program 62
JULY 1989
that lets you program in machine lan guage in a convenient way. It isn't the only way to program in machine language
and it isn't the best (an assembler is the
best), but it's a great tool for typing in and/or debugging short ML programs. It's perfect for what we want here.
Entering the Monitor With the 128 the monitor is always in tact—all you need to do to get it up and running is to type MONITOR and press RETURN. When you do that you see the following on your screen:
PC SR AC XR YR SP XXXXX XX XX XX XX XX It looks very cryptic until you've done a little machine-language messing around. For this article you'll need to know about only one of the above mnemonics and
that's AC. However, I'll briefly identify what each of these two-letter abbrevia tions stands for and explain the concept to provide an overview of ML programming. A wonl of advice: if you temporarily seem to be lost in the woods, keep walking. We will never get more than a rod or two deep
and just having stumbled through these
sections of the forest will prove beneficial.
The PC stands for "Program Counter."
ML programs don't go by line numbers, they go by addresses. What this means is
that the real computer within your com puter—the CPU (central processing
unit)—does its work by starting at the ad dress pointed at by the PC; after it has
dealt with the instruction found at that
address, it looks at the PC for the next ad dress to deal with and so on to the end of the program. And in case you're wonder ing, there are exactly 65535 addresses your CPU can deal with.
One last word about the PC: it will al ways give you a five-digit hexadecimal number. The first digit has to do with the bank, or configuration, of the system. For simplicity's sake, this number will always be 0 for the work we're going to do. Men tally strip it off and look at the last four
digits to see the address we're actually on.
SR stands for "Status Register." A reg ister is nothing more than a memory cell, a byte, somewhere in RAM that holds a number between 0 and 255. This particu lar register always tells the CPU the sta tus of certain things, like whether or not the last thing that happened resulted in a negative number or a zero.
The AC, XR and YR are the three most crucial concepts you need to learn to un derstand when doing ML programming.
AC means Accumulator, often simply called A. This is the main register you will deal with. Many instructions you put in your programs will cause the CPU to look at the Accumulator's contents (which like all registers is between 0 and 2551 and then do different things. More on that later.
XR and YR are the X and Y registers. These two work together with the Accu mulator most of the time. The chief differ
ence between them and the Accumulator is that they can be used as indexes. For
example, you can load the Accumulator with whatever is in memory cell 2500 by typing LDA 2500 (which means "Load the Accumulator with whatever's in address 2500"). If you do it this way: LDA 2500,X
you will load the Accumulator with what ever is in memory cell (2500 + X). If X happens to be set at 5, then your LDA
2500,X will give you the contents of mem ory cell 2505.
This simple article of ours won't require that you do any indexing... in fact, we won't mess with the X and Y registers at all, or the Status register or the Stack Pointer (SPl. The Stack Pointer is the last of the symbols we see when we first enter the monitor. You don't need to worry about it at all for now and seldom for most machine-language projects (though the CPU will use it a lot). That's what those six abbreviations stand for. The numbers you see below
them are nothing more than their con tents when you first enter the monitor. And to be quite honest, we don't care what
they say for now.
128 Mode/ML Programming Hack Time
Let's write a program. There is no better
way to learn ML than by doing. I promise to go slowly, to hold your hand, and to
avoid quicksand. Start by entering the
monitor. While you don't actually have to get up from your easy chair right now and
We are placing the hexadecimal num
ber $0D into the Accumulator. The pound sign (#) means we want the number$0D, not whafs in the address $0D, and the dol lar sign ($) means its hexadecimal. $0D equals 13 in decimal. Trust me. With our$0D in the Accumulator, we're ready to
type this stuffin, it's not a bad idea.
store it somewhere. Type this: A00C03STA$314 puter interrupts itself with annoying reg cumulator in whatever address follows. Why did we store it in$314? Because that's an important address for the inter
We're going to write a machine-lan guage interrupt program. Since the com
ularity (60 times a second), we'll hop into each interruption and tell the computer to
move a sprite for us. Doing things via the interrupt makes magical things happen. We begin by typing this: A 00C00 SEI. (You'll need to hit RETURN after every
line.) Let me explain what we just did.
The A means "assemble." Since the CPU doesn't know what SEI means or anything else we're going to type in, we need the monitor to interpret, or assemble, our commands.
The 0C00 (strip off the first 0) is the memory address we are going to place our program. It happens to be a free area of memory that is very handy for short rou tines. If hexadecimal numbers aren't sec ond nature to you, don't worry about it
STA means to store the value in the Ac
rupt. Actually, it's half of an important ad
dress. We need to put the other half in
memory address $315. By the way, we can drop the dollar sign; the monitor will sup ply it for us): AOOC06LDA#$OC A OOC08 STA 315 We reload A with a new value ($0C) then store it in the next address following 314. You'll see why we stored an 0C and an 0D in consequetive bytes in just a min ute. We're done interfering with the inter ruption process so we need to tell the CPU that. Here's how: A OOC0B CLI AOOC0CRTS The first command means "clear the in lock up because we haven't put anything at 0C0D for it to do. So we need to write another ML program. Wow, two programs in one article—we're making headway. The Actual Interrupt Routine Back to typing. A 00C0D LDA DC00 This line loads A with another memory cell's contents. Address DCO0 just so hap pens to be the byte that always knows which direction the joystick in port 2 is be ing pressed. So the Accumulator will now contain that information. We're going to see if the joystick is being pressed up or down. First well check for up. A00Cl0CMP#$7E A new instruction appears, CMP. This causes the CPU to compare whatever val ue is in A with whatever value follows our CMP command, in this case S7E. Why
$7E? Because if the joystick is being pressed up, that's what number will be in DC00. But why, you press. Don't ask. Re member, this is an introductory piece. You'll just have to trust me that I know what Fm talking about. And trust me, you can trust me. OK, the CPU compares whatever was in the Accumulator (which is whatever 0C00 equals 3072 in decimal numbering. Our monitor is smart enough to work with decimal numbers if we choose: we could type A + 3072 SEI and we'd get the same result (the plus sign tells the monitor it's a decimal value). But for our program we'll terrupt flag and get back to normal inter was in the joystick register) to$7E and
rupting." The second command, RTS, tells our CPU to Return from the Subroutine.
in the Accumulator because that's what
stick with hex. It's actually more conve
from the bird's-eye view.
nient.
We created a short ML program. All it does is place two new values in addresses 314 and 315. But these two bytes, side by side, are a pointer that the CPU looks at 60 times a second to see where to go. Nor mally, these two bytes hold the address" FA65 because that's where the computer's interrupt program resides. But we have
SEI is an instruction that the monitor understands much the same as PRINT is a comand the BASIC interpreter under stands. It stands for "Set Interrupt Dis able Bit." Which, in layman's terms
means, "Stop all CPU interruptions for a second so we can slip our routine into place."
After we press RETURN, the computer
will respond by assembling our line and printing out a coded version of it: A 00C00 78 SEI The only new element here over
what we typed is the 78 in the middle. This is the numerical value of the SEI command. This our CPU understands.
You'll also note that an A O0C01 appears on the screen below our first line. It's like
automatic numbering allowing us to skip typing the address each time, a nice con venience.
Our second instruction will be a famous one: IDA, which, as already mentioned, means Load the Accumulator. Here's how well use it: A0OC01LDA#$OD What subroutine? The one you just wrote. Let's float up over the trees for a moment and take a look at what we've created changed it to point to our own interrupt routine which will begin at address 0C0D. 'When we first run this program—by typing SYS DECC'OCOO")—the PC will be loaded with the address 0C00 and the CPU will look there to see what to do. It will see our SEI instruction so it will do that. Then it will look at the PC again to see where to go next, and since we didn't tell it to jump anywhere else, the PC will point to the address just after the SEI in struction. So the CPU will do what's in structed there: load A with #0D. Then it drops to the next instruction, stores A, and so on. And that's how machine lan guage works. The only trouble is, if we would run the program right now, the machine would let's say that, sure enough, there's a$7E direction the joystick was being pressed
when this command was encountered. We now need to tell the CPU what to do. A 00C12 BNE 0C17
Here we tell the CPU to Branch to ad
dress 0C17 if the comparison we just made was not equal. Almost always, right after a CMP instruction, a branching instruc
tion will occur. The CPU sees this, checks the Status Register to see if the compari son we just made resulted in a true or
false condition (trust me), then branches (or doesn't) to the address that follows. If the joystick was indeed pressed up then our comparison results in Yes, the two numbers are equal and thus the CPU will ignore branching to 0C17 and simply fall through to the next instruction.
A O0C14 DEC 11D7
This will move sprite #1 up one pixel.
DEC means Decrement whatever address follows. 11D7 just so happens to be the ad dress that positions sprite 1 vertically on
the screen. By decrementing whatever value happens to be in 11D7, we effective
ly move the sprite up one slot. In other words, if the sprite was at posi tion 100 vertically, DEC will make it move to position 99. What happens if the sprite's at position 0 and we decrement it? COMMODORE MAGAZINE
63
128 Mode/ML Programming
A 00C1BINC 11D7
jt rolls around to the highest number a
Look familiar? It should. It's doing just the opposite of line 0C14. Instead of de
byte can hold, 255. And thus our sprite goes to the bottom of the screen to start
are increasing (INC means increment) by
scrolling upwards another time. Now what do we do after moving the sprite up a spot? This: A0OC17CMP#$7D A00C19BNE0C1E If you glance up you'll notice that this address, 0C17 is where we would've come in the first place if the joystick hadn't been pointing upwards. After decrement ing our sprite's position, the Accumulator still holds the value of the joystick. Since it was pointing up that value is$7E. So when we drop down to line 0C17 we will compare our $7E with$7D and those just ain't the same. Therefore, the following BNE instruc tion will be followed, and the program will branch to line 0C1E. OClE is the end of our routine but we're not quite ready to type it in yet. Why not? Because some times when we're going through this loop
the joystick will be pointing down and thus a $7D will be in address DCOO and consequently in our Accumulator as well. And in that case we won't branch to OClE, we will fall through to the next line. Software Reviews/Serve & Volley Continued from page 14 and top-spin. Once this shot is selected by the player who is serving, a green target area rectangle—with a center line—is visible that lets players know how difficult their shot will be. IF the rectangle is long, the shot is easy, and it will be easy to re turn the shot. The "degree of difficulty" is also displayed numerically. In order to correctly serve the ball, the player must watch a thermometer-like bar as it moves toward the green rectan gle. If the server hits the fire button when the bar is within the rectangle, the shot will be successful to a degree. If the mov ing bar stops exactly on the green-rectan gle center line, the shot will be perfect. Shots within the green rectangle area, but not exactly on the center iine are success ful, but not as accurate. Announcement of shot accuracy is indicated in the control box. When the ball is approaching—as in real tennis—you must simultaneously aim your shot, pick the type of shot you want to make, and time the bail to hit it exactly. Aiming the shot is accomplished by moving a yellow dot in your opponent's area on a map of trie court. This map ap pears in the control box immediately after 64 JULY 1989 creasing our sprite's vertical position, we one. So if the joystick is pushed down, the sprite will go with it. A00C1EJMPFA65 The last line of our program is a jump to the address where the real interrupt rou tine begins. By jumping there we leave the rest of all this interrupt business to the machine. Before continuing, let's save our cre ation. Get on a blank line and type: S monitor by typing X on a blank line and pressing RETURN. Once back in BASIC you'll need to first get a sprite showing on the screen. Type this in direct mode: SPRITE 1,1,2:MOVSPR 1,100,100 if nothing shows up then you'll need to define a sprite. Use the SPRDEF com mand to design a sprite shape for sprite 1. Then exit and repeat the above sprite commands. Now we need to install our interrupt. Type SYS DEC ("0C00"). When you press RETURN ... nothing happens. Nothing yet, that is. Plug a joystick into port 2 and press it up. Y:i-ha, our sprite moves "OUR CREATION",a,0C00,0CFF [RE TURN], Be sure you have a disk in the drive. If you ever want to re-load it, you can do it from BASIC by typing BLOAD "OUR CREATION". Let's review what we've done. We in stalled an interrupt routine beginning at OCOD. After our routine has been execut ed, the computer can go merrily off on its own interrupt routine. While in our rou tine, however, it has the task of checking smoothly upward. Press down. Ya-hey, the joystick register and comparing it to an up move and a down move. If either oc the initiation rites. Some of you will be in curs then our routine will move sprite 1 accordingly. We need to try it out. You can exit the happy just to kind of know what it's all about. And all of you will no longer cower in the presence of the ML Lords. a the ball has been hit by your opponent. racquet during the hit seems impeccably Your choice of shots includes volley, smash, lob, forehand or backhand shots. down she goes. If you've stayed with me this long, you are absolutely no longer an ML Cheekako (greenhorn). We didn't just create an ML program, but a sophisticated interrupt routine. Not bad at all. Of course, there are dozens of ML instructions we didn't look at, and lots of questions in your head that are unanswered. But once you've done this much, you have passed through spired (o dive into ML while others will be correct. And timing the hit is made with the ther Training Value target. is great. Getting new tennis buffs to think Strobe View about where to place the ball, how fast to hit the ball, whether to use top-spin, slic mometer-like bar and green rectangle Reality is simulated dramatically with the software's trademiirked "Strobe-O- As "training" software, Serve & Volley ing or a flat shot accounts for probably 90% of the game. Players easily become Stroke" view of each hit of the ball. In the control box, after all the decisions are engrossed in a thinking process that mir rors play on a real tennis court. There is hands, smashes, lobs and the like. almost no mental difference between a real tennis game and the 64 version. Another reason for Serve & Volleys tre mendous training value is that it offers a visualization of the actual stroke needed made regarding positioning, aiming and hitting, a graphic appears. This graphic shows the relative arm-and-body position of the player—different for serves, fore The graphic also shows when the ball is very near the player. Since all decisions have been made, the graphic shows the completion of the shot, as if it were photo graphed in slow motion. In fact, the graphic is even better than a slow-motion picture. Players see the tennis racquet moving from the proper starting position, to hitting the bail, to the follow through. The action of this graphic is smooth—to the point of almost appearing like a movie of the actual volley itself. The extension of the racquet for a correct serve is correct and lifelike. Even the slight turning of the to hit the ball. Since the graphic provides the start of the hit, the actual hit and the follow through, the player can correctly "watch himself" making the hit. Most athletic coaches realize the value of an athlete "visualizing" a successful move. This software helps the player to do just that. The combination of the close-up StrobeO-Stroke"* view, the need to make many quick decisions, and the consistent backand-forth action of the game makes Serve & Volley a package with which one can fall in 'love." g AMIGA UPDATE" by Matthew Leeds Still Video It looks vaguely like a standard film camera, all the familiar parts are there: lens, viewflnder, flash, shutter re lease; but when you open the back to put in a film cartridge you find a two-inch mi cro-floppy already in place. This odd beast is a still video camera. They come in all shapes and sizes; the earliest looked like shrunken camcorders, later models took on the more familiar ap pearance of 35mm SLR's, and the newest look more like overgrown 110 cameras. The one thing that they all have in com mon is that two-inch floppy and the still video images stored on it. Still video cameras record single video images on a magnetic floppy disk. Once stored on a disk, images may be played back for viewing, printed out on a video still printer, transmitted over telephone lines via a still video transmitter, and cop ied from disk to disk with little or no loss of fidelity. Still video recorders can be included in a camera (still video cameras, think of a camcorder) or can be stand-alone units similar to VCR's. The video input source can be any standard video signal, with some recorders accepting analog or digital RGB as well. All still video devices adhere to a stan dard format for recording and playback. The storage medium is a two-inch hard shell floppy disk, similar to the 3.5-inch floppy used in the Amiga. The disk spins at a constant velocity of 3600 rpm and is divided into 52 tracks. Two of these tracks are reserved for directory information (sounds very similar to an Amiga's hard disk set-up). Unlike Amiga floppy or hard drives, the still video drives contain only a single head, but that head can read two adjacent tracks simultaneously. The reason for this unusual design re lates to the image recording capability of the still video format. Images can be re corded in two modes or quality levels: field or frame. You may know that NTSC video consists of two sets of interlaced images MavicaM Still Video Camera, Playback Adaptor (MAP-T1), Optional Remote Control (RM-C1). Mavipak* Disk As you may have deduced, still video images can be stored as either single fields, allowing a total of 50 images to be stored on a single two-inch floppy, or as full frames, resulting in B maximum of 25 images. Playback of a full-frame image requires that the floppy drive head read the two adjacent field tracks at the same time. It's important to note that the video im age is stored on the disk as an analog sig nal, not a digital signal. Still video equip ment cannot substitute for a digitizer or frame grablx;r, although it ran be used to provide flawless still video for digitizers that require a still image to function cor rectly. The two-inch floppy disks used in still video can store around 800K of data as digital information, not nearly suffi cient to handle the files that would be cre ated by converting many analog video im ages to a digital format. By keeping the video signal analog, the access times for any given image are kept very low. as anu the recording times. Some still video cam eras can record four to nine images per second. Just as an aside, the storage capacity for digital information of the two-inch still video floppy would support the same amount of information stored on Amiga a thought. What's Available The still video format has been stan dardized, and by 1986,43 companies had agreed to support a single format for stor age on still video floppy disks. Included in that standard was support for audio tracks. Each track can store just under ten seconds of audio information. A few cam eras include microphones so that you can record comments about each image, and most still video recorders have audio in put and output jacks. Now that we underetand the basic for mat of still video images and their record ing medium we can look at some of the hardware available for use in still video systems. The beginning of any still video system is a camera. Still video cameras owe much of their design to Single Lens Reflex [fiOQ 35mm still cameras. They usually offer auto-focus and auto-flash, with the flash built in on some units, and a hotshoe-mounted extra on others. The lens may be a fixed focal length in some ofthfl low-priced consumer models, but is often a zoom lens in the more ex pensive systems. Most offer an LCD readout panel with information on lens and shutter settings, numbers of tracks used or unused, white balance mode (re member, this is video), and other useful data. Oddly enough, many cameras do not composed of the odd and even lines on your TV or monitor. These two interlaced images are displayed sequentially to in crease apparent resolution and reduce flicker. Each odd or even half of the com plete image is known as a field; when dis played together the two fields create a full frame. floppy disks. Just imagine a laptop Amiga using two-inch floppy disks. As 1 said, just provide any means of playing back record ed images. The newer consumer models Sony* Still Video Recorder (MVR-A77II) do provide this capability. Stand-alone players and player/re corders offer a wide range of features. Some, such as Sony's portable MVR-A770, COMMODORE MAGAZINE 65 Amiga Update/Still Video can be battery powered, and have a jogshuttle search dial for quickly finding a specific image. Some players can be pro grammed to play back images in a specific order, while others can be computer con trolled I more on this later). On-screen dis play of the date of recording, track num ber, image ID numl>er, and other track in formation is provided by high-end players. A graphical display of the tracks used and whether they contain field, frame or audio information is also available. The one thing 1 have not yet seen is a dual drive recorder. If you want to dub from one disk to another you will need two units—at minimum a camera and a recorder or player. In addition to players, several compan ies market still video printers. These are Specialized color printers that use either high-density ink jet or thermal transfer technology to convert a video image into color hardcopy (see "Color Hardcopy Op for transceiver protocols, but since this would obsolete existing units, agreement has been slow in coming. with you, or convincing your friends to What's to Come ply connect your Amiga to your still video recorder or camera, record the image, A prime example of the advantages of fered by still video over conventional vid then bring the recorder or camera (provid eo and still photography was recently ing it has playback capability) to your demonstrated during the inauguration of President Bush. An Associated Press pho tographer used a still video camera to cap friend's home and display it on their TV. alter the image was taken. This kind of offers the possibility of computer control. immediacy will become more prevalent as the technology moves towards greater standardization. Imagine in the not-too-distant future a video-phone with a two-inch floppy slot in the side. You call up your parents and send them a still video image of their grandchild, or you call a client and send an image of a color ad or architectural end still video printers will start showing en-figure color printer, and the downward malls. A typical unit would include a slot for payment, a second slot for you to insert your still video disk, a color monitor and controls for selecting the image to print. Color correction controls may also be pro vided as well as cropping and zooming ca pabilities. Another peripheral for still video sys tems is the transceiver—a device for send ing and receiving still video images over telephone lines. Each manufacturer of transceivers has developed its own special way of encoding still video images for transmission, and the standardization that exists for image storage on disk does not extend to transceivers. If you want to receive a still video image from someone using a Canon transceiver, you had better have a Canon transceiver on your end as well. This lack of standardization has so far retarded the development of service bureaus that accept telephone line-deliv ered images for printing. There has been some discussion of developing a standard 66 JULY 1989 slightly larger than a notebook and weights under six pounds. Many of the still video recorders and rendering for their approval. It appears on credit card-operated units in shopping The Sony portable recorder/player is just ture an image of the president taking the oath of office. The image was transmitted over the wire service less than a minute tions," May 1989 for more information). There is a great range in both quality of output and price in video printers. Some printers are available for under$2000 while others can run in excess of $10,000. The cost per print am also vary quite a bit. In general it starts a little below a dol lar per print. Since several manufacturers are target ing the consumer market with still video cameras, you can expect that by year's up in one-hour photo labs and drug stores, and I would not be surprised to see coin- or come over to see your latest ray-traced im age (four day's worth of rendering time— they had better come look!) you could sim the color monitor in the video-phone and can be stored on a still video floppy at the other end. This fantasy may become reali ty in the very near future. Looking a little further down the road, as still video color printers show up in re tail establishments it seems that this would provide an economical avenue for color hardcopy of Amiga-generated im ages. Not everyone can afford a six- or sev pressure that retail availability exerts on product prices will be a welcome expe rience for Amiga enthusiasts looking for an alternative means for obtaining color hardcopy. Current Applications There are applications for still video technology right now as well as in the fu ture for Amiga owners. Still video offers— as its name implies—a rock solid still vid eo signal. Most of the video digitizers on the Amiga require a still video signal to capture color images. Have you ever tried to get your cat to sit still under a video camera while you spin a color wheel to di gitize its image? Capturing images to be digitized on a still video disk first means you don't have to drag your Amiga and di gitizing set-up around with you. You don't have to take film-based pictures, wait for them to be developed and printed, and then stick them under a camera and color wheel. Still video also offers an excellent way of showing off computer-generated im ages. Instead of dragging your Amiga players have a serial jxirt connector that Kodak already has on the market a multidisk unit that can handle up to 30 still video disks at a time with an image-to-im age seek time that maxes out around six seconds. It can also be pre-cued for the next image. The multi-media possibilities are endless. So are the possibilities for im age databases; 30 disks translate to 1500 separate field images, and Canon is work ing on a 12-inch optical disk recorder that uses the still video analog data format and can hold 54,000 images on a side. Most of the current still video systems offer a horizontal resolution of around 320-360 lines. Horizontal video resolution (left to right) is generally scaled in lines, although it really refers to the number of pixels that can be resolved on a horizontal line. The vertical resolution (top to bot tom: of video is fixed at 525 lines by the NTSC standard, although for various rea sons as few as 300 or less may be discerna- ble on many systems. A new Hi-Band still video standard has recently been an nounced that boosts the horizontal resolu tion to 500 lines. Be sure to read the speci fications on any system that you intend to purchase, as at least one manufacturer is using the phrase "high band" while their horizontal resolution is specified at only 360 lines. As in all new technologies, more than a little confusion and marketing hype creeps in. If you are interested in getting into still video, both Sony and Canon have consum er cameras on the market at well under$1000 list price. By the time you read this there may also be other manufacturers on the market with low-cost consumer cam eras. Minolta has a still video back that attaches to their Maxxum SLR and con verts it to a still video camera. Nikon,
Casio, Olympus, Konica, Kodak and Pan asonic have either announced consumer still video cameras or have industrial sys tems that may indicate an interest in pro ducing consumer systems in the near fu ture. " a
AMIGA UPDATE
Amiga Public Domain As promised, this month I have re
viewed two great animations that re
quire two megabytes in order to run. Oth er features this month include the first ex ample animations from Sculpt 4D and 3D
Professional plus an important update to the great adventure game Moria. For each program, the author is given when known. If I obtained a PD program
en, the program may still be on PeopleLink, but I obtained it somewhere else.) When a public domain program has been classified as shareware, this is also men tioned, with the suggested amount. Unless I specify otherwise, all anima tions reviewed here require one megabyte in order to run. Monkey3D: by Peter Kurjan
This is a very nice Sculpt animation of a large monkey juggling bananas while running around in a circle. The animation
includes a reflective puddle of water and some cute digitized sound effects. It's a re freshing change of pace from that old ro bot juggler. 54321: Author Unknown (AmigaZone file #15542) An ANIM format animation that essen
tially previews 3D Professional, an anima tion package from Progressive Peripher als. This animation shows a set of animat
searchlights ablaze is seen flying around
the skyscrapers of Chicago. While this seems normal so far, you soon see that this helicopter is flying above an AT-AT Walker (from the movie The Empire Strikes Back as well as the
first Walker demo) which is on a rampage through Chicago. As soon as the gunship spots the AT-AT with its searchlights, it fires an intense salvo of laser blasts at the AT-AT. However, these laser blasts harm
lessly bounce off the AT-ATs armor. Then the AT-AT fires a return salvo that hits the helicopter's engines, and in seconds the gunship explodes in a fury of heat and light. At the end you see the message: "COMING SPRING 1989 TO AN AMIGA NEAR YOU."
ed 3D numbers with a very nice rendered chrome surface.
Throughout the demo some simple yet nicely-done title screens appear between the eight different scenes. Remember, this
Walker II: The Trailer: by Brian
demo; only about half of the screen area is
Williams and Imaginedcs, Inc. This is the second animation demo from the people who created the incredible Walker animation (reviewed in the Janu ary '89 "Amiga Public Domain"). This is
not the sequel to the Walker animation,
is just a trailer for the real Walker H used for the demo display. As a result, this
reduces the effect of the demo on an RGB monitor. When I ran the demo on a sevenfoot projection screen at a recent user group meeting, this demo received thun
derous applause from the crowd! Needless
Trailer easily surpasses most other fin
to say, the finished Walker II demo (which should also include longer scenes) should receive plenty of praise from the Amiga community. The Walker II: The Trailer
ished animations! Walker 0: The Trailer opens with an
der to run.
but rather just a preview of what Walker
II will be like when finished. Even in this preview it's easy to see that Walker II: The
ominous view of the streets of Chicago at night. Then a helicopter gunship with
demo also requires two megabytes in or (NEWS FLASH: I have just learned that Imaginetics has released one mega-
byte versions of both Walker and Walker
II: The Trailer, so those who have only one megabyte of memory can view scaleddown versions of these animations.) DrZorb II: by Timothy Hanna (AmigaZone file #15820-15823) This is the sequel to the animation
DrZorb (reviewed in July '88.) Although the DrZorb animation was a very good one, it bears little resemblance in terms of
both content and quality to its successor. When you click on the Director film
icon, the first thing that happens is that you hear hideous laughter (almost identi
cal to that heard in the ending moments of tliu original animation) while the ani mation loads. Next the title screen is dis
played, which includes a digitized skull that falls to the bottom of the screen and breaks in two, to the sound of booming thunder. Up to this point DrZorb II seems to be of
the same haunting theme as its predeces sor. But once the main animation se quence starts, you'll soon realize that DrZorb II is meant to tickle your funny bone rather then sending chills up your spine. When the curtain opens, You are presented with a surprisingly silly thing—skeletons dancing to Christmas music! Yes, the animation sequences are comprised of digitized complete human skeletons that take up the full screen in animation.
As for the music, well it isn't exactly "Jingle Bells." If you've ever seen the Bass COMMODORE MAGAZINE
67
Amiga Update/Amiga Public Domain & Rankin Christmas show A Year Without
a Santa Claiis, you'll immediately recog nize that these skeletons are dancing to the favorite theme song of that prince of
the game much more enjoyable for those who do.
Help: by Gerard Lachac An Amiga port of the UNIX Help com mand. Help allows you to set up a docu mentation directoty rilled with documen tation files from your favorite programs, then call documentation for any program just by running Help. Help requires
pyrotechnics, the Heatmciser! What's even more remarkable about the music is
■IDAnim: Author Unknown (AmigaZone file #15623) A very nice animation that shows oft" the power of Byte-by-Byte's top-of-the-line
that it lasts lor over two minutes (and
ray-tracing package Sculpt 4D. 4DAnim
arp.library installed in Libs: and that the
depicts a glass sphere within a glass sphere over a checkered floor. The anima tion is in the form of the familiar space ship used in Allen Hastings' Infinite Loop
More program be available as well.
videotape (which of course was ported
plenty of uncommon programs before—
we're talking about all direct sampled mu sic here, not composed music). Needless to say, the end result is quite extraordinary.
DrZorb requires two megabytes to run (making it the first non-Imaginetics demo to enter the two-megabyte plateau). DrZorb II is yet another' example of some
from VideoSvape 3D to Sculpt 4D via Syndesis' Interchange program) circling the
The Director.
two spheres. The resulting reflections of the spaceship off the two spheres provide a
Moria version 3*0: by Bryan and Richard Henderson (AmigaZone file #15421-
ors (mainly since the checkerboard is
of the wonderful tilings you can do with
15422)
The Hendersons have released version 3.0 of the vety sophisticated fantasy role-
playing adventure game Moria, which was featured in the October '88 install ment of this column. There have been many improvements in Moria, but the most obvious one is that Moria is now
much faster. When you are moving through a long corridor, it no longer takes a short eternity for you to get to the end. While this improvement alone makes this a major upgrade, the Hendersons
very interesting animation to say the least. While this animation sports few col black and while), the apparent resolution quality (due to the use of HAM model and countless reflections made this a very good Sculpt animation.
Judy: by Ron Peterson
The Director has been used to create Judy is an example of a talk show created with The Director. Although there really isn't any animation to speak of, there are plenty of digitized scenes, sound effects and even a commercial (which I thought
was the best part of the show). Also, if you enjoy talk shows that aren't exactly bor ing, you'll love what happens here. (Ger-
aldo got off easy compared to the hostess of this show!)
teaching state capitals using The Director. You can choose between one or two play
Kick: by Tony Solomon and Paul Fortin (AmigaZone file #15124) A cute display hack that shows what it was like to own an Amiga 1000 during 19a5. NOTE: Make sun you aren't run
ers and study mode or test mode. (In study mode the correct capitals are given when
ning any important programs that have unsaved data before running Kick.
Capitals: by Linda Marquess
A simple educational program for
a question is answered incorrectly.) The program keeps track of a student's pro gress fay coloring in a state on the map
added to all text messages in Moria,
when the student gives the correct capita]
PathAssign: by Anders Lindgren (AmigaZone file #15282; Shareware: S10) If you've ever wanted to increase the
which makes it much easier to recognize what has just happened to your character
for that state.
sii» of your fonts or C directory but didn't
didn't stop there. Color codes have been
(if you don't understand how important
this is, then you have never played Moria for longer than three hours at one time).
Coupon Keeper: by Michael Bodin (AmigaZone file #15052) A database program created especially
Likewise the mana and hitpoint displays are also now colored for the same reason.
for keeping track of grocery (or other) coupons. The supported fields are Brand
The shopkeepers now no longer haggle with you alter you've become a regular customer, which takes much of the mono tony out of the game. You can now use the mouse for movement (which is quite handy in the town level} and to identify objects and monsters. A few graphic im provements have been made, including IFF screen additions, additions to how the dungeon walls are displayed and improve
Name, Product, Savings (amount),
ment in the town level graphics.
And finally, although it isn't mentioned
Exp.Date, Restrictions and Comments. While this program will do things like re move old coupons and perform searches, ita most useful feature takes a grocery list that you have input and searches for all coupons that match up with items on this week's list.
sample. Once you load a sample, the pro
levels now include a few powerful magic
gram will compute a 256-point Ft1"!' (Fast Fourier Transform) and then graphically display the harmonics of the sample. You can then play back the sample at any rate. There is a cross mark on the screen that can be used to find out the frequency and time of occurrence of any plotted point on the graph.
items that would not normally be there.
those who didn't like Moria, they make
68
JULY 1989
need. PathAssign allows you to assign a
directory like fonts: to multiple directories on (he same, or even on multiple disks. The order you input for the target direct ories when you use PathAssign deter mines where AmigaDOS will look first for a particular file.
Those who have hard drives may stili want to use this program, since you are
now not forced to fit 100 dillerent fonts
into one directory (which can cause for a lengthy delay when getting directories, es
pecially if use an AmigaDOS Dir alterna Spectrogram: by Richard Home This program displays an audio spectro gram, or voice print, of any IFF sound
in the documentation, the top dungeon
This makes the beginning of the game much easier for the novice player and al lows veteran Moria players to get a new character up to speed a bit quicker. Al though these changes may not convert
have enough room on your system disk, then PathAssign is something that you
tive like LS that formats directory listings before displaying theml.
Pass-the-Bucks: by Bob Duflbrd (AmigaZone file #15583; Shareware: amount not specified] A personal accounting program. Basic features include multiple accounts, chron ological journal display of transactions, percentage display of account values ver sus budget projections, net worth display, ledger displays, reconciliation of checking
Amiga Update/Amiga Public Domain accounts and credit card statements, ac count balances (with a choice of month, quarter or year-to-date values) and others. Options for an interlaced display and ac cess to the PD program PopColours (used to change the colors of the screen) are also included in addition to many function en
tries in the menus. RexxMore: by Carl Parramore (AmigaZone file #14952) RexxMore is a short Arexx program that adds file requester support (using the ARP file requester, therefore arp.library must be present in libs: when running this program) to the Workbench 1.3 More text file display program. Those who have Arexx and use ARP can now have a text reader that can be used from Workbench while still being able to display text files
that don't have icons attached to them.
Sorry!: Author Unknown (AmigaZone file #15299) This in an Amiga port of the popular
board game Sorry! from Parker Brothers. The game is 100 percent mouse-oriented,
and includes menu options for up to four human and/or computer opponents, move suggestions and one-game play option. Game piece movement is very quick, and the graphics for the game are quite ade quate. One interesting note about this game is that it was apparently written by
someone at Parker Brothers, since the company's address is given in the program in case anybody would like to send in donations.
two large batch files (one called Setup and one called Shutdown} which contain set
up and shutdown statements for many dif ferent programs that can't be run as is.
Once you've done this, just run Setup, and the setup commands for the program you specified will automatically be executed.
Then when you want to return your envi ronment, just run Shutdown and all the
reset commands that are needed to be ex ecuted will be run. While you do have to
properly set up the Setup and Shutdown batch files yourself, these programs can make it much easier to run programs that require a certain environment be set up before they will work.
AutoMount: by Khalid Aldoseri Jeffs-SS: by Jeff Marks
(AmigaZone file #15844)
(AmigaZone file #15015)
If you have more than one device to be mounted (including multiple hard disk
A set of text files (three AmigaDOS batch files and two MountLists) that can
create a Startup-Sequence that asks you
partitions), AutoMount can shorten the
Showfont version 3.3: by Arthur Johnson, Jr. (AmigaZone file #16011) Version 3.3 of the font-viewing program
to choose between eight different RAD: configurations when booting. The options
time it takes for your Startup-Sequence file to run its course. Using the default method AutoMount will automatically
Showfont, which was last discussed in the
include no RAD:, a small non-bootable
mount every device listed in MountList
RAD: with or without the c: commands
(you can also force AutoMount not to mount a device in the listing by adding a
May '89 installment of this column. Sev eral important bug fixes have been made, including what Arthur refers to as the "slider gadget's happy post-release flicker ing," which I had mentioned as a bug
when I reviewed version 3.1. The major new feature that's been add ed is that you can find out what key se quence you must press on the keyboard in
order to have a particular font character rendered. Sniplt version 1.2: by Scott Evernden (AmigaZone file #15127)
Version 1.2 of Scott's cut and paste text program Sniplt, which was first reviewed in the February '88 installment of this col umn. The major new addition is that the program now supports cut and paste to/
from all windows (instead ofjust console windows), and the ability to insert a fixed prestring before each line of text is pasted (the prestring is user-definable). Sniplt now has an option for changing the location of a text character cell (this
helps to make Sniplt work successfully
with non-console windows). You can rede fine the control keys that activate Sniplr's operations from the command line. If you're trying to cufpaste text from a win
dow that normally would scroll (for exam ple, an online conference), Sniplt can freeze the window if necessary. A patch
program has been included with Sniplt so that you can now use it with Dvorak, Eu
ropean and other custom keymaps.
copied to it, and a fuil size RAD: with ei ther nothing in it, or the contents of dfD:, dfl: or your Scribble! disk copied te it.
SysCheck: by Jim Butterfield (AmigaZone file #15170) If you remember 1.2 at all, and had up to update your system disk(s) to 1.3, you may want to use SysCheck to make sure that all the files and commands on your system disk are indeed the 1.3 versions of
those files. I understand why SysCheck doesn't check some files that don't change (like all the fonts), but I was shocked to find out that SysCheck doesn't check any
thing in the devs: directory. This fact alone basically defeats the purpose of Sys
Check! While you can use SysCheck to
check at least some files on your system disk, the program will not check all the important Workbench files that should be updated in order for the user to be confi dent that his entire environment has been upgraded to Workbench 1.3. 4Utils: by Arthur Johnson, Jr. (AmigaZone file #15956)
This archive contains four programs, but only two are unique and worthy of mention. If you have many programs that require many CLI commands te be ex ecuted before they can be run (C compil ers, FRP games and Director animations are a few that come to mind), Setup and Shutdown can make life much easier.
With these two program you can create
text string before its name in the listing).
You can also specify via command-line arguments which devices should be mounted, instead of letting AutoMount mount every device it finds. There is also an option for floppy users that when in voked will tell AutoMount to load the Mount command and MountList file into RAM: before proceeding. Galaxy: by Steve Riley (AmigaZone file #16000) A C port of a BASIC program listed in the December 1988 issue of Astronomy magazine. This program simulates colli sions between two galaxies. For the stationary galaxy you can speci fy how many stars should be plotted (in terms of number of rings and stars per ring). For the intruder galaxy, you input the mass relative to the stationary galaxy, and the intruder's starting position and velocity. The display view is split into top and side displays. While this program can give fascinat ing results, it hungers for added coprocess ing power much the way ray tracers and
Mandelbrot generators do. Geotime: by Mike Smithwick
(AmigaZone file #15666 and 15670; Shareware: $17) Two very graphic clock programs. One of Geotime's clocks shows the earth from an orbital point of view with part of the COMMODORE MAGAZINE 69 Amiga Update/Amiga Public Domain planet darkened. As time pusses, the shaded area moves (it actually moves along with you, since your view rotates rather than the earth actually rotating). With this program you can toll the com puter to place a marking spot anywhere on the globe. While this clock is very nice, the best of the two clocks is the one that does an ex cellent job of simulating a Geochron. Geochrons are huge wall-sized clocks that depict a world map with the times of cities around the world displayed, all while part of the map is darkened to reflect what areas of the world are currently under the dark of night. The Amiga version of this clock shows a very nicely drawn map of the world, with many cities labeled. Since Cieotime uses a tiny font, it is easily able to display the name and time for each city without clut tering up the map. The darkened area of the globe is covered by a dark shape that—depending on the colors chosen and the monitor settings—may completely cover up the name of the city and/or the time for that city. Not only am you choose whether to display city names and city times, but you can even add new cities and remove default cities from one of the The Awesome Arcade Action Pack Continued [ram imge 28 configuration files. While this clock takes up a separate screen it certainly is some thing to see in action. SetCPU: by Dave Haynie (AmigaZone file #158681 SetCPU is a useful program for anyone who has an Amiga equipped with an A2620 (either inside an A2500 or as an add-on boardi or a third-partv 68020 68030. For all 68020/68030 boards SetCPU allows you to change various pa rameters of the cache, which may among other things allow you to run programs which normally crash under a non-68000based machine. If you have an MMU on board,SetCPU will also allow you to copy which seems to be really messed up. So if you're running ^Director animation on an accelerated Amiga and it doesn't seem right, try running the animation on a 68000-based Amiga. I hope The Right An swers Group can fix The Director so that this will not be a problem in the future. The Amiga PD '88 awards will be re vealed to all in next month's issue of Com modore Magazine! As always, I can be reached on the AmigaZone on PeoplcLink (ID: G KINSEY), or on the 1DCMP BBS 1617) 769-3172 fast as a 68000-based Amiga. 300'1200/2400 baud, 105 megabytes on line, running 24 hours a day, addressed to SYSOP. If you have written a public domain/ shareware/freely distributable program, or have obtained one that you think is worth mentioning to all Amiga owners, One important note I would like point out concerning Director animations (espe Magazine. See you next month. the Kickstart code into the 32-bit memory (assuming you have any). This will speed operating system calls up to four times as cially the DrZorb II animation!: Appar please attempt to contact me via the above contacts, or through Commodore To sign up to PeopleLink and their Ami- ently The Director is not compatible with accelerated Amigas in that when a Direc tor nmmation with sound run on an accel erated Amiga, the animation portion of the program runs faster than the sound gaZone, call them at: (800) 524-0100 portion. The result can be an animation Quincy, MA 02169. so when your last life is spent, you have to start your quest from the first level again. ably cram my fist through the monitor out of the pure frustration this one generates. 1 just can't beat the computer—but pit me (voice) (8001826-8855 (via modem). For information on obtaining programs reviewed in this column send a SASE to: SMAUG, 1015 S- QuincyAvenue, #112, B hit a moving target generates a lot of I think Ixith SideWinder and Xenon would laughter—from both sides of the puck. So my advice is to reserve Blaslabal! lor play against another human—as an opponent the computer just isn't fair. If you just want to practice with the game's controls, select a two-player game and then master the craft's controls by maneuvering around a paralyzed opponent. The three games are packed with a be much more appealing if such an option small, unimpressive-looking but impor images are beautifully sculpted and the sound effects are arcade perfect. While it is tough, even at the beginner level, it is not unbeatable. On the other hand, I found Xenon almost title—Volume 1. They suggest that an too challenging for my taste. II' you want jockey in the Amiga community will be to succeed with it you'll have to memorize the unique traits of each of the alien crafts eager to unwrap a sequel. If you divide the retail price of the Awe some Arcade Action Pack by three, the cost of each game breaks down to only tant manual. My first impulse was to sim ply discard the thing and get on with the games. But, as tiny as it is, the manual contains some hints and Information vital for completing the three games. I never survived past level one ofXenon until I stopped and read the scenario and weap ons information printed in the manual. I have two complaints with the pack. were included. Conclusion Without exception, the graphics and sound effects on all three games match the best found on coin-operated arcade games. Of the three, my favorite is Side- Winder not only because it is fast, but the you'll encounter and the attack patterns they fly. But still the game's almost addic against another sluggish human like my self and Til hit the space ice anywhere and anytime. I can't argue with the title's claim that the three games making up the Action Pack are awesome. All three games are top notch, and compare well with a]l the arcade games I enjoy. But I am a little confused about the last two words in the other action pack is waiting in the wings. If so when is volume two going to be re leased? After seeing the quality arcade ac tion packed here, I'm sure every joystick First each game is stored on a separate tive challenge, excellent graphics and di$16.65—an arcade bargain on any sys
disk. I would have much preferred a single disk with a menu which allowed me te
gitized goodies hooked me into extra games (as a good arcade game should)
tem. And at that price, the games are not
pick the game 1 wanted to play. Because
time after time.
the games an; copy protected, you have to warm boot to switch from one to another, plus three disks take up three times as much storage space as one. Second, none
I Ixith like and hate BlastabaU. I like its close resemblance to a sporting event and
The Awesome Arvade Action Pack, Vol ume 1 is a golden collection that will de light every arcade lover. Tb answer my first question, the packs' name was bom of confidence. The title accurately reflects the quality of the games—awesome. a
of the games provides a save game option, 70
JULY 1989
the ability to compete against another hu man. But if I were restricted to playing against the computer alone, I would prob
only awesome, but inexpensive to boot.
Activision Celebrates A Memorable Decade get much sleep leading up to the show. It Continued from puge 5'l
got so bad that Alex said the sprites on
Jermaine: Why did you develop the De
the screen were actually talking to him. When they started laughing at him, it was definitely time to go home. We got the
signers Pencil program? Kitchen: I wanted to do a baseball game, but Gamestar had recently been acquired by Activision and they already had a
games and wanted to do something totally
job done, and the program was well re ceived at the show. Considering every thing that went into it, GameMaker was a bargain at $39.95. Jermaine: What is your relationship with with the idea of drawing a pencil on the screen and writing a little program to Kilchen: We left Activision in 1986 and started a new company called Imagineer- move it around. Things came together fairly quickly after that. Yes, this was the ing, Inc. Imagineering was set up to be a baseball game on the market. 1 was also tired of working on "little man" arcade different. Shortly after that, I came up beginning of the Designer's Pencil project. Jermaine: What led to the creation of GameMaker The Computer Game Design Kit? Kitchen: That's an interesting story. In 1985, we received a lot of mail from De signer's Penal fans. In some cases, teach Activision now? design firm that would work on microcom puter and video game projects for a num ber of different clients. Absolute Enter tainment I a Mediagenic affiliated publish er! was founded a short time later. This la bel is used when we develop something ers were actually using the product to teach their pupils the principles of pro and publish it ourselves. X-15 Alpha Mis sion was the first product bearing this la bel. Believe it or not, we purchased the program back from Activision and re gramming. However, most of the letters asked the same basic question: Can I ac tually design games with your program? leased under the Absolute Entertainment After reading this same response over and over again, I thought it was time to produce an arcade game development leased it on the 64 late in 1986. [Editor's Note: Most recently, F-18 Hornet was re label.) package that everyone could use. Keeping The Mediagenii Metamorphosis 1987 to Today this in mind, 1 planned out a package con taining five tools—a drawing program, background generator, sprite animator, variety ofproduct offerings, last year Me diagenic. was formed to serve as parent music generator and of course, a sound ef fects utility. It would have a programming language similar to that of Designer's Pencil but more powerful and specifically designed for arcade game development. I actually thought I could finish this project in 18-24 months, It soon became apparent, however, that I couldn't complete GameMaker on time, so we hired Alex DeMeo to work on the In response to the company's expanding company to all these diverse publishers. Loretla Stagnitlo was able to bring me up to date on the reason for this new cor/x>rate entity and what's happening at the com pany today. Jermaine: Tell me about the develop ments that led to Activision becoming Mediagenic. Stiignitlo: After the collapse of the video music and sound effects generators. Alex game market, Activision's fortunes changed. Activision was unable to suc did a great job because he's a real musi cian and has a lot of talent when it comes to making music. cessfully implement a diversification strategy, and the company lost money for four consecutive years. In January 1987, I did the overall language, the sprite utility and the background generator. Then there was a matter of creating sam then senior vice-president Bruce L. Davis was appointed president and chief operat ing officer and took on the challenge of ple graphics, animation, music and sound effects. If you're not artistically inclined, for example, we gave you 30-40 images to play with. GameMaker also featured sam ple games including a version of Pitfall! initiating a financial turnaround. Davis was able to begin the turnaround The project filled two sides of a disk and by revising the product strategy to include producing more market-oriented software in popular categories (such as fantasy/ role-playing, action and arcade-style contained about 320K of data. Activision wanted us to complete the games). He eliminated several products that were already on the market, as well program and show it to the world at the as many under development. He also Chicago Consumer Electronics Show. This meant we would have to work on the pro ject until the eleventh hour, so we didn't lines—Personal Choice and Electric eliminated two unprofitable product Dreams. (These lines were established or acquired by the former management as part of the diversification strategy and longer-term plan to become a diversified publisher of entertainment, creativity and productivity software.I As a low-risk means of extending mar ket share and expanding the product of ferings, Davis started an affiliated pub lishers program, where Mediagenic began serving as exclusive sales and distribution agent for smaller independent software publishers. Hence, the company began of fering entertainment and presentation tool products under the Activision, Gamestar and Infocom brand names. This revised product strategy and other changes resulted in Mediagenic achieving two full years of profitability after four years of losses. Tb improve the profitabil ity and encourage substantial revenue growth, the organization was restructured into two publishing divisions—Entertain ment and Presentation Tools. Tb signify the transition from a year long revitalization program and symbol ize the expanding and diversified product lines, the company created the name Me diagenic. The new name also helped dis tinguish the company from the Activision product line, which was restructured to publish only action, arcade and simula tion-style computer entertainment. Today, all sports simulations are published under the Gamestar label, while fantasy/roleplaying and story-telling titles are re leased as Infocom products. Mediagenic serves as the parent organization to these numerous publishing entities. [Editor's Note: see box on page 73 for a complete list of Mediagenic affiliates.] .lermaine: Who are the people behind the programs developed within Activision En tertainment Division today? Tell me something about each of them. Stagnitto: The Activision line of computer entertainment is headed by Sherry Whiteley. She's responsible for strategic planning, product selection and develop ment, positioning and the marketing of all programs published under that label. In addition to Sherry, some of the key people in the Activision Entertainment Division include: Kelly Flock, product marketing manager; John Skeel, produc er; Mark Johnson, producer; Mike Suarez, producer; and Kelly Zmak, product spe cialist. Activision is also the name used to mar ket the company's video game titles for the Nintendo Entertainment System, Sega Master System and Atari 2600 and 7800. Chris Garake heads the Activision Video Games Division. COMMODORE MAGAZINE 71 Activision Celebrates A Memorable Decade Sherry Whiteley (general manager) and Kelly Flock (product marketing manager) have their own storiea to tell. Here are their versions of what is hap/wring at Activision Entertainment thesi1 days. Jermaine: Tell me what it's like to work at the company today. Sherry Whiteley: I love working for Acti vision Entertainment because it gives me the opportunity to work with seasoned professionals. These individuals care about producing high-quality products and provide a people-oriented work envi ronment where everyone is encouraged to participate. But somehow these people re main children at heart. My imagination is constantly running wild around here. Cre ativity is always appreciated, and fun is a way of life at the company. Kelly Flock: Toys and games can be found in everyone's cubicle. No one is willing to grow up and forget what it means to have fun. The best products—the ones that are the most fun to play—are generated in this type of environment. No one wants to of Mah-Jongg, was developed by Brodie Jermaine: What's going on at the com Lockard. Brodie worked at Stanford Uni versity, writing educational software for use in classes there. He earned both a pany today? Whiteley: One of our product testers has Bachelor's and Master's degree at Stan ford and while studying there was a mem ber of the varsity gymnastics team, He had an accident while on the team and was rendered a quadraplegic. Shortly after his accident, Brodie became interest ed in the game Mah-Jongg. He saw an op portunity to design and produce a similar game on his personal computer, which came to be known as Shanghai. Shanghai has since been published on more than 30 computer systems worldwide and is a popular arcade game in Japan. Shanghai remains one of Activision Entertain ment's most popular titles. Rampage has become a mega-hit title for Activision. Kelly Flock, the product manager, gave his people a special incen tive to get the 64 product shipping on time. He bet his development and test team that if they made their deadline, he would get a Mohawk. Luckily for Kelly, the group missed their deadline by two Whiteley: Activision puts out action ar cade, adventure, simulation and strategy days. Technical support receives a lot of Kills from Predator players. It seems that most of them don't know how to win the game once they meet the "predator" in the final confrontation scene. We recommend products. We are committed to publishing high-quality software in all popular cate gories. Products that do not meet our watching the movie because it contains a clue to solving this mystery. Another cluo: the player must pick something up and standards are quickly cancelled or sold off to other publishers. use it as a weapon. create a program they wouldn't want to buy themselves. Jermaine: Can you give me some infor mation about your product line strategy? Flock: The company released its first sim ulation product-rF-14 Tomcat in Febru ary of this year. In F-14, you get the real ism found in most flight simulations, but it's a lot more fun to play. Fun is the key word here. We conduct studies to deter Getting the programmer to finish The Last Ninja, was a tough job. One day he decided that he needed a stress reliever. So he hopped in his car, drove to L.A. and spent the day at Disneyland. He didn't tell us about the trip, so we feared the worst when he didn't return our calls. Little did mine what the "fun" and "exciting" ele we know he was simply visiting Mickey ments of a simulation are. Then we con struct a game around these factors, in stead of modeling every aspect of the proj ect after the real thing. The final product contains the best of both worlds. Jermaine: Can you share a few stories about some recent game releases? Whiteley: Ocean Ranger was submitted to us on the 64 by a brand-new development group. The product arrived one day in the mail. Our producers simply could not be Mouse. By the way, Last Ninja 2 for the 64 will be on the market by the time you read this. lieve a product of that quality, nearly com plete, would come by regular mail. We quickly called the developers and worked out a deal to acquire the product. A port to MS DOS commenced shortly afterward. Shanghai, an award-winning puzzle game based on the ancient oriental game 72 JULY 1989 I recently heard a title about Chop 'JV Drop. During the final testing of the pro duct, our people made an unusual discoveiy. The original programmer had added a special feature to the game for the amuse ment of players who happened to stumble across it. If you press a certain combina tion of keys all at the same time, the char acters in C!u>p TV Drop will drop their pants. However, You really don't notice it much because the figures keep right on chopping away at each other. This is a nice little challenge for the consumer who wants to try something different, and the graphics are not X-rated. an interesting hobby. For inspiration, he covers his wall with the most bizarre tab loid headlines you've ever seen. Two of my favorites are "Adolf Hitler Was a Woman" and "Cheeseburger Kills Space Alien." I wonder how this inspires our wacky test ers? By the way, our testers still favor the original Atari 2600 joystick over all oth ers on the market today. How does our graphic artist feed his cre ativity? He adorns his office area with various "blow-up" creatures that hang from the ceiling. Some of his groupies in clude ghosts, skeletons, dinosaurs, clowns, snakes and even an alligator. Some of the folks in technical support are receiving strange phone calls from people they've never met asking for ad vice on things other than their programs. There is a 14-year-old boy, for example, who calls to discuss the problems he's hav ing with his girlfriend. We never thought it was necessary for our technical support teams to take a course in psychology until now. Jermaine: Is it true that Activision has perfected a laser disc game? Whiteley: We recently released the first entertainment CD-ROM title, a graphic adventure game running under Hypercard on the Macintosh computer. The pro duct was called Manhole. It contains over 50 Mbytes of code and features 30 original songs, many of them recorded at a profes sional music studio with live musicians. There was nothing on the market like it, or even close, so people had a hard time comparing it to other things. Many lengthy conversations went on internally, but we decided if Activision Entertainment was going to be a market leader and innovator, the company had to take chances when it saw glimpses of the future. Manhole was finally published, and the story has a happy ending. The product is successful beyond .expectations, and Activision is once again on the cut ting edge of technology. In the future, you may see this game (and similar products) available for other computer systems. Jermaine: Do you have other CD-ROM projects on the drawing board? Whiteley: You'll have to wait and see. Jermiiine: What are your five top-selling entertainment products of all time? Whiteley: Believe it or not, all five of these titles are video games. The market for video games is much larger than for computer games. It's possible to sell more than a million unite of a single title world- Activision Celebrates A Memorable Decade wide. Pitfall!, River Raid, Laser Blast and Freeway all fit into that category. The five top-selling Activision computer games in reverse order are (5) Rampage, (4) The Last Ninja, (3) The Great Ameri can Cross Country Road-Race, (2) Hacker and (1) Ghostbusters. Next: Ghostbusters II Mark Johnson (an Activision producer) gave me the details on the sequel to Activision's best-selling computer game ever. Jermaine: How did you obtain the rights to develop another Ghostbusters game? Mark Johnson: It was the result of our previous arrangement with Columbia Pic tures. We knew there was another Ghostbusters movie in the works, so it seemed like a good idea to create a sequel to Ghostbusters [the game]. By the way, it will closely follow the events of the new movie. Jermaine: Where does the story take place? Johnson: Once again, our heroes are trav eling around the streets of New York tion of the painting, and intends to rule the modern-day world in a truly evii fash ion. The ghosts are his instruments and are somehow tied to a river of green slime that flows beneath the city. This river is gradually growing in size because of "bad vibes," i.e., the New York stereotype of meanness, etc. The Ghostbusters use the Statue of Liberty (a sign of "good") to de feat the ghosts, green s!ime and Vigo. Jermaine: When will the game be re leased? Johnson: The game will hit the market a few months after the movie. Ghostbusters II (the movie) is scheduled for release on June 16. Incidentally, Ghostbusters II (the game) is currently being developed for the City—Manhattan to be precise—and vis iting the Statue of Liberty. Jermaine: What is the sequel's storyline? Commodore 64 and a variety of other sys Johnson: Everything revolves around the portrait of a wicked medieval ruler named As I wrap things up, I'd like to thank the Mediagenk employees past and present for taking time out of their busy schedules to share the secrets of their company. Ifs been a pleasure to work with all ofyou. gj Vigo the Carpathian. This guy was a real slime ball (no pun intended) in his day. He is coming back to life, due to the restora Mediagenk Affiliated Publishers Absolute Entertainment Affiliated publisher since August 1987 Products include: Crossbow and F-18 Hornet Interplay Productions Affiliated publisher since March 1988 Products include: Neuromancer and Battle Chess Company-Owned Publishers Infocom Products include: Zork Trilogy, Zork Zero, Battletech, Shogun, Quarterstaffand Journey Gamester Products include: Pete Rose Pennant Fever, lake Down Activision Entertainment Products include: Rampage, LastNinja2 tems. and F-14 7bmcat Activision Video Games Products include: Stealth, A.TF., Three Stooges, and Bomber Raid BUY A COMMODORE OR COMMODORE-AMIGA COMPUTER, AND AUTOMATICALLY RECEIVE OUR LATEST BUYER'S GUIDE C* Commodore Buyers ' Each issue continues to grow as more and more peripherals and software are becoming available and updated. The solid citizen 64C and 128D as well as the innovative Amiga 500, 2000 and the enhanced more powerful A2000HD and A2500 attract all the best developers. You cannot afford to miss out on using your Commodore computer to its fullest potential with all the tools advertised in these guides. Commodore M A C A Z N E The Commodore and Commodore-Amiga Buyer's Guides are published under the auspices of Commodore Magazine. COMMODORE MAGAZINE 73 icaoe Activision Celebrates A Memorable Decade Activision Tills* formal Commodore 64 /128 Pitfall Beamrider C64 Disk and Amiga Computer Titles Product List in Chronological Order of Release The AdiuUion Decathlon C64 Disk/Cart Pitfall! HERD. Toy Bizarre Pitfall II C64 Cnrt Zenji Tvy Bizarre Pitfall tl H&.R.O. C64 Cart Zone Ranger Zenji Park Patrol C64 Disk/Cart C&ICart C64 Disk C64 DislcCart C64 Disk C64 Disk/Cart C64 Disk C64 CiirL C64 Disk/Cart Beamrider River Raid Space Shuttle: A Journey Into Space Ghoslbusters River Raid Pastfinder lYtitrr Sanction Mindshadow Disk Disk Cart Cart Cart Cart 5/84 5/84 6/H4 fi/84 G/fi4 mi 7/B4 7/84 7/84 7/84 SIM 8/84 9/84 9/84 9'84 9/84 9/84 10/84 10/84 111/84 CM Disk 11/84 12/84 C64 Disk 12/84 Rock W Boll C6-1 Diak Master of the Lamps Web Dimension Alcazar The Forgotten Fortress The Complete Firenorhs Celebration Kit Countdown to Shutdown Fast Tracks Little Computer People The Great American Cross Country Road Race Hacker Borrowed Time C64Diak C64Disk 2/85 3/85 4'85 Hacker Mindshadow Amiga Amiga Garry Kitchen's GameMaker C64 Disk 11/85 Amiga CG4 Disk C64 Disk/Amiga CG4 Diak C64 Disk 12/86 The Computer Game Design Kit Harrowed Time AfarEgoOtakl Music Studio Murder an the Mississippi Alter Ego (Female) Little Computer People Filer's Choice Writer's Choice Planner's Choice IAmTheC-128 The Personal Choice Collection Hacker II: The Doomsday Papers Hacker II: The Doomsday Papers Tans Times in Tonetown The Transformers: Battle to Save the Earth GameMaker Designer's Library: Sports GameMaker Designer's Library: Science Fiction Shanghai Iha Times in Tonetown Shanghai Paper Models: The Christmas Kit Labyrinth; The Computer Game Howard the Duck: Adventure o'l Volcano Island Aliens: The Computer Game Greeting Card Maktr Term Paper Writer Portal Postcards The Last Nmja Gee Bee Air Rally Rampage Ocean Ranger Predator Chop'NDrop F-14 Tomcat Rampage JULY 1989 C64 Disk C64 C64 064 C64 C61 C64 Designer's Pencil 74 CG4 Disk Release Dale C64 Disk C64 Disk C64 Diak C64 Disk 5'85 6'85 7/85 9/85 C(J4 Disk 9/85 C64 Disk 6/85 8.B5 11/85 11/85 C64 Disk C64 D.sk Amiga C84 Disk CG4 Disk C64 Disk C12S Disk CB4 Disk C6J Disk Amiga C6I Disk CW Disk C64 Disk C64 Disk C64 Disk C64 Difek Amiga C(i1 Disk C64 Diak C64 Disk C64 Disk CS4 Disk C64 Disk Amiga C64 Disk C64 Disk Amiga CG4 Disk CG4 Disk C64 Disk C64 Disk C64 Disk Amiga 11)85 2/Hfi 4/86 B/86 5/86 6/86 6/86 G'86 686 6/86 6*86 7/86 8<B6 8/86 9/86 9/86 986 9/86 9/86 10/88 10/86 10/86 11/86 11/86 11/86 11/86 1/87 9/87 9/87 10/87 10/88 8/88 11/8B 11/88 2/89 3/89 64 and 128 Software Reviews/Annals of Rome' Continued from stage 22 phase that your movement of officers and legions into surrounding regions meets success or failure. Here you are more of a spectator than anything else and must view events unfolding on the regional map with a calloused eye. A cursor will appear on the maps and begin moving about as various forces attempt to invade surrounding areas. Meanwhile, messages will be displayed as the results of battles are tallied. Some battles will rage over many years (turns), so the results of such campaigns may be inconclusive from one turn to the next. More often that not, how ever, the strength of your army and the strength of the barbarian army will ap pear, and battle will be swiftly resolved. When the cursor comes under Roman control, you will have the chance to assign officers and Roman troops to the fray. The troops available to you can be Legionnaries (home-grown Roman soldiers), Auxilaries (non-Roman soldiers led by Roman officers), or Limitanei (garrison troops equivalent to Auxilariesl. The makeup of your forces will depend on recruitment, which is accomplished during the econom ics phase (not under player control). All regions allow for recruiting a single type of Roman solder, as discussed above. The makeup of your forces will also impact how effectively your forces fight. For ex ample, Legionnaries are more eflective than Auxilaries in battle. If Rome is sacked—which will happen quite often in the beginning—you can move your captital to another region over which you have control. But getting sacked normally sig nals the beginning of the end. Additionally, events on the screen can be difficult to follow, as you must become very familiar with the regional codes and the map before you'll begin to feel confi dent with the program. Apparently, the creators of this program did an immense amount of research. On the map included with the documentation you'll not only find the identifiers for all the regions, but the actual invasion routes used by many of the nations. You'll also notice that many of the events that unfold across your monitor actually parallel those of history. The Gauls and Cathaginians, for example, will remain heady adversaries during the beginning stages of the game, just as they wore back then. You may also find several petty empires rising and fall ing outside the influence of Rome as the game progresses. Any criticism toward Annals ofRome is not founded on functional cosmetics or Profitable Video" game play, but rather the end reward for playing it. The goal of this program is to prevent the sacking of Rome which, as history tells us, must surely happen; and it will—at one point or another. So the goal of Annals ofRome is to delay Rome's eventual fall as long as possible. Because history often repeats itself, you'll find that no matter what steps you take, or how long you hold out, Rome must indeed fall into ashes, if only because of the growing sophistication and restlessness of the Eu ropean, Asian and Arabic nations which surrounded her. In the end Rome be came—and will become in this game—a bloated, corrupt, bankrupt and over-ex tended nation that had to rely on non-Ro man soldiers and officers for protection. In the end, the fall of the empire became in evitable. So why invest so much time in a game with such predictable results wait ing for you? As I've said before, for much of the game—aside from assigning officers and legions to regions—you are more of a spec tator than an active participant. You have no control over the various campaigns or battles, and must rely on unseen predeter mining factors for much of your success. Historical events and probability also play a big, yet unseen, factor. The documentation does not expound on some of the more critical areas of the game and provides very little information on why things happen as they do. More over, the order in which the game's instructions are presented seems ill-orga nized and sometimes immaterial to game play. Be prepared to spend an inordinate amount of time sifting through the book let to glean needed information that could have been better centralized to one or two pages. they have planned a tentative story- board (showing the important events to be included in the video], they shoot the live video which will normally comprise the bulk of their production. Next they go back to the studio to view the tapes and decide exactly what they will cut and what will remain. Then they'll make any necessary changes to the storyboard. Now they are ready to sit down at the Amiga. First they create the title and credit screens and select fonts and transition ef fects to use. Any special animated se quences featured in the video wiil be cre ated next. Because video production is a business, Chandley says the extent of the special effects he includes depends on what the client wants and how much they are willing to pay. While most of his cli ents are happy with professional titles, credits, labels and transitions alone, he says he will happily spend 12 hours creat ing 15 seconds of sculpted animation if that's what the client wants. The special effects really take the time said Inman, although the basic titling screens can be generated almost instant ly. Tb give his creations a professional look and make a lasting impression on his cli ents, Inman used Cel Animator to create an animated signature title (with a com pany called Captain Video you can imag ine the fun he had with his own logo) which his clients seem to enjoy. As a pro motional bonus, the signature title leaves his electronic business card anywhere the video is shown. Once the computer-created special ef fects, live video and final version of the storyboard are ready, they can mix the two sources (taped video and computer signals) to produce the final video. While The graphics are not dazzling by any means, but war games have never been known for their pretty pictures. You will discover, however, that the characters used on the personnel rosters try to simu late 80-column graphics and are very hard on the eyes after an hour or two, Annals ofRome is interesting in that it shows history can be replayed if the right circumstances permit. Being a history buff, I found it intriguing in that respect. More traditional wargamers will quickly become frustrated by the limited control over military operations, and may want to look elsewhere. Someone once quipped that Rome wasn't built in a day. Any mea sure of long-term success in Annals of Rome may take just about as long to build. Continued from page 56 m the live video is sent through the editing deck, the special effects are loaded into the Amiga, ready to be merged via a gen lock device (during the editing process, you can stop and load dozens of different special effects). An NTSC monitor dis plays what the recording head is receiving from the editing deck and the genlock. Finishing the video is as simple (or as frustrating) as flipping between or mixing the two signals. The magic of a genlock is that not only does it translate the comput er signal into a steady NTSC image, but it also allows the producer to superimpose one image over another. The end result is a broadcast-quality product complete with impressive transition effects (dissolves, wipes and scrolls). COMMODORE MAGAZINE 75 Profitable Video "Broadcast quality" must be the watch words of anyone who wants to do videos commercially. No matter how good your ideas, if they do not meet the standards required for broadcast, you are wasting your time. Not too long ago, broadcast vid eo required %-inch format tapes and ex pensive Y-i-inch TV cameras. Because of improvements in videotape, that size re quirement has shrunk. Inman uses a Vs- inch Super VHS camera, while Chandley video-related software packages. But the more I learned about the complexity and power of video and the role the Amiga can play in its creation, it became apparent that this was not going to be as easy. I found myself physically smothered under an avalanche of video software titles (see page 81). My first effort to get some breathing room was to eliminate all but the really impressive titles. But even after doing satisfies his customers with the tiny new 8mm Sony format. that, I was still left with an intimidating The End Product a few sentences. When it comes to video, the Amiga user is blessed with a bounty of programs from which to choose, in a price range which spans from under 60 to over Once you have your system in oper ation, and you've mastered the hardware and software (and providing you have the talent required to come up with good ideas and translate them into a final product), you are ready to recoup your investment. Although a full-length video movie is not beyond the possibilities of the pro studio we described, most people will achieve more success by aiming their sights a lit tle lower. Tb be successful, John and Bruce agreed that you have to be flexible and imagina tive. Inman does a lot of in-house promos and employee training videos for industry, while Chandley has just signed a contract number of programs—too good to be ig nored, but too complex to cover properly in several hundred dollars. The real problem any user wanting to produce serious vid eos must face is deciding on software. I can say with ail honesty that every pro duct mentioned in "Tools of the Trade" is worth owning. And that's the problem. Normally in a "roundup" article like this, I like to point out programs I think the user should buy and those they should pass up, but this time I can't. And to make with a local cable channel. Neither turns down requests for wedding videos either. the dilemma more perplexing, even as you're reading this, new titles are being added the video shelves. So this time m just mention the good ones I have tried and leave the choice up to you. Depending on where you live, producing just four or five average wedding videos Coaxing a Video To Life could easily generate enough income to recoup your hardware investment. At the time of our interview, Inman was in the process of completing a commercial/ promotional video for a local business as well as a safety training video for the area Chandley and Inman suggest (and my own experience leads me to agree) that any newcomer to the Amiga or video pro duction should avoid buying too many ti tles too quickly. The sensible approach is to start with good paint and titling pro electrical company. Chandley had just fin ished a promo for a ski resort and was lin ing up some in-house instructional videos for a motel chain. In short, restrictions on grams. Both are indispensable tools for se rious video production for obvious reasons. Next add an animation program for squeezing out unique, client-pleasing productions appear to be limited only by the producer's imagination and talent. Of course, lots of us just want to bring life to digitized still photos from the fam programs you'll want a sculpt program to add three-dimensional sophistication to where and how to make money with video ily album or add some fun and sparkle to last year's trip to the beach. The hardware and software tools are ready, what you do with your video studio depends entirely upon your ambition, motivation and tal clips. Once you have mastered these three your productions. I suggest you attempt 3D design last, because even the best 3D program can be cantankerous to subdue. Without exception, the character-gener ating software for the Amiga is simple to use and straightforward in design. There is no reason anyone should have trouble ent adding impressive, animated text to their Video Paradise All of the animation programs I've seen have rendered delightful results, but some When I began this article I planned to interview a couple of video producers, tell you how to set up your own video studio, offer some advice on how to market your 76 videos and end by highlighting the best JULY 1989 videos using the Amiga. are easier to handle than others. As an ex ample, you can generate some amazingly sophisticated sequences with The Director, but you must first mastor a BASIC-like language. If you already feel comfortable with BASIC, this is an obvious candidate for you. But if you are new to computers, for a little more money you might prefer an animator like MovieSetter, Cel Anima tor or Fanlavision. All are amazingly sim ple, since all the options are selected from screen tool boxes or pull-down menus— you just click and animate. Anyone who has witnessed the impres sive, realistic quality of a three-dimen sional rendered animation, will be drawn like a moth to a flame once they witness a sculpting software demo. And that's why I suggest you wait until last to add 3D soft ware—you can get your wings burnt try ing to get your own renderings to fly. The problem is not the software, the problem is learning to think in three dimensions at once and then translating those thoughts to a two-dimensional computer screen. Mastering even the best of these requires a lot of patience and time. But don't lose heart, every single package now on the market has gone through at least one up grade in an effort to reduce the learning curve required to master it. Along with friendlier interfaces, the new batch of 3D rendering software is not only easier to use, but in most cases is faster and offers more features. My personal favorite is Ae gis' Videoscape 3D when used in tandem with Modeler 3D. But my preference is probably biased due to familiarity. After spending a little time with Turbo Silver I was impressed with its speed and quality, so I may change my mind. For the buyer, the important fact is that 3D programs are constantly improving and getting easier to use. The Bottom Line John Inman's professional video studio contains in excess of$16,000 worth of equipment. Inman is proud of the way he
paid for it all. He says that even while he was establishing his business, "none of the money required to buy equipment came from grocery money." Living by the tenet "pay as you go," Inman steadily expanded
his business with money generated by videos. This year his hard work has paid
off; he has a mortgage-free, profitable
business as well as top-notch equipment. Chandley, on the other hand, jumped into video with both feet. He left his old job as a radio announcer, bought all the equipment he needed to go into produc tion and started looking for clients. He
says there were some months when he was a little nervous because there was lit tle work (and even less moneyl coming in.
Profitable Video
after seeing what the system can do today
Bruce used those slow times to learn more about his equipment and the Amiga, so when the next job came, he was better pre
and the success both John Inman and Bruce Chandley have had, I'm ready to jump on the DTV bandwagon.
pared to handle it. Despite a few slow months, his company broke even the first
Making Them Sit up and Listen
year, and he's confident the lean times are behind him.
So far we haven't discussed adding mu sic or sound effects to a video. With the
After spending some time with Inman and Chandley and the different software
animation software at least, sound effects or digitized music can be added dhectly via system options. But creating your own sound effects or music to add to a video is a subject worth an article in itself. Of course, the quick fix for adding sound to a
packages, I was both amazed and dazed at
the state of personal video and at what a driving force the Amiga has become. I can remember hearing lots of predictions in
1985 that the Amiga would be to the desk top video industry what the Macintosh
video is to simply dub over the video's
was to desktop publishing. I didn't pay
soundtrack. But many of you will want to create or capture unique sounds and mu
much attention to the hoopla then, but
sic with your Amiga—for use with your
Tools of the Trade Continued from page 57
good video software for the Amiga user. If anything, a would-be video producer may have difficulty deciding which programs
to buy and which to pass up since there are so many from which to choose.
Overwhelmed, Amazed and Impressed
As I investigated Amiga video software I experienced three sensations: (1)1 was overwhelmed by the number of programs. There are many choices in every software category. (2) I was amazed at the profes sional quality of each. Although the power
levels of the programs span from home
use to broadcast use, the display quality of each was outstanding. (3| I was impressed by the support of the developing compan ies. In the past I've come across companies that have brought a product to market in hopes of reaping a quick profit and then moved on, abandoning their customers. But all of the Amiga video developers I've met seem convinced that the video praduction industry is still in its infancy and that the market for computer-aided graphic programs will continue to widen. True to this vision, most of the compan ies have not only expanded their product lines in the past year, but have also updat ed and enhanced earlier programs to sat
which software to mention and which to pass up. No sooner would I feel I had test ed all the serious programs when I would hear of another new entry in the video market. Because the development of desk top video programs appears to be a neverending saga, I conceded that if I was ever going to finish this article I simply had to stop. Here are a few words about some
great products which I was able to try:
Titling Software I'm Video Plus: The reputation of Pro
Video Plus speaks for itself. When I asked Inman and Chandley what software they recommended for anyone wanting to set
up a video studio the first title mentioned was Pro Video Plus, According to them,
not only is the program powerful but it is easy to use. Inman, who had owned his Amiga for less than a month when he
added this character generator to his sys
mands of their users. For the Amiga user
tem, says lie was doing serious work with the program in less than an hour. Coming from a person who was new to the Amiga computer, such praise speaks well of the program's interface. Recognizing that the user wanted a tool, not a toy, the people at Shereff Systems created a program which offers every feature a professional could want, including: full-screen video, IK col ors per page, 16 fonts (you can add others from other vendors), multi-colored charac ters, 90 special effects, transitions and
these facts translate into plenty of quality
line-definable moves. For backgrounds
production tools to choose from, as well as
the user can load any IFF picture or use live video.
isfy the increasingly sophisticated de
good technical support after the purchase. You might call that a video producer's paradise. The remarks which follow should not be misconstrued as anything other than an effort to highlight the products I've seen in action. The single most frustrating dilem
Both of our experts use the program al most exclusively for titles, credits and live video labels (inserting identifications un
der images like names of people or pro ducts). Chandley is using Pro Video Plus to create stunning, professional-quality
videos as well as other applications. So stay tuned, next month we will talk to some users who are composing and per forming with the Amiga. And they will tell you how to perk up your Amiga's speakers.
To Be Continued The video production companies featured: Captain Video John Inman, owner 162 Twin Lakes Drive Candler.NC 28715
Focal Point Productions Bruce Chandley, owner Box 414 Asheville. NC 28801
m
displays for a local cable network. Inman uses it to add credits and titles to his cli ents' promos and in-house training videos. Both say they picked Pro Video Plus be cause of its quality. "Clients judge my
work by its appearance. If it looks profes sional they are happy," said Chandley, "and to be professional, text and transi tions must look as good or better than
those on the major networks." Video Tiller: This titling program sup ports all possible Amiga screens except HAM. The program will work with either standard Amiga fonts, color fonts or its own special poly fonts. Poly fonts are use ful because they can be easily sized, ex panded, compressed or squeezed in any di rection for some reaJly nice displays. Plus you can adjust your fonts with 20 different special effects. Beyond just generating characters, the program includes plenty of transition tricks as well as a utility pro gram called VideoSeg which is used to play back screens.
TV*TEX3) Even though this character
generator is the least expensive on the
market, it has plenty to offer the begin ning video producer. It supports every screen resolution offered by the Amiga,
and allows text to be rotated, justified and animated. The user can even define the spacing between the lettering as well as
the size, color and font.
Screen Display Software TV*SHOW: This was one of the first screen presentation software products re
leased for the Amiga, and it's still a favor ite for good reason. It offers 50 image tran sition effects, supports speech, color cy cling and overscan displays. Lights! Camera! Action!: The program
boasts 40 transition tricks, supports both standard music and digitized files, HAM COMMODORE MAGAZINE
77
Tools of the Trade display screens, and animated sequences which use the ANIM format. But most us ers will choose Lights! Camera! Action! to create electronic slide shows using either digitized images or drawings created with a paint program. There are no image-cre ation or editing options here. The program uses a script to establish the sequence in
those shown nightly on prime-time TV, it is easy to see why this program is so popu lar. You can create animated sequences with images moving in all directions, com plete with background music and digi tized sound effects. And, of course, there are plenty of screen transition options. Dtiluxel'roductioiis: For the profession al animator DrfuxePmductions includes
which different effects, sounds and images will appear. At first glance, the script edit ing screen may intimidate some users, but
the ability to combine high-resolution graphics with animation. Animation is
it shouldn't. All the program's features can be selected and activated with the
simulation which tracks the director's
mouse.
Animation Software Aegis Animator: No single company
managed with a professional storyboard commands. The program has almost ev ery option a serious video director could want, including overscan, animated title
ducer. Because of their early support of desktop video it is no surprise that my
ability to chain productions to create lengthy or looped presentations. And to give the displays a professional appear ance, it supports hi-res, a full palette of 4096 colors, over 40 special effect wipes, fades and transition options. MacieSetter: MovieSetler from Gold Disk, is one of the newest animation pro grams to come to the market. If I could
first experience with animation came
say nothing else about the program I
through an early version of .Aegis Anima tor—a program that still impresses me.
would have to say it is easy to master. The animator is designed around a what-yousee-is-what-you-get approach. Thus, you
has supported the Amiga's desktop video needs more completely than Aegis. They were among the first software developers
to recognize and embrace the computer's capability and have marketed powerful
tools to address every need of a video pro
The program's greatest strengths are two of its movement techniques cailed "eel" and "metamorphic" animation and its easy-to-master command interface.
The power of metamorphic animation is that it lets you create objects in one scene, then redraw the same object in a second scene, and the program will automatically
and smoothly generate the transforma tion scenes required to animate the changes. Using eel animation, you can create or load standard IFF files and then
"flip" them to create stunning animations. Once you feel comfortable with Anima tor you can use a standard ASCII text edi tor to create or edit animation scripts. An imator's greatest weakness is that it does not provide a simple option for incorporat ing sound effects or music. DeluxeVideo: You cannot talk about Amiga graphics long without mentioning
one of the premier programs supplied by Electronic Arts. Even after four years of change, DeluxePaint (first introduced in 1985) continues to be the paint program
used by most serious artists creating backgrounds and images for animation. With such impressive credentials it was
no surprise that EA's first video offering, DeluxeVideo, was so quickly accepted.
I got my first glimpse of DeluxeVideo at the Consumer Electronics Show in 1987. After seeing how the program could be used to create animated images to rival 78
JULY 1989
see and hear changes to the scenes as they are developed. As backgrounds are loaded, characters are moved or sound effects add ed, the changes are reflected both visually and audibly. To wrap all this complexity around an icon-activated interface, which
is truly intuitive to use, is a welcomed sur prise. After playing with the program's command interface for just a few minutes,
it became apparent that the developers had taken notice of user gripes about the
interfaces used by other animators and tried to make MovieSetter's command in terface better. The program includes op tions to create images, animation speeds up to 60 frames per second (for super
smooth action), stereo sound, a choice of
32 colors and overscan. [Editor's Note: for a complete review of MovieSetter see page
34.]
I'hoton Video Cel Animator: This ani mator allows you to use screen resolutions ranging from 352 x 240 to 704 X 480 pix els as well as HAM and interlace. The pro gram will work with any IFF image and
includes some basic paint editing tools which the user can select to fine tune an imported drawing. This means you can import a frame of your movie and then
duplicate it to the next frame where you can alter its design slightly to create the
illusion of movement (which will appear
when you show the movie!. The final ani
mation is compressed before being saved
to disk, so the movie's size is less than the total of the bytes required to create it (sep arate IFF files).
All of Cel Animator's commands can be invoked with either the keyboard or with the mouse. After you become familiar with the program, you'll probably intu
itively turn to the quick access of the key board. The program allows you to selec tively activate digitized sound effects over frames of the movie as it is shown. I found Cel Animator a delightful, powerful, fiilloption animator with intuitive design that happily disguises its true complexity. Although the program's manual is easy to understand and includes a wonderful tutorial, it suffers from a lack of index and
few illustrations. The Director and Toolkit: This anima tion software system uses a special lan
guage very similar to BASIC to page flip images, generate text, activate animation sequences and cycle color. If you are al ready comfortable with BASIC, this is definitely a program to consider.
For the price, this one is packed with power as well as support for both HAM and overscan displays. Providing you have the talent, this program can help you create videos to rival those produced in Hollywood studios. The Toolkit utility pack adds some new wipe routines, and includes a pie-chart generator, sine and cosine functions to the language, and some of the object-move ment routines in Director. Page Flipper Plus FIX: In addition to
offering real-time animation (up to 60
frames per second), the program includes 76 built-in transitions, plus an option which allows you to design unique ones of your own. Along with standard Amiga
resolutions, the program supports both HAM and HalfBrite. It is perfect for creat ing animated logos, cartoons and special
effects to spice up your videos. Because of the program's flexible design, you are not restricted to animations which will fit on a single disk—animations can span over several disks. The program's script language is easy
to learn because you can either create scripts with a text editor or simply point
and click. I think most users will welcome this dual editing scheme. The novice can use the Workbench-type interface and move to a standard text editor after mas tering the complexity of the program. Because strong colors are so important to eye-catching videos, Page Flipper Plus FIX allows you to change palettes as the animation is running.
Tools of the Trade Fantavision: I really like this program. It uses a point-to-point draw interface similar to those in MwieSetter and Ani mator, but 1 found it easier to use than ei ther of those. Animation here is so simple you can just create an object in one frame (screen), copy it to another where you can change its shape and relocate it. The program's magic is revealed when these two frames
are animated. Fanttnmon will automati cally generate all the images needed to animate and provide transition between the two screens. It is easy to make text and objects move, cycle, rotate, enlarge, and disappear as well as add digitized
sound effects to any frame. Because of the
Turbo Silver 3.0: The interface used in this version of Turbo Silver is an improve ment over the original. Most users will also welcome the ability to first design a two-dimensional object and then use the program's powerful editing tools to render it in three dimensions. Version 3.0 also al lows multiple light sources to illuminate your objects (32,000 to be exact). The quality rendered here is as good as
that created by the existing 3D programs, yet Turbo Silver spits them out in a frac tion of the time required by other true ray-tracing programs. The people at Im pulse are so confident of their program's quality, that they back it with a lifetime warranty and free telephone support. For serious users, the telephone support alone
program's power and easy-to-operate in
may justify the program's asking price.
terface, it is no exaggeration to say the
Forma In Flight II: The biggest com plaint I heard about the original version of this 3D rendering and animation pro gram was that the interface was difficult to master. This update silences some of those complaints although, like all of the 3D products, squeezing out impressive im ages here requires lots of patience and
average user can create a simple animat ed sequence (complete with sound effects) in less than 15 minutes. Penny for penny, this may be the biggest software bargain on the shelves today. As you would expect, the program does have some limitations. While you can load or create bit-mapped images (like IFF pictures created with a paint pro gram) they cannot be altered. Thus IFF pictures are used primarily for back
grounds, although sections of a back ground can be clipped and moved around
the screen just as easily as a standard Fantavision format object
Sculpt 3D: This is the grandaddy of
Amiga 3D programs. Objects created with it are true ray-traced images. This means that every edge of an object is actually a straight line plotted through dozens, even thousands of points in space. Objects cre ated with this program have a lifelike quality which must be witnessed to be ap preciated. Glass images here look like real
glass, metal looks like metal, and reflec tions display exactly what you would ex pect in a reflection. Unfortunately, this quality and perfec
tion is paid for with complexity and time. Most novice users complain that Sculpt 3D is difficult to master and that final renderings can take hours to complete. By the time you read this, Byte-by-Byte will have released their newest 3D program called Sculpt-Animate 4D, which is sup posed to address these two complaints.
perseverance.
The program's manual includes a tuto rial with plenty of samples which is a great help to first-time users. But this tu torial approach also means you'll have to read the entire book to dig out all the in formation you'll need to master the pro gram. This version of Forms In Flight al lows the user to save images as IFF
screens as well as Sculpt images. Once a solid-modeled image has been rendered, the program allows you to animate,
shrink and enlarge as you make it fly around the screen.
VidmScape 3D 2.0: Like most of the video titles, version 2.0 of VideoScape is a refined and improved version of the origi nal. Unlike the original program, you don't have to reload an image every time
you toggle between the image display and the editing screens. Like Forms In Flight, the program uses Phong shading to create
signer, take my advice and start with this program. I haven't seen any 3D package with an interface which could be described as intuitive, but this one comes closest. In addition to allowing the user to view a full-screen display of the image, you can simultaneously draw an object (using any of three different view angles) and open another smaller 3D window to view the ef fects of your action. By simply clicking around the edges of the small display (you can size it like any other window! you can rotate or size the image for the exact view you want. Once the object is finished, you can save it to disk and reload it to be ani
mated by VideoScape. If you own a CAD (Computer-Aided Designl program which supports the Aegis Draw Plus format, you can even load those drawings into Model er 3D and render them into three-dimen
sional objects. 3D Dettign Dink Series: If you want to use sculpted images in your videos but
have neither the patience nor time to cre ate them with one of the programs men tioned, you may want to investigate An
tic's Cyber Design Disk series. The disks contain three-dimensional objects which are the equivalent of 3D clip art.
Each of the five disks in the series con tains different objects like human body parts IHuman Design Disk}, building parts tArchitectuixd Design Disk and Inte riors Design Diskl, robot parts (Micmbot Design Disk) and paraphernalia you might encounter in a science fiction movie (Future Design Disk). If you can find the
part you need for your video, the time saved by using predesigned art will quick ly recover the price of the disk. Interchange: This little utility lets you load an object created with one 3D pro gram and convert it for use by another. This format-changing trick will be appre ciated by anyone who uses more than one
3D program or buys images (created with different programs] from other artists,
Effective Text
ray-tracing (like those done with Sculpt
From the conversations I've had with different video producers there is one sin
3D) can produce better quality images
gle software demand which has not yet
that VideoScape's, I personally am happy
been fully supplied—fonts. And from what I've heard, that demand will probably
ray-traced-like images. Although true
to exchange the difference in quality to gain the greatly decreased rendering time.
never be completely filled. This is true be
The update is priced at five times the orig-
ing a 3D image with it is a real challenge. Happily, Aegis didn't leave the user out in
cause, in an effort to keep ahead of the competition and offer their clients a new image, video producers rely heavily on be ing able to offer different, sharp-looking
nal, but if it allows the user to create Sculpt 3D-quality images easily and quickly, I suspect plenty of video produc ers will jump for it
the cold. They created an entirely new edi
fonts.
tor which takes a lot of the sweat out of 3D rendering called Modeler 3D. Modeler 3D: If you are a novice 3D de
This is a powerful program, but creat
Kara Fonts Headlines: When it comes COMMODORE MAGAZINE
79
Tools of the Trade to video-displayed fonts, the Kara Fonts Headlines collection is king. When I asked
the two pros about creating professional screen texts, they lÂťth jumped on the
Kara Fonts bandwagon.
deoScape 3D or Turbo Silver and move and animate them just like any standard
sculpted object. Like the other two font editors, InterFont is easy to use and allows the use of up to 15 colors.
Although not restricted to use in video creations, the Kara collection of fonts
works well here because of their polished, well-defined, three-dimensional appear
Tek has been around for a while, but con
ance. Each font is defined in color and hi res and displayed in realistic surfaces like
granite, clirume and wood. The only complaint I've heard about the
Kara selection is that there are only 20 fonts from which to choose. The message video producers have for Kara is, "Please create more fonts!" [Editor's Nole: Kara Computer Graphics has just released
Masterpiece Professional Foul Collec tion: For sheer volume, you probably won't find a larger collection of large fonts than this collection from Aronk. Twenty disks are required to store the 110 differ
ent fonts which include four disks filled with color fonts, specifically crafted for video use. Studio Fonts: At this writing, 1 sun aware of only one collection of fonts from
InterActive Softworks which were de signed specifically for video use. The Stu dio Fonts collection contains 14 different
fonts along with some graphics.
Making Your Own Fonts Font-Works: This is the newest font cre ation editor to come to the Amiga system. One of its most powerful features is the ability to slice a letter (or any object) out of any IFF picture and then use it to cre ate unique fonts. For those who have
enough patience to design their own fonts, this is a good place to start. The program has plenty of options including special ef fects like outline, rotate and 3D, plus it
lets you size and scale fonts (maximum 1024x 1024 pixels), and includes a
healthy selection of drawing tools. Calligraplier: This font editor has been
around for a long time and is where I first turn when I want to. tweak a little change in an existing font. Like Font-Works it has
plenty of options and editing tools and supports color fonts. InterFont: If you want to create titles
which can rotate and move through space like the images created by a 3D program, you'll want to consider InterFont. With it you can create fonLs (or small objects, like
a company's logo) which can be used to type lines of 3D images. Then you can
load those lines into a program like Vi80
JULY 1989
Digi-View Gold: Digi-View from Newtinues to get better as newer versions of the software are released. To put this com
bination hardware/software product to work, you'll need a video camera and a well-lit area. Providing you have those two requirements, capturing still images to use in your videos is as simple as point
and click. I began using Digi-View when I became involved with desktop publishing, but have used the same images (saved as IFF files) to create animated short videos
Animator. Beyond being an impressive eel animator, artists who use more than one graphic program will be happy to know
that Zoetrope supports not only the IFF standard, but also accepts images created with VideoScape 3D, Video Tiller and An imator. Two other programs which will be wel comed by the video producer should be on the market by the time you read this. One is called Onion and the other LightBox.
As I understand them, both programs are designed to help the artist quickly sketch and adjust sequences of animation before rendering the final, full-color image. If they perform as promised, both will help the video developer create animation se quences quicker and with more profes sional results.
with Fantavision. For commercial videos the system's obvious use would be to digi tize the logos, symbols, products or person
True 3D
nel your clients want to include in their
impressed me. These electronic glasses wrap a three-dimensional world around
videos.
Tomorrow's Tools By the time you read this, DeluxePaint HI will have been released. This program continues the logical evolution of the De luxe series by adding animation to DeluxePaiirfs toolbox of tricks. According to the folks at Electronic Arts, the update will al low the user to stamp a series of images through a multiple number of cells using the brush option. The feature will also al low the user to define a brush, a distance for it to travel (including three dimen sions), a rotation and the number of ani mation frames to draw the movement
across. DeluxePaint UI will also support 64 colors instead of the standard 32.
Photon Paint artists will be happy to
know tbat version 2.0 of this popular
paint program has just been released, and
it too includes animation capabilities. (Contrary to rumors, the program's cre ator is not in the Israeli army, and is hap
pily working on Amiga software.) I had hoped for a chance to look at Antic Software's Zoetrope before finishing this sidebar, but the review copy promised me was apparently lost in transit. If only half
the hoopla surrounding this one is true, it
should be a program worth investigating. Those of you who were lucky enough to at tend the Super Bowl are already familiar with the quality of animated effects Zoe trope packs, since most of the animations
dispalyed on the stadium scoreboards were created with Zoetrope.
The program was created by Jim Kent who was primarily responsible for Aegis
I can't close without mentioning one hardware item: X-Specs 3D, which truly
you which is so true to life that you can all but touch it. Fve never been a fan of 3D videos or movies. Until trying X-Specs 3D I viewed three-dimensional creations as simply curious images and nothing more. But when viewed through these glasses the images look as real as life itself. When I demonstrated a pair at a user group meeting everyone howled with de
light. Since only one person could view the animation at a time (the interface allows a maximum of two glasses to be used per computer), everyone else had to wait his turn. But that didn't keep the crowd from
enjoying the demo. What kept them laughing was the futile attempts of the person wearing the glasses to palm a pair
of animated cubes as they projected "out beyond the monitor." The 3D illusion the glasses produce is so good, it is difficult to believe you can't touch what you see. All I can say about X-Specs 3D is that they really work. Fm not sure just where they will fit into the future of video pro duction, but anyone who uses them will come away excited about the possibilities.
If Haitex can bring the price down to where everyone could afford a pair, I sus pect the era of true 3D video production will begin. Several companies have an nounced products that support X-Specs 3D, most notably, NewTek recently an nounced that DigiPaint III will support
them. Jeffery Hall reviewed the glasses in our February 1989 issue. If you didn't get a chance to read it, go back and do so, or
better yet get your local Amiga dealer to demonstrate a pair.
g
Amiga Video Product Information A-Squared 6114 La Salle Avenue Suite 236
CiiiiHiinnn li urn. Specialties
HilkIi Enterprises
New Horizons Software
89A Cabot Court
2800 E. Evergreen Blvd.
HauppauKe.NYH788
Vancouver. WA 98684
P,O.Boi4.'H67
Oakland, CA 9-1611
(516)273-0404
1206) 256-8567
15121329-6215 SewTek
(415)3390339 Computer Arts
Impulie, Inc.
Aegis Development
P.O. Boi 529
2210 Wilshire
Opp.AL 36467
6870 Shingle Creek Pkwy. #112 Minneapolis. MN 55430
Suite 277 Santa Monica. CA 90403
(205)493-6312
(612)566^)221
(213)392-9972
Crystal Roue Software
100 Westmore Drive, Unit 11C Reidale, Ontario. Canada M9V 5C3
(818)795-6664
Incognito Software 34518 Warren, Suite 149 Wentlaiul. Ml 48185 (3131462-2148
1416) 744-4246
Designing Minds, Inc.
Inkwell Systems
109 S. Loa Kolilea Avenue Anakin Itcsearrh
3006 N Main
1050-R Pioneer Way El Cajon, CA 92020
Antic Software 544 Second Soeet San Frand9Ki,CA 94107
Logan.IT 84321 (8011752-2501
(415) 957-0886
Digital C real ions
(BOO) 234-7001 (orders onlyl
2865 Sunrise Blvd.
Innuviaion
Suite 103
P.O, Hok 742
Arock Computer Software 1306 E. Sunshine
Springfield. MO 65801 (4171887-7373
(800) 288-2765 (orders only 1 Associated Computer Service
2135 E. Sunshine. Suite 106 Springfield. MO 65B04 (417)687-9923
llassett Geographic
Hiincho Cordova, CA 95742
(916) 344-4825 Discovery Software 163 Conduit St.
Annapolis. MD 21401 (301)268-9877
P.O. Bo* 164
Hopewcll. VA 23860 (804)452-0623
Auhum,AL 36830
Earth Bound Software
(205) 887-9057
P.O. Boi 7710 Santa Cruz, CA 95061-7710
Bruderbund Software 17 Paul Drive San Rafael. CA 94903-2101
Elan Design P.O. Boi 31725
(415)4924500
San Francisco, CA 94131
(8001521-6263 (ordcre only 1
(415)621-8673
Hruwn-Wagh Publishing
Electronic Artu
16795 Lark Avenue. Suite 210
1820 Gateway Drive
Los Gates, CA 95030
San Maleo.CA 94404
(408)395^838
(415)571-7171
(800)451-0900
9442 Capital ofTeias Highway N
Austin, TO 78759
Hnywnrd, CA 94513 (415)538-8355 Vid/a Efftto 3D i Innovision InterActive So ft* o rks 2521 S. Vista Way, Suite 254 Carlsbad, CA 92008 (6191434-5327
Eagle Tree Software
1103 Hudd Avenue
l)yt*-by-Byte Arboretum Plaja 11. Suite 150
(619)440-7666 (619)440-7666
Escape Sequence, Inc. P.O. Box 1101 Troy, NY 12180 (518)274-1547
Austin, TX 78745
115 W. Crane Street Topcka. KS 66603 (9131354-1146 (800)843-8934 (ordersonlyl Oclree Software 311 W 4rjrdStreet, Suite 904
New York, NY 10036 (212)262-3116 O\xi Inc.
3426 Falcon Avenue Long Beach, CA 90807 (21314 27-2OB0
1'eterwn Knlerp rises P.O. Box Kl 4
Milfoni.NHMOH 1603) 673.4009
Progressiie Peripheral* & Software 464 Kalamath Street Denver, CO 80204 (303)82541*4 R& Dl. i'l ■ 'r 'I '
!■ M
Compulcr (irapliioi
fi3fi5 (ireen Valley Circle Suite 317
Culver City, CA 90230 1213) 670-0493
11-24 46th Avenue 2A
Long Wand City, NY nidi
(718)392-4090
The Right Answers tirouu P.O. Boi 3699
Liquid Light
2301 W 205th Street Suite 106 Torrance.CA 90501 (2131618*274
Torrancc. CA 90510 (2131325-1311 ShereffS) items 15075 SWKoll Pkwy.
Suite 0 MeiKill Systems
9500SW Gemini Drive
Beuverton, OH 97005
Beaverton, Oli 97006
15031626-2022
(503)626-8400
Silent Software
(800) 624-6465
Micro Majric
Glendalc, CA 91204 (8181243-0313
261 Hamilton Avenue Suite 320 B
Sun Rite Industries
Palo Alto, CA 94301
(4151327-9107
Hryan.TX 77801
(512)343-1357
Finally Technologies
CLuJ.
25 Van Ness San Francisco, CA 91102
MicroMusiuns
723 E. Skinner Wichita. KS 67211
(415) 564-5903
P.O. Bon 3475
Syndesis
17408 Chatsworth Street
(316) 267-3807
Free Spirit Software
20 West Street Wilmington, MA 01887 (508) 657-5585
P.O. Box 128 Cape Fear Tdeproductions 605 Dock Strwt
Wilmington, NC 28401 (919] 762-8028 Charles Voner Designs 61ClewleyRoad Medford, MA 02155 (617)3964354 Classic Concepts RO. Box 786 Beilingham. WA 98227-0786
58 Noble Street
KuUtown, PA 19530 (215)683-5609 (800) 552-6777 (orders only)
Wacier Technologies P.O. Box 1309
Vancouver, WA 98666 (206)694-1539
Gold Disk 2171 Dunwin Drive, #13 MiBsissauga, Ontario, Canada L5L 1X2
(206) 733-8342
(4161828-0913
Haitcx Resources 206 Carrolllon Park
1200 Wilson Drive West Chester, PA 19380 1215)431-9100
SuiW 1207 Carroll ton, TX 75006
(800) 522-2041 MicruSenrrh
9896 Southwest Freeway Houston. TX 77074
(713) 988-2818
[409)846-1311
True Hnsic, Inc. 39 S. Main Street
Hanover. Ml 03755 (603) 643-3832 Unison World
Mi cmWay P.O. Box 79 Kingston, MA 02.164 (508)746-7341
MlmetU'sCom. Cupertino. CA 95014
2150 Shattuck Avenue Suite 902
Rerkdey, CA 94704
(415)848-6670 VidTech International
2822 NW 79th Avenue Miami.FL 33122
(4081741-0117
(305)477-2228
Mi nil ware International 33 Alliance Blvd.. Unit 1
Verj Vivid
302-1439 Queen Street W. Toronto, Ontario, Canada M6K 1A3
(7051737-5998
(4161537-7222
COMMODORE MAGAZINE
81
Amiga Video Product Information NOTE: Several products perform more than one function (e.g., 3D Modeling and Animation!. Please contact the manufacturer for complete product information.
SOFTWARE PRODUCT
PRICE
COMPANY
DESCRIPTION
Animation Animation: Apprentice 3.2
5295.00
Hash Enterprises
Animation: Editor
$59.95 Hash Enterprises Animation: Effects$49.95
Hash Enterprises
Animation: Flipper
$15.95 Hash Enterprises Animation: Libraries$'24.iir.
Hush Enterprises
Animation: Multiplane
$89.95 Hash Enterprises Animation: Rotoscope$79.95
Hash Enterprises
Animation: Stand
$49.95 Hash Enterprises Animator S 139.95 AmmotioR$99.95
Aegis Development Finally Technologies
Cel Animation
Fantavision
$59.95 Broderbund Software Animation program featuring object-oriented drawing tools, Lightlhx ' 'The Drawing Tool for Animators'$189.00
u & DL Productions
Mandala
$399.00 Very Vivid Interactive viuVu/nni mat ion/music program. Cold Disk Creates 32-color animations with stereo sound. Import IFF digitized sound effects, tweening and transformation. MovieSetter$99.95
Inbetwoening software for creating traditional, hand-drawn
character animation.
graphics or use built-in movie clip files. Photon Video: Cel Animator
S149.95
Microlllusions
Professional 2D animation and sound synchronization.
Photon Video: EDLP
S499.95
Microlllusions
Edit decision list management and transfer tool.
Photon Video: Transport Controller
5299.95
Microlllusions
Controls video hardware to allow automatic single-frame recording of graphics and animation,
Y.octrope: The Animation System
SI 39.95
Antic Software
Use as stand-alone paint program or to animate 3D images,
Clip Art Aegis Art Pak I
$24.95 Aegis Development Clip art and animation eels. Art Companion Volume HIV S29.95 each MicroSearch Hi-res IFF graphics. Art Gallery I and I! S29.95each Unison World Chommap 851,00 Bassett Geographic Cyber Design Disks (34.86 each Antic Software Mapping package; makes basemaps and shows areas shaded according tn data values. 3D objects/forms; Architectural Design Disk, Human Design Disk, Interiors Design Disk, Future Design Disk, Micrabot Design Disk Deluxe Maps Vol. 1$25.00
Computer Arts
U.S. region a I/state maps clip art.
Desktop Artist
$29.95 SunRize 200 Pieces of li&W IFF clip art for use with any paint Express Clip Art$29.95
Brown-Wagh
IFF images.
Associated Computer Services
Maps, backgrounds and symbols.
program.
Graphics Library
$195.00 Impact$89.95
Aegis Development
Presentation graphics and charts.
Media Line Animation Ilachgrounds
$39.95 Free Spirit Software 30 different animation backgrounds for use in video Object Disk *1$19.95
Syndesis
Space SlationlOrbiter
$69.95 B_yte-by-Byte S46.25 interAclivoSoftworks presentations. Full disk of objects for use with Sculpt,'ID and VideoScape3D. Disk of 3D objects in Sculpt scene file formal. Fonts Andre's CalligraFonts Asha's CalligraFonts S89.95 InterActive So ft works BmrdWaDt Font Set$49.95
CLtd.
Borders Font Set
$49.95 CLtd. Business Font Set$49.95
CLtd.
CfilligraFonls Series
$46.25$89.95
InterActive Softworks
Calligrapher 1.05
82
$129.95 Includes Stained G!a.*s. KidsBlox, Bronze, Script. Five packages of Amiga Diskfonts/Colurfonts created by pro fessional artists using Calligrapher. InterActive SoAworks Celtic Open Font Set$49.!>4
CLtd.
Commercial Font Set
SU9.95
CLtd.
EartkBoundFont Collections Vol. 1-3
$15.00 each EarthBound Software Fontset I$34.95
Goid Disk
Flint-Works
$99.95 Associated Computer Services Headline Font Set$49.95
CLtd.
Jet Set Font Set
$49,95 CLtd. JULY 1989 115 desktop publishing fonts for PostScript-compatible or dot matrix printing. (formerly Newsletter Fonts) Professional font editor. High-quality Amiga fonts; setup utilities and documentation included. Eight type styles. Amiga Video Product Information PRODUCT PRICE COMPANY DESCRIPTION Kara Fonts Headlines 879.95 Kara Computer Graphics 3-disk set. 10 hi-res. professional-quality dimensional color Kara Fonts Headlines 2$69.95
Kara Computer Griiphica
2-difik set, 4 hi-res dimensional color fonts, 2-11 sizes each; Chisel Script. Glass, Engraved. Embossed.
fonts, 2 .sizes each.
$69.95 Lion's CalligraFonts Kara Computer Graphics$89.95
InterActive Softworks
Four-disk set of 150 Amiga bitmap Diskfonts in ailed from
Martin's CalligraFonts (formerly Studio Fonts)
$46.25 InterActive Softworks Includes 17 pre-colored, pre-patterned Colorfonts plus 12 Masterpiece Fonts Vol. 1-5$59.95 each
Arock Computer Software
Samt as Headlines but in two smaller sizes. 7-160 points.
monochrome fonts.
Media Line Font Disk 1
$34.95 Media Line Font Disk 2$34.95
Fret Spirit Software
About 25 fonts per volume selected from Masterpiece Profes sional Font Collection. 20-dink .set, i id fonts; also includes clip art and color fonts. 9 bit-mapped fonts for video presentation and DTP. 3D fonts for video pre.se n lull on and desktop publishing.
Novelty CalligraFonts
$69.95 InterActive Soflworks Two-disk sel with 14 Amiga Diskfonts and 16ColorFonls. Olde English Font Sei$49.95
CLtd.
Professional Font Library
$74.95 Classic Concepts 6-disk set, almost 200 styles, (iO distinct fonts 7-100 lines high: monochrome & mullicolor; 85 p. manual; requires 1MB. ProFonts Vol. 1$34.95
New Horizons
Professional fonts.
ProFontsVol.il
$34.95 New Horizons Decorative fonts. Pyre Script Font Stt$49.95
CLtd.
Simple Script Font Set
$49.95 CLtd. StoryBook Capitals 2.0 129.95 Classic Concepts Symbols Font Set$49.95
CLtd.
Tale Fonts I
$69.95 Byte-by-Byte 3D fonts for use with Sculpt-Ammate series; Slot. Tube and Prism. Tatc Fonts I!$69.95
Byte-by-Byle
3D fonts for use with Stulpt-Aniimite series; Bevel, LCD and
Unity Roman Font Set
$49.95 CLtd. Video & Headline Fonts$39.95
Classic Concepts
Video Visions Series
$24.95 each Charles Voner Designs Masterpiece Professional Font Collection$199.00
Arock Computer Software
Free Spirit Software
Ice, Pencil. Skyline, Swisscheese, Jade. Stars & Stripes.
2-disk set of large, decorative capitals; brush fonts to liven up graphics: 50-180 lines high in monochrome and color.
pi-js m i j, r L [ tl J1ILl .
3-disk set; 30 fonts in approx. 80 .styles. Especially for video titling, paint programs; requires 1MB (duplicates disks 3-4 of Pro Font Library).
Two-disk volume (or available as sets]. Back drops'scenery IFF overscan files; full 16 color hi-res; two video fonts included.
VV1: The Tiller
3D fantasy/animal objects fur Sculpt 3D, Videotcapt 3D nr
VV2: The 3D Animator
3Demon,
Characters creations for 2D animations.
VV3: The 2D Animator VV4: The Videographer
Weddings/occasions for use with wedding productions;
borders included. History/geography; colorful world maps.
VV6: The Educator
Pnxlucts'symbols for putting logos or product ads together.
VV7: The Advertiser Zurna Fonts 1,2,3 or 4
$34.95 each Brown-Wagh Each volume contains 3 styles with 6 sizes, 2 resolutions.$59.95
Crystal Rose Software
Produces and processes fractal images with infinite complexity.
$37.00 Eagle Tree Software Fractals Analytic Art Image Processing Butcher Will convert between all Amiga display modes, supports overscan. Impulse. Inc. HAM paint program image processor. DettixePhotoLab SI 49.95 Electronic Arts Allows users to create and manipulate photographic-quality images in 8 levels of resolution. PhotoSynthesis$149.95
Escape Sequence
Dedicated image-processing program; can store up to five images in its buffer.
$69,95 Progressive Peripherals Image enhancement software; will perform 3000 special ef fects on one image. Atgis Images$39.95
Aegis Development
Powerful low-cost paint system.
Amiga Starter Kit
$99.95 Aegis Development Includes paint program, drawing program, animation pro B-Paint$39.95
Finally Technologies
Chroma Paint
$49.95 Designing Minds Diamond PIXmate$99.95
Paint gram and clip art. Fast paint program supports Extra Halflirite.
COMMODORE MAGAZINE
83
Amiga Video Product Information PRODUCT
PRICE
COMPANY
DESCRIPTION Graphics program with split screen magnify, color gradient fills, color cycling, mirror tile and cyclic symmetry options.
DduxePaint II
$99.00 Electronic Arts DeluxiPaint III$149.95
Electronic Arts
Digi-Paint3
Express Pain! 3.0
Onion Photon Paint 2.0 Sprite
S99.95
$139.95 NewTek Brown-Wagh TBD Silent Software$149.95
Micro Illusions
(79.95
Glacier Technologies
$99.95 Upgtflda that includes Animl'aint animation program. Advanced HAM. 4096-color paint program, 100'3 in assembly code for fast response. Full-featured paint program; any size screen, virtual page, unlimited undo redo. 3D. Full-featured second gent-ration HAM paint program with animation and 3D effects. Graphics editing and creation tool. Designed for short editing jobs required by video and graphics professionals. Presentation Aegis Development Create special effects like spins, page turns, venelian-blmds. DeluxeProduct ions S199.00 Electronic Arts Lets users work in overscan and chain productions together; DduxeVidrulS$129.95
Elwlnmlc Arts
Generates animation and titles; adds music/sound to videos.
ANIMagic
includes 40 special effects, 3 clip art disks,
Thr Director
369.95
Manipulates images, text and sound.
Elan Performer
$59.01) Elan Design Supports variety nf Amiga graphics and animation formats$199.0Q
Elan Design
fur display without disk swapping at the press of a key. Inuision
Works with A-Squared's Live! to capture, process and display video effects continuously in real time.
Lights! Camera! Action!
$79.95 Aegis Development Graphics, animation and musk presentation program; in cludes -10 screen transitions.$29.95
Mind ware
PagiFlipper Pirn FIX
$159.95 Mindware Kill 1-screen 1FK image and special effects program with builtin and custom effects. PagtSyrK S100.00 Mi lid ware Creates timed interaction between graphics and audio; allows Pagi'Flipper external MIDI events and computer animation to control each Station Manager$3000.00
Associated Computer Services
Includes Amiga hardware and DellaeProductions, Weather Graphics Map Generator, Weather-Link, a graphics library, character generator and teleprompter.
Toolkit
$39.95 TV*SHQY? Right Answers Group Adds wipes, pie-chart generator to The Director.$99,95
Brnwn-Wagh
Slide show generator; over 50 transitions available.
$249-00 Octree$1995.00
Octree
3D conceptual design and video. 3D conceptual design and video animation (2-4MB reel.
3D Modeling Cuiifiari
Ca iiga ri Profess tonal C-Light
$59.00 Peterson Enterprises Design 3D$99.95
Gold Disk
Farms in Flight II Modeler 3D
$119.00 Micro Magic Ray-tracing system for generating 3D pictures'animations wish shadows, multiple light, sources, and mirror surfaces. Wire-frame modeling program with six line types and .' 6 colors; provides four views with four light sources. :iD graphics/animation software; includes surface patches, texture mapping and Phong shading.$99.95
Aegis Development
3D object-generation system with adjustable windows show ing top, side and front views of your work. Full-featured 3D ray-traced rendering; arbitrary resolution;
Opticks
$199.00 Incognito PageReader 3D$159.95
Mi nil ware
3D rendering program that combines large object library with
$99.95 Byte-liy-Byte 3D modeling and rendering package, includes effects like$499.95
Byte-by-Byte Byte-by-Byte
up to 1G million colors. hlltilYtrt fill" X-Smjfii 'ITI
Sculpt 3D 2.0 Sculpt-Animate 4D Sculpt-Animate 4D Jr.
3Dernon
$99.95 Mime tics Unique 3-D Graphics Professional 3D design and animation software. Integrated 3D design and animation program. WYSIWYG 3D object editor; supports popular rendering pkpjs. 549.95 liay-tracing program blends logical user interface with ani> 3D animation software, real-time playback in 409G colors. S149.9S Turbo Silver 3.0$199.00
True Basic Inc. Impulse, Inc.
VidenScape 3D 2.0
$199.95 Aegis Development mation capabilities. Titling Broadcast Tiller Pro Video Plus TV'TEXT VideoTitlcr 1.1 84 JULY 1989$299.95
Innovision
$299.95 S he re ff Systems$99.95 $149.95 Brown-Wagh Titling for video and graphics; colors, fonts, shadows, back grounds, special effects. Aegis Development With ten fonts and VideoSeg menu-driven slide show program. Amiga Video Product Information — PRODUCT PRICE COMPANY$99.95
Sanitize
DESCRIPTION
Utilities Color Splitter
Electronic color separator for use with Perfect Vision and
other digitizers that need RGB separation. Allows user to print screens or save an IFF files.
Grabbit
$29.95 Discovery Software Forms in Flight Conversion Module$19.95
Syndesis
Interchange
$49.95 Syndeais$119.95
Syndesis
Translated file formats between Scii V and VideoScape 3D.
$19.95 Syndesis InlerFont Turbo Silver Conversion Module Create 3D object fonts from any Amiga bitmap font, (Avail able for S79.95 as upgrade to Interchange.) Add-on module for Interchange. Videotapes Color Cycling Animation S39.95 Cape Fear Teleproductions Explains Amiga color cycling applications. Digitizing for Effect$39,95
Cape Fear Teleproductions
Shows how to capture images with NewTek's DigiView and how to manipulate captured images.
3D Cookbook Video
S24.95
Byte-by-Byte
Introduction to animation on Sculpt-Animate 4D.
Video Graphics Techniques
$39.95 Cape Fear Teleproductions Introduction to Amiga graphics used in video applications. Inkwell Systems Two-touch switch light pen with transparent driver; supports HARDWARE Accessories Amiga Light Pen and Driver S129.95 most Amiga graphics packages. Digi-Droid S79.95 NewTek Facilitates digitizing with Digi-View Gold by turning the filter wheel automatically. flickerFixer S595.00 MicroWay Graphics adaptor; eliminates interlace flicker on the Amiga 2000 and 2500. X-Specs3D$124.95
Ha it ex Resources
3D glasses.
Amiga 2300 Genlock
$399.00 Commodore AmiGen$199,95
Mi me tics
Internal genlock suitable for non-broadcast use. High-quality, no frills genlock/RGB encoder/keyer.
Genlocks
Color Qube: Genlock/Mixer
TBD
Micro Illusions
Genlocks the Amiga and frame buffer to an external video source and mixes all three images in various combinations.
Communications Specialties
Professional-quality, full-featured genlock with S-VHS output.
S 1695.00 S 1865.00
Magni Systems Magni Systems
Genlockable video graphics encoder for Amiga 2000, provides
Magni 4010 Remote Control
$495.00 Magni Systems Allows switch control of 4004/4005 fading and keying functions. Also bundled with 4004: S1995 and 4005:$2165
ProGen
ÂŁ449.95
Progressive Peripherals
Professional-quality genlock for all Amigas. Meets RS-170A
VidTech
Genlock; supports S-VHS.
$749.00 Digital Creations Genlock with sliding fade controls, notch filter, broadcast quality, includes software.$1595,00
Digital Creations
(available July '89) Super VMS genlock, full timability, inter
GENtONE
Magni 4004I4004S (NTSC) Magni 4QQ5I4OO5S (PAL)
Scanlock VSL-l (NTSC) (PALI SuperGen SuperGen Gold
$895.00$995.00 $1095,00 fades, keying and RS-170A output. "S" versions also supply S-VHS graphics only output. standards for broadcast quality. nal board with external control, includes software. Graphics Tablets Summagraphics MM-format graphics tablet with driver and AProDraw U2" x 12") S549.00 R & DL Productions Easy! A500$399.00
Anakin Research
Pressure-sensitive, allows you U> draw with pen or pencil.
scaling software.
Video Digitizers Color Qube: Digitizer
TBD
Microlllusions
Real-time 32,768-color frame grabber; requires Frame Buffer.
ColorQube: Frame Buffer
TBD
Microlllusions
Displays 32,768 colors in full video overscan. Video digitizer captures 2,1 million colors in memory giving
Digi-View Gold
$199.95 NewTek Frame Buffer/Frame Capture 5549,95' S199.95 Mimelics you 100,000 apparent colors on screen simultaneously. Professional-quality video image capture nnd display for full FrameGrnbber$699,95
Progressive Peripherals
Real-time color video digitizer for all Amigas.
FrumeGrabber2S6
$699.95 Progressive Peripherals tiw/(A2000]$450.00
A-Squared
256-gray shade real-time video digitizer. For A500: S399.00 and A1000: $295.00, Perfect Vision$249.95
Sun Rise
Real-lime B&W video digitizer; 16 grey scales or 4096 colors.
Video Toasler
$1595.00 NewTek Real-time, full-color digitizer, real-time digital video effects, fidelity rendering, paint and image processing applications. frame capture, frame buffer and broadcast-quality genlock. COMMODORE MAGAZINE 85 Inside Q-Link/Welcome to My World telephone bill. The costs can mount up very quickly! Continued from page SH room. Don't forget that if you pick a room name that already exists, you'll enter that ware authors from throughout the indus try, or even one of the magazine editors or room instead of creating a new room. As I mentioned earlier, People Connec authors like me. There's something going on in the auditorium just about every night. If you just want to chat or mix it up with good conversation, you might want to tion is one of the most active areas on QLink. However, keep in mind that PC is a Plus Service and costs you an additional charges for accessing one of the local input charge for eveiy minute you spend in that part of the system. Some people might telephone companies offer things like wander into one of the rooms in People will represent what kind of group is using that room or the subject they're discuss ing. There are also private rooms where people can go to be undisturbed while consider this expensive, but just compare the cost per minute for using People Con nection to the cost of using one of the local telephone chat services. I think you'll find that PC is actually much less than these limited local services. While touching on the subject of costs, I should mention that new users of online services like Q-Link should check out talking with other users. their expected local telephone charges be Anyone can create his or her own room—it's really very easy. Simply select the menu function to go to a iwitn and then enter the name of the room you want to create. You'll be transported to the room and then you can E-Mai] your friends or others to let them know where to meet you. If you want privacy, lie sure to use a private room instead of a public room. You might also want to use something unusu al for the room name so that others don't fore signing up for these services. Even though Q-Link and other systems typical Connection. There's a menu function that will let you display what public rooms are currently active and how many people are in each room. Typically Bach mum's name accidentally stumble into your private ly absorbed the cost of using Telenet or Tymnet while you're online, there may still be a local telephone charge to access the local input node to these communica tion services, [f you're not located in a highly populated area close to these in puts, be sure to check what the local or long-distance telephone charges might be to access the system. If not, you may be in for a real shock when you get your next In some cases, you can pay a small monthly charge to your telephone com pany for some sort of special service that may help reduce or even eliminate any nodes. In some parts of the country the Wide Area Calling, Circle Billing or simi lar services that could tum out to be a real bargain in the long run. In my case, the closest input node is in the next county, and I found that 1 could cut the telephone charges from 15 cents per minute to only five cents per minute for a fixed charge of less than$3.00 per month. Over the course of a month that adds up to a rather sizable savings for me, so be sure to check the options available in your area. Gue&s that's it for another month. I've been told there are a number of new ser vices and features in the works, and sever al may even be available by the time you
read this. Fll have more information in coming columns as Quantum releases de tails on each new function. As usual, you can reach me via E-Mail to RBAKER on Q-Link or RBAKER PC on PC-Link if you have any comments or suggestions concerning this column. 3
Letters
Continued,[torn pagt 4
remarkable evasiveness in answering— definitively—the key question: Who is pir ating whom?
Although my personal computing expe rience has spanned years and has intro duced me to a wide variety of "people" and "hackers," my total experience with pirat ed software has been—get this—absolute
ly none! I asked around after reading Fields' article and found that almost ev eryone I know who "hacks," as it were, has
the same experience! Oh, there are an aw ful lot of PD programs and copies of old, obsolete programs floating around out there all right—hut certainly nothing that very many of us even wants! I don't
use pirated stud', my friends don't use it,
and we're certainly not complaining be
cause we buy our programs legitimately!
Heck, we like buying them! So, exactly who is it who is complaining so vociferous
Why, goodness gracious and land sakes
alive, it's all those poor little, itsy-bitsy software companies themselves who
shout, "Pirate, Pirate!" every time they market a new program and slap a $50 or$60 price tag on it! Yes, sir, that's who it is, 86
JULY 1989
all right.
wood took the Sony Corporation to court and claimed that BetaMax VCR's consti
piracy has utterly failed to convince me that such piracy as it actually exists con stitutes a real threat to the software in dustry. Rather, I believe these companies benefit from these sorts of dire percep
tuted copyright infringement of their pro
tions.
This whole flap about "pirates" is so similar to just a few years ago when Holly
ducts—movies. Hollywood howled to the
heavens about how the home VCR was go ing to destroy the movie industry and about how the "movie pirates" spelled fi nancial ruin for the movie makers. They
howled but—thank goodness—nobody lis tened. They lost their suit. What hap pened? Well, the movie industry is stran ger today than it has been in decades! The horrible things the movie moguls proph esied never happened! As a result, even though the movie in
dustry was really saturated with orga nized pirates to a degree not even ap proached in today's computer software
market, consumer prices dropped drasti cally and consumer access to movies was increased dramatically! In short, absolute ly everyone benefitted! Let me conclude by saying that I do not favor software piracy in any form, nor do I
defend it. My considerable library of soft ware is all legitimate, and I'd have it no
other way. But Fields' article on software
The truth is that the major software companies in this country have the re
sources to drive the pirates that may exist right out of business. But until they are willing to change their price structures to reflect this goal, they will forever cry "Pi rate! Pirate!" And I, in the reclusive shade of my magnificent Amiga will forever doubt their complete veracity.
Sincerely,
John W. CovingUm III Savannah, GA Editor's Note: Is the video industry a good
parallel to the software industry? if it is, tlien maybe the software publishers should take a look at Disney. Cinderella was re cently released for sale at a retail price of $19.95 (although they could have easily charged$4935 or more). The result? Ac cording to the April issue ofMagazine and Bookseller, about eight million copies have been sold.
Software Reviews/Roadwars Continued (mm page 17
ing an offensive accruement that becomes a necessity in the later rounds. While not overwhelming, Roadwars' graphics are certainly adequate and effec
tual, providing a true sense of movement as your vehicle hurls down its course. Striped curbs line each side of the road, helping to sell the illusion as they stream past. All the vehicles and obstacles are
well defined and easily recognizable, and move with a realistic flickerless fluidity. (A quick note: the screens depicted on the back of the game box are from a more ad
vanced translation of the contest, not the 64 version. What you see is not what you get.)
One surprising play element is that
your Battlesphere doesn't have an accel
erator or brake. When you're cruising, you move at one constant speed: fast... no,
make that extremely fast. And this is the game's appeal or flaw, depending upon your preference. If your trigger finger is in top shape and you possess that uncanny
Drivers' Assurance
ability to follow three obstacles with two
Amiga Software Reviews/Dragon's Lair~ Continued from page 25
eyes, you won't find a better challenge. Play is fast and fresh, full of all the un compromising reflex tests that arcaders
and best of all there's little difference between the two.
thrive on. But if either you or your part ner fall into the "think-Lhen-act" player
computer gaming field, and will go down
This game breaks new ground in the
category, you may never get out of the
starting block. When a killer ball is bear ing down, a satellite has locked you in its sights and sparks are flying everywhere, you can't stop and plan. All strategy will
have to be decided before the trip begins, or you'll soon be figuring from a stellar scrap heap.
The game's arcade flavor is rounded off with all the desirable extras. Each round is introduced with a scrolling title screen
that gives each street its own personality. The audio track accentuates the action with stunning sound eflccts, and although
the vanity board won't let you .save high scores to disk, you can keep track of any milestones reached during each sitting. Roadwars is a thrilling, high-speed
challenge that stands as one of the tough est drivers' testa around.
Q
You Can Steer Clear of Trouble
really shines as a two-player contest.
Life in this game's fast lane can be short and cruel if you're not familiar with the rules of the road. Read the instruction
Here, victory is dependent upon coopera
tion and communication. Before pushing off down the road, divide the duties.
One player should concentrate on elimi
in history as the first ever cartoon-quality game for any computer system! If you loved Dragon's Lair in the arcade, or wish to own the most awe-inspiring game ever produced for the Amiga, then this is defi nitely the game for you.
Secrets from Dirk
• Always have your sword ready, for Dragon's Lair is full of surprises. • Before you start playing in high-reso lution mode, be sure that you have prior experience in the portion of the game you're playing. If you don't, you will find
play a little awkward, since the screen is condensed so much.
• Since game play happens so fast and decisions must be made so quickly, don't panic if you get killed. Remember, the game sequences happen exactly the same way over and over again. So the next time you approach that same sequence try something different—it just might sur prise you. a *Ako available for the Gomnuxlore 64.
Amiga Software Reviews/Deluxe Print ll~
pamphlet Arcadia provides to familiarize yourself with the enemies' tactics and ten
nating the charged portions of the guard
Continued from pane 33
dencies. Then look over the tips I've listed
rail while the other keeps his sights on all
of the oncoming road obstacles. Both driv ers should also be ready to give verbal
into line to fit all the established stan dards, one other problem slipped
common road hazards. Don't be discour aged if it takes some time to get the feei of your vehicle and its weapons. With a little
"Shields up!" warnings any time the en emy slips through for an unobstructed
patience and practice, you'll soon be cruis ing into Armageddon's Hall of Fame. • If you're off on a solo mission, a com puter-controlled Battlesphere partner will join the ready ranks with full armor and impressive firepower. That's the good news. The bad news is that he will also
• Collect every bonus road arrow you
bring along questionable shooting skills, poor target choice and driving tendencies that border on maniacal. At times, the in
consistencies of this computer companion will prove more threatening than any thing the enemy can toss your way. I've gotten more cooperation and achieved higher scores working alongside an empty Battlesphere. Try it yourself. Even though you're playing alone, choose the two-play er option. The unmanned vehicle will cruise in tandem with yours, even firing whenever you take a shot at the enemy. This consistent, predictable behavior will
allow you to concentrate on more impor tant matters—like the enemy.
life-threatening shot at your Battlesphere. can possibly get your hands on. The in
stant increase in firepower that they pro vide will be an invaluable asset in the latr er rounds.
• Your computerized foe, as indestructi ble as he believes himself to be, appears to
have a glaring offensive blind spot. As long as you position your Battlesphere just a little over one vehicle's length from
either of the outer guard rails, you will re main virtually unnoticed and safe from attack. Most (if not all) of the road obsta cles will zip by, coming close but never making impact with your cruiser. The only attackers you will be left to worry about are the killer satellites, which should be picked off on the horizon, long before they have a chance to move up and zero in on your coordinates. This luxury
express lane will help to put some of those desirable highway miles on your Battlesphere.
through—the first released version of DeluxePrint II was not compatible with AmigaDOS 1.3. If you are a 1.2 user and
bought an early release of DeluxePrint II, you probably haven't noticed any prob lems, since it works perfectly with that version of DOS. Electronic Arts (although
a bit embarrassed by the slip-up) stepped sales of the program long enough to fix the DOS problem. If your version ofDeluxePrint II will not work with AmigaDOS 1.3, contact EA for a free update which is compatible with both 1.2 and 1.3.
Conclusion
Because of it's improvements and en hancements, DeluxePrint II is a worthy and welcome successor to DeluxePrint. It is even easier to use than the original pro gram, has more options, is logically de
signed and produces quality printouts. Computers were meant to be used as tools, and DeluxePrint II turns the Amiga into a very useful one. Most users will be pleased
with the powerful and flexible print shop this programs hangs to the tail of your mouse.
a
COMMODORE MAGAZINE
87
Amiga Software Reviews/Cosmic Relief- Pumping GEQS/Spreading the GEOSpel Continued from page 30
Continued from page 46
will be spent tiying to stay alive, explor ing the game world, and collecting and finding the use for all of the objects. If you
mistake—react quickly: "Exactly. That's the best way to draw. Ever tried drawing with the keyboard?"
can do these three things effectively, you
will win the game. As an extra challenge, choose an adventurer of a different nation ality and try to find out his key item. If you already know how to finish the game, you can try to get higher scores each time you play. Staying alive will be tough until you find out who your enemies are. You
don't really need to draw a game map be
cause the game world is not that compli cated (and for another reason that I'll mention later). Your biggest problem will be finding out what each object does and when to use it. You'll be doing a lot of "thinking," both as an adventurer in the game and as the human player who is guiding that adventurer. I've already mentioned the graphics (par excellence), so let's talk about music and sounds. In addition to using the
graphics of the Amiga well, Cosmic Relief attempts to push the sound chips inside the machine beyond the normal amount of use that you see in games. There is al ways exciting and intense music going on in the background, and the sounds are re alistic and comical. As for using the capa bilities of the Amiga, Cosmic Relief'tries hard and succeeds. The Commodore 64
version of the game does as much as possi ble with the capabilities of that machine, as well.
the farewell letter written by Professor Renegade to the people of Earth 40 years ago and a sealed clue sheet/map. The clue sheet has a complete map of the game world and Professor Renegade's hideaway,
a list of the items and what they're for, and a list of the adventurers and their key items.
Although the sheet tells all, it is not specific as to when and where the objects
are used in the game. If letters or num bers were placed on the map where the ob jects should be used and where they are found, it would help things out a lot. The
only other complaint I have with Cosmic Relief is that the package looks a little on the dull side, rather cheesy. The game
play is flawless and the overall result is a great success. This is the type of game
that should spawn a sequel. Until then, switch nationalities and try again. Now go *Also available for tite Commodore 64. 88
JULY 1989
at this point, but a few will start flailing blindly, saying things like "Yeah, but
icons are hard to grab" and "It takes too
g
my word processor." It's your turn to snort.
Challenge him by saying, "Let me see
some." Be assured, he will be quieted. The next best offensive weapon in your arsenal is the "Boy-does-GEOS-evermake-good-use-of-the-Commodore-lineup" attack. Tell him how GEOS uses the REU. Report to him how easy it is to have
not just two drives on line but even a third
much time to double-click" and other non sense. If you're dealing with one of these, go ahead and slap the guy a couple times in the face. He'll thank you for it later when he comes to his senses.
him how much his software makes use of the 1351 mouse. And finally, throw in a
Final Attack: Graphics Interfaces Are Too Slow
concluding with a statement about the huge GEOS family of supported printers
We GEOS users cower at the word slow.
RAM disk. Talk a while about how you
as well as up-to-date drivers that do dou
If GEOS has an Achilles heel, this is it The tendency, when trying to parry such a
thrust, is to react wildly, to cover up, to de ceive, even to lie about GEOS's true speed.
body will be on the ground and it won't be yours. But we GEOS people have taken
Don't do it. You have two ways to an
some unfair hits in the past: it's tempting
swer this challenge. Way 1: tell him about
to give a couple kicks to make up for pre vious wrongs. I sympathize, but don't. Re
the REU. Do this even if you don't have one. Trust me, an REU is more than just a wonderful piece of computer hardware— it's a piece of metal fashioned to fit perfect ly over GEOS's heel. Of course, if your opponent is smart (and if he has any spunk left in him), he'll retort that he doesn't plan to spend any
more money on his system. This is the fa mous Nada-Moola Maneuver. Nothing de flects this as well as the even more famous Gotta-Droola Enticement. 11) employ it you must be prepared with
at least one really snazzy geoPaint, geo-
The final things I want to discuss are the inclusions and game package. Along with the game manual, you get a copy of
off and save the world!
Most non-users will give up on this tack
saying, "Yeah, I can do some of that with
Write, or best of all, geoPublish document that you printed out on your dot matrix printer. Better yet, get one done up on a laser printer using one of the many laser printing services. Hold it in front of your opponent's eyes. Speak softly but authori tatively and say: "Can you do this with
Speedscript?" (Speedscript, for those new ones amongst us, is a word processor that first appeared as a type-in program in a magazine. Many GEOS-haters are Speedscript users.)
The beauty of the Gotla-Droola Entice ment is that it moves you from defense to offense. At this point, it's good to polish
him off. The offensive moves are easy to learn, highly effective, and few in number.
I assure you, at this point in the duel a
member, we are trying to convert this hea then, not kill him. If, by some Rasputin-like freak occur rence, he just won't admit defeat, you should go with the offensive weapon num ber 3: Product Professionalism. Start with program integration. Ask him if he has any applications that will share data from notepad to spreadsheet to charting to da tabase to paint program to infinity? Then mention all the user support available in magazines (complete columns dedicated to the product) and Q-Link. Finally, dwell on the quality of Berkeley's documenta tion, possibly the best in the Commodore
world. Read aloud from a GEOS manual, referring often to the clarity of the writing
and the voluptuous number of illustra tions. We GEOS folks are refined people.
After disarming and defeating our foes, we change from fighter to friend. This is the last step in the conversion process. Take him to your house and let him play with GEOS a while. Show him your favor ite tricks. Lend him your mouse for a day (well, maybe that's going too far). And be sure to give him information how he can
Gotta-Droola is the number one offen sive weapon. We simply must show the
If you employ these techniques, you can bet the entire Commodore community will be a-buzz with even more GEOS in terest than there already is. You will be fa mous for having been such a good person, but deep down you and I know your true
non-GEOS person the output that we can
motives: you wanted more GEOS stuff.
get with our humble little Commodore systems. He may attempt to defend by
Don't tell anyone. Just enjoy Pumping
Counterpoint: Take This,
and That and More
GEOS.
n
Fishing for tiie Death Angel Continued from page 43
Atabek, who did Rings ofZiflin in 1986, this one takes place in a far more complex and detailed world: six towns and villages,
plus ten dungeons that contain a total of
can explore while Spellcasters learn their spells. In battle, you'll face several monsters, each represented by its own icon in a sim
ply-illustrated combat area. You direct each party member's actions individually,
54 levels. There are 25 volunteers from which to choose your party. All are prerolled (but you can change your charac ter's name) and ready to rock. I like this form of party creation, since they're all armed and equipped from the outset. The aerial-view maps and ability to converse
but the process won't wear you down as in Pool—and a battle rarely takes more than a few minutes to resolve. Many actions, such as long-range attack spells, are effec
with characters (by typing in a few words) are reminiscent of the last two Ultimas,
out of the way to duck a sword or arrow,
but Magic Candle makes many innova tive contributions to the genre.
Well, Isn't that Special?
"Specials" endow this fantasy world with its own personality and charm. There you go, trekking down the road in search of Ores to slay. Abruptly, the map is re placed with a first-person illustration like those seen in graphic adventures, showing your party halted at a washed-out bridge. Use a rope at this point, and it sails across
the chasm; your characters then slide along it to the far side. Other events are often illustrated in this manner, providing a bit of relief from all that delving, slaying and mapping. Graphics are average for such a game: not as detailed as Questron,
but offering lots of spot animation and finer touches inside towns and so on. Mapping, however, won't be as much of a problem as in many quests, for you've got auto-mapping in the dungeons. There's also a View command that drops a mini-map of the section of Deruvia in
tively animated and beefed up with good sound effects. Another novelty is the way your crew and the monsters often jump
then move back into their original posi
tion.
The interface is among the most power
ful and easy to learn that I've seen in an RPG, especially one with so many com mands (a total of 44). Rows of options (walk, use, search and so on) appear at the bottom of the screen, similar to the verti cal menu of Questron II. But when you en ter a new location, some of the choices are replaced by new ones. There are three dif ferent ways to select a command, and an other convenient aspect of this interface is that you don't have to memorize the key
strokes that execute each command. Be sides allowing you to save up to four games on a disk, the program enables you to name each one. For years, I considered originality the most important criterion when reviewing a new title, but I've finally realized that
the key factor is really how much fun you have playing it. So if it's an epic quest you're seeking, The Magic Candle—with its inventive plot (none of this "find and slay an Evil Wizard" business) and nu merous innovations—is the light at the
and not such a pain. For one thing, you
can divide the team into several smaller ones (as in Wasteland), so the Fighters
draw your images. You also have the abil
ity to load and use standard IFF pictures and brushes. When you have created a frame, you simply move on to the next until your en tire set is created. A "registration mark"
option is provided to help you line up all of your frames. Of all the features in Movie-
Setter, the Set Editor is the weakest; its design methodology could have been bet ter. For example, there is no indicator to display how many faces are in a given set or what number face in the series is cur rently being displayed. If you want to draw an animated figure that completes its movement in ten frames, you have to manually keep track of which frame you are currently drawing. While you can load previously created sets, you cannot load sets saved in standard IFF ANIM format. This makes it very difficult if not impossi
ble to use images created from other sources, such as digitizers.
Finally, it would have been nice if an option were available to allow an image
you have drawn to be copied to die next frame in the series automatically. As pres ently designed, you have to remember to copy the frame to the buffer, advance to
the next empty frame, and paste the saved image into the buffer.
The 68-page manual is informative, but like most programs of this type, the only
efbe ijkbdlfst. Open upxfrn ejtqfotfs and
and provides a simple way of creating ani
follow instructions. Tb get past poison gas
mations for video productions. While it is obviously designed primarily for cartoon animations, it can be used for any applica tion that requires moving objects over a background. While SMUS music sound track support capabilities would have
qfbsmt into dungeons. Build up Charisma
more conveniently performed in Candle,
right edge of the screen, a double vertical row of icons represents various drawing tools. Using these tools you can create geometric shapes, fill areas and generally
the plane, search uvscbot and qpdlftit of
Clues of the Month Club
ings. Combat and magic are easy to learn
Camp, as in Pool ofRadiance, but this is
Continued from page 34
way to learn is by trial and error. The manual does contain some chapters which discuss the principles of animation and of fer useful tips. MovieSetter includes both a program disk and a clip-art disk contain ing a nice selection of animated charac ters. Neither of these disks are copy-pro tected, and Gold Disk provides a public domain "player" program, so your produc tions may be freely distributed. MovieSetter is an easy program to use
which you're currently lost, stuck or just meandering about. By comparing this with the full-color map that comes with the game, you can quickly get your bear
and conduct, there are four books of mag ic, each with a particular type of spells. (You can find them or buy more books from Wizards in different towns.) Most are the standard attack or defend spells, but Atabek tossed in a few new ones that you'll find as useful as they are unusual: cast Locate, and flashing skulls reveal the location of all nearby monsters; Vision turns a door to glass, so you can see what kind of monsters are inside. Before you can cast a spell, it must be learned in
Amiga Software Reviews/MovieSetter
end of the tunnel. The Magic Candle: Take nfejdjof and to at least 30 before questing far from Port Avura.
Pa/ice Quest II: Tb disarm the bomb in
es in the sewer, quickly go east, then
south. Go south again, then west and get the gas mask from the red box. Might & Magic II: An easy way to earn
items and experience: drink from Magic Fountain west of Atlantium to boost abili ties to 100, then fly to D-2 and go to 6,8.
Kill Mandagaul, the Court Mage and Bowman for 6500 points, gold and magic items. (Tb decode clues, count one letter back.) H
been nice, the ability to use digitized
sound effects enhances the final produc tion. Although I am not an artist by any means, I was able to use MovieSetter with existing computer artwork to create some entertaining animations. COMMODORE MAGAZINE
Q 89
HOW TO ENTER PROGRAMS The programs which appear in this magazine have been run, tested and checked for bugs and errors. After a pro
brackets. Refer to this chart whenever you
zero to 255 to be poke-able. For example,
aren't sure what keys to press. The little graphic next to the keystrokes shows you
the statement POKE 1024,260 would pro duce an illegal quantity error because 260
gram is tested, it is printed on a letter
what you will see on the screen.
is greater than 255.
quality printer with some formatting changes. This listing is theo photo graphed directly and printed in the maga zine. Using this method ensures the most error-free program listings possible.
Whenever you see a word inside brack ets, such as | DOWN |, the word represents a keystroke or series of keystrokes on the keyboard. The word I DOWN I would be entered by pressing the cursor-down key.
If multiple keystrokes are required, the number will directly follow the word. For example, [D0WN4] would mean to press the cursor-down key four times. If there
SYNTAX ERROR
Most often, the value being poked is a variable (A,X...I. This error is telling you
encountered while entering a program.
variable is being read from data state
This is by far the most common error
Usually (sorry folks) this means that you have typed something incorrectly on the line the syntax error refers to. If you get the message "?Syntax Error Break In Line 270", type LIST 270 and press RETURN. This will list line 270 to the screen. Look for any non-obvious mis
are multiple words within one set of
takes like a zero in place of an 0 or viceversa. Check for semicolons and colons re versed and extra or missing parenthesis. All of these things will cause a syntax
brackets, enter the keystrokes directly
error.
after one another. For example, [DOWN,
RIGHT2] would mean to press the cursordown key once and then the cursor-right key twice. Note: Do not enter the commas.
In addition to these graphic symbols, the keyboard graphics are all represented by a word and a letter. The word is either SHFT or CMD and represents the SHIFT
There is only one time a syntax error will tell you the "wrong" line to look at. If the line the syntax error refers to has a function call (i.e., FN A(3]), the syntax error may be in the line that defines the function, rather than the line named in the error message. Look for a line near the beginning of the program (usually)
ments, then the problem is somewhere in the data statements. Check the data
statements for missing comma1? or other typos.
If the variable is not coming from data statements, then the problem will be a lit tle harder to find. Check each line that
contains the variable for typing mistakes.
OUT OF DATA ERROR
This error message is always related to
the data statements in a program. If this error occurs, it means that the program has run out of data items before it was supposed to. It is usually caused by a prob lem or typo in the data statements. Check first to see if you have left out a whole line of data. Next, check for missing commas
between numbers. Reading data from a
one of the letters on the keyboard. The combination |SHFT E | would be entered by holding down the SHUT key and pressing the E. A number following the letter tells you how many times to type
tion following it. Look for a typo in the equation part of this definition.
page of a magazine can be a strain on the brain, so use a ruler or a piece of paper or anything else to help you keep track of where you are as you enter the data.
ILLEGAL QUANTITY ERROR
OTHER PROBLEMS
the letter. For example, ISHI'T A4,CMD B3] would mean to hold the SHIFT key
This can also be caused by a typing error,
key or the Commodore key. The letter is
and press the A four limes, then hold
down the Commodore key and press the B three times. The following chart tells you the keys to press for any word or words inside of
that has DEF FN A(X) in it with an equa
This is another common error message.
but it is a little harder to find. Once again, list the line number that the error mes sage refers to. There is probably a poke statement on this line. If there is, then the error is referring to what is trying to be poked. A number must be in the range of
Jj -'ICLEAHr-SHlJTEDCLR/HOME jj] "[DOWNI'^CUBSORDOWN n "[upr-cursor up
JJ "|GRE£Nr-CONTROL6 Q ■[BLUE]"-CONTROL7
H "[¥ELLOW1" = CONTROL 8
EJ lEUGHTT-CURSORRIGHT
Q '[ORANGEf- COMMODORE 1
H 11|LEFT1"-CURSOR LEFT B-lRVBf-CONTROL 8
0 "IL RED|" - COMMODORE 3
■ "|RVOFF]"-CONTROL0
P "IBROWN]"-COMMODORE 2
H-IC-RAYl!11 -COMMODORE A
H "IBLACKI1--CONTROL 1
E9",GRAY2r-COMMODORE 5
S ■ IUKDI1-= CONTROL 3
I] |L GREEN|" = COMMODORE 6 f]"|L BLUEI"- COMMODORE 7
[I "IWHITE]"-CONTROL 2 l"» CONTROL*
H
"iGRAYS]1 ■ - COMMODORE S
_
.-
-.
[j"|F5!"-F5
|j"IF7r-F7 E|"|POUND|"-ENaUSH POUND
Q"|SHFT "|"-P[ SYMBOL ft]1-!'I"-UP ARROW
GRAPHIC SYMBOLS WILL BE REPRESENTED AS EITHER THE LETTERS SHFT (SHIFT) AND A KEY riSHFT Q.SHFT J.SHFT D.SHFT S]") OR THE LETTERS CMDR (COMMODORE) AND A KEY ("[CMDR Q.CMDR
G.COMDR Y.CMDR H]"). IF A SYMBOL IS REPEATED, THE NUMBER OF
REPrTTTIONS WILL BE DIRECTLY AFTER THE KEY AND BEFORE THE
COMMA riSPACE3,SHFT S4.CMDR M2|"). JULY 1989
It is important to remember that the 64
and the PET/CBM computers will only ac
cept a line up to 80 characters long. The VIC 20 will accept a line up to 88 charac
ters long. Sometimes you will find a line in a program that runs over this number
of characters. This is not a mistake in the listing. Sometimes programmers get so carried away crunching programs that they use abbreviated commands to get more than 80 lor 88) characters on one
H-'IKOMEr-UNSHFTED CUV HOME ^ "IFURPLEI11-CONTROL 5
90
that this variable is out of range. If the
line. You can enter these lines by abbrevi ating the commands when you enter the line. The abbreviations for BASIC com mands are on pages 133-134 of the VIC 20 user guide and 130-131 of the Commodore 64 user's guide.
If you type a line that is longer than 80 (or 88) characters, the computer will act as if everything is ok, until you press RE TURN. Then, a syntax error will be dis played (without a line number!. Many
people write that the computer gives them a syntax error when they type the line, or
that the computer refuses to accept a line. Both of these problems are results of typ
ing a line of more than 80 (or 881 charac ters.
How to Enter Pragrams"
THE PROGRAM WONT RUN!! This is the hardest of problems to re
solve; no error message is displayed, but
the program just doesn't inn. This can be caused by many small mistakes typing a program in. First check that the program was written for the computer you are us
ing. Check to see if you have left out any lines of the program. Check each line of the program for typos or missing parts. Fi nally, press the RUN/STOP key while the program is "running". Write down the line
the program broke at and try to follow the program backwards from this point, look
ing for problems.
IF ALL ELSE FAILS
You've come to the end of your rope.
You can't get the program to run and you can't find any errors in your typing. What do you do? As always, we suggest that you try a local user group for help. In a group of even just a dozen members, someone is bound to have typed in the same program. The user group may also have the pro
The name of the program The issue of the magazine it was in The computer you are using
gram on a library disk and be willing to make a copy for you.
possible) All of this information is helpful in an
If you do get a working copy, be sure to compare it to your own version so that you
can learn from your errors and increase you understanding of programming. If you live in the country, don't have a local user group, or you simply can't get any help, write to us. If you do write to us, include the following information about the program you are having problems with:
Any error messages and the line numbers
Anything displayed on the screen A printout of your listing (if
gram doesn't work. A letter that simply states "I get an error in line 250 whenever I run the program" doesn't give us much to go on. Send your questions to: Commodore Magazine 1200 Wilson Drive
West Chester, PA 19380 ATTN: Program Problem Have fun with the programs!
Qj
HOW TO USE THE MAGAZINE ENTRY PROGRAMS" The Magazine Entry Programs on the next pages are two BASIC machine language programs that will assist you in
SYS4867 on the 128. The checksums for each line are the same for both the 64 and 128, so you can
entering the programs in ttiis magazine
enter your 64 programs on the 128 if you'd
correctly. There are versions for both the
like.
Commodore 64 and the Commodore 128. Once the program is in place, it works its magic without you having to do anything else. The program will not let you enter a
line if there is a typing mistake on it, and better yet, it identifies the kind of error for you.
Getting Started
Type in the Magazine Entry Program carefully and save it as you go along (just
in case). Once the whole program is typed in, save it again on tape or disk. Now RUN the program. The word POKING will appear on the top of the screen with a number. The number will increment from 49152 up to 49900 (4864-5545 on the 128)
and just lets you know that the program is running. If everything is ok, the program will finish running and say DONE. Then
type NEW. If there is a problem with the data statements, the program will tell you where to find the problem. Otherwise the program will say "mistake in data state ments." Check to see if commas are miss ing, or if you have used periods instead of commas. Also check the individual data items.
Once the program has run, it is in
memory ready to go. To activate the pro gram type SYS49152 (SYS4864 on the 128), and press RETURN. You are now
ready to enter the programs from the magazine. To disable the Entry Program, just type KILL | RETURN1 on the 64 or
Typing the Programs All the BASIC program listings in this magazine that are for the 64 or 128 have an apostrophe followed by four letters at the end of the line (e.g., 'ACDF). If you plan to use the Magazine Entry Program to enter your programs, the apostrophe and letters should be entered along with the rest of the line. This is a checksum that the Magazine Entry Program uses.
Enter the line and the letters at the end and then press RETURN, just as you nor
mally would. If the line is entered correctly, a bell Is sounded and the line is entered into the computer's memory (without the charac ters at the end).
If a mistake was made while entering the line, a noise is sounded and an error message is displayed. Read the error mes sage, then press any key to erase the mes sage and correct the line.
IMPORTANT If the Magazine Entry Program sees a
mistake on a line, it does not enter that line into memory. This makes it impossi ble to enter a line incorrectly.
Error Messages and
What They Mean
There are five error messages that the
Magazine Entry Program uses. Here they
are, along with what they mean and how
to fix them.
NO CHECKSUM: This means that you forgot to enter the apostrophe and the four letters at the end of the line. Move the cursor to the end of the line you just typed and enter the checksum.
QUOTE: This means that you forgot (or added) a quote mark somewhere in the
line. Check the line in the magazine and correct the quote. KEYWORD: This means that you have either forgotten a command or spoiled one of the BASIC keywords (GOTO,
PRINT..) incorrectly. Check the line in the magazine again and check your spell ing.
# OF CHARACTERS: This means that you have either entered extra charac ters or missed some characters. Check the line in the magazine again. This error
message will also occur if you misspell a BASIC command, but create another keyword in doing so. For example, if you misspell PRINT as PRONT, the 64 sees
the letter P and R, the BASIC keyword ON and then the letter T. Because it sees the keyword ON, it thinks you've got too many characters, instead of a simple mis spelling. Check spelling of BASIC com mands if you can't find anything else wrong.
UNIDENTIFIED: This means that you have either made a simple spelling error, you typed the wrong line number, or you typed the checksum incorrectly. Spelling
errors could be the wrong number of spaces inside quotes, a variable spelled
wrong, or a word misspelled. Check the line in the magazine again and correct the mistake. a COMMODORE MAGAZINE
91
Magazine Entry Program—64 for S9.95. To order, cinilat-1 l.oailitai at I-8O0-831-2694.
10 20
PRINT"[CLEAR]POKING P=49152
:REM
-";
SC000
(END
AT
49900/SC2EC) 30
AS:IF
A5="END"THEN
40
L=ASC(MID§(AS,2,1))
50
H=ASC(MIDS(AS,1,1))
60
L=L-48:IF
L>9
THEN
L»L-7
70
H=H-48:IF
H>9
THEN
H=H-7
80
90
110
PRINT"[HOME,RIGHT12]"P;
IF
H>15
OR
L>15
:PRINT"DATA
THEN
ERROR
IN
PRINT LINE";
1000+INT{(P-49152J/8):STOP 100
B=H*16+L:POKE :GOTO
110
IF
P,B:T=T+B:P=P+1
30
TO86200
THEN
:PRINT"MISTAKE
IN
PRINT DATA
-->
CHECK
1032
DATA
02,4C,74,A4,4B,4 9,4C,4C
1033
DATA
91,91,0D,20,20,20,20,20
1034
DATA
1035
DATA
20,20,20,20,20,20,20,20 20,20,20,20,20,20,20,91
1036
DATA
0D,51,55,4F,54,45,00,4B
1037
DATA
45,59,57,4F,52,44,00,23
1038
DATA
20,4F,46,20,43,46,41,52
1039
DATA
41,43,54,45,52,53,00,55
1040
DATA
4E,49,44,45,4E,54,49,46
1041
DATA
49,45,44,00,4E,4F,20,43
1042
DATA
48,45,43,4B,53,55,4D,00
1043
DATA
C8,B1,7A,D0,FB,84,FD,C0
1044
DATA
09,10,03,4C, 84,Cl,88,88
1045
DATA
88,88,B8,B1,7A,C9,27,D9
1046
DATA
13,A9,00,91,7A,C8,A2,00
1047
DATA
B1,7A,9D,3C,03,C8,E8,E0
1048
DATA
0 4,D0,F5,6 0,A9,0 4,4C,CA
1049
DATA
C0,A0,00,B9,00,02,99,40
1050
DATA
03,F0,F0,C8,D0,F5,A0,00
1051
DATA
B9,40,03,F0,E6,99,00,02
1052
DATA
C8,D0,F5,20,96,C1,4C,12
1053
DATA
C2,A0,09,A9,00,99,03,C0
8D,3C,0 3,88,10,F7,A9,80 85,02,A0,00,20,58,Cl,20 8 9,C1,2 0,ED,C1,E6,7A,E6
1054
DATA
1055
DATA
1056
DATA
1057
DATA
7B,20,7C,A5,A0,00,20,80
1058
DATA
C0,F0,D0,24,02,F0,06,4C
1059
DATA
1060
DATA
1061
DATA
1000
DATA
4C,1F, C0,00 ,00,00
1062
DATA
A8,C0,4C,CE,C1,C9,22,D0 0 6,2 0,8D,C0,4C,CE,C1,20 BA,C0,4C,CE,C1,A0,0 0,B9 00,02,20,74,C0,C8,90,0A
1001
DATA
00,00, 00,00 ,00,0D ,00,21
1063
DATA
18,6D,0 7,C0,8D,0 7,Cfl,4C
1002
DATA
1064
DATA
1003
DATA
C1.27, C1,2F ,C1,3F ,C1,4C C1,EA, EA,EA ,4C,54 ,C0,A2
1065
DATA
EF,C1,88,A2,0[!,B9,00,02 9D,00,02,F0,04,E8,C8,D0
1066 1067
DATA
DATA
1068
DATA
19,9 0,0 6,8D,0A,C0,4C,1C
A0,05, B9,A2 ,E3,99 ,73,00 88,10, F7,A9 ,00,8D ,18,D4
1069
DATA
1070
DATA
1071
DATA
1072 1073
DATA
C0,68,6D,08,C0,8D,0B,C0
DATA
1074
DATA
C0,38,E9,19,90,06,8D,0C
1075
DATA
1076
DATA
DATA
120
STATEMENTS":END
PRINT "DONE": END
1004
DATA
05,BD, 19,C0 .95,73 ,CA,10
1005
DATA
1006
DATA
F8,60, 60,A0 ,03,B9 ,00,02 D9,04, C1,D0 ,F5,88 ,10,F5
1007
DATA
1008
DATA
1009
DATA
1010
DATA
1011
DATA
4C,EF, C0,E6 ,7A,D0 ,02,E6 7B,4C, 79,00 ,A5,9D ,FW,F3 A5,7A, C9,FF ,D0,fc;D ,A5,7B
1012
DATA
1013
DATA
1014 1015 1016
DATA DATA
00,02, 20,74 ,C0,90 ,DC,A0 00,4C, A9,C1 ,C9,30 ,30,06 C9,3A, 10,02 ,38,60 ,18,60 C8,B1, 7A,C9 ,20,D0 ,03,C8
1017
DATA
1018
DATA
1019
DATA
1020
DATA
1021
DATA
1022
DATA
1023
DATA
DATA
D0,F7, B1,7A ,60,18 ,C8,B1 7A,F0, 37,C9 ,22,F0 ,F5,6D
1077
1078
DATA
1079
DATA
1080
03,C0, 8D,03 ,C0,AD ,04,C0 69,00, 8D,04 ,C0,4C ,8E,C0 18,6D, 05,C0 ,8D,05 ,ca,90
1081
1084
DATA
1085
DATA
1082 1083
1024
DATA
03,EE, 06,C0 ,EE,09 ,C0,4C CE.C1, 18,6D ,08,C0 ,8D,08 C0,90, 03,EE ,07,C0 ,EE,0A
1086
DATA
1025 1026
DATA
C0,60, 0A,A8 ,B9,0F ,C0,85
1087
DATA
DATA
FB.B9, 10,C0 ,85,FC ,A0,00
1088
DATA
81,20,DF,C2,A9,80,20,DF
1027
DATA
1089
DATA
1028
DATA
1090
DATA
C2,4C,D9,C2,2 0,A9,C2,A9
1029
DATA
A9,12, 20,D2 ,FF,B1 ,FB,F0 06,20, D2,FF ,C8,D0 ,F6,20 BC,C2, 20,E4 ,FF,F0 ,FB,A0
1091
DATA
1030
DATA
18,B9, 08,Cl ,20,D2 ,FF,88
1031
DATA
10,F7, 68,68 ,A9,00 ,8D,00
1092 1093
DATA
92
JULY 1989
4C,4B,CB,98,4 8,68,4C,CA C0,A9,20,8D,00,D4,8D,01 D4,A9,0 9,8D,0 5,D4,A9,0F 8D,18,D4,60,20,A9,C2,A9
ll,20,DF,C2,A9,10,20rDF C2,A9,00,8D,04,D4,60,8D DATA 04,D4,A2,70,A0,00,88,D0 FD,CA,D0,FA,60,END
Magazine Entry Program—128 5
TRAP
200
10
PRINT"(CLEAR)POKING -";
20
P=4864
:REM
§1300
(END
AT
5545/S15A9)
30
80
PRINT"[HOME,RIGHT12]"P;
100 B=DEC(AS):POKE :GOTO 110
IF
P,B:T=T+B:P=P+1
30
TO59382
THEN
:PRINT"MISTAKE DATA
110
IN
PRINT
DATA
—>
CHECK
STATEMENTS":END
120
PRINT"DONE":END
200
PRINT:PRINT"DATA
ERROR
IN
LINE";
1000+INT((P-4864)/8):END
1000
DATA
4C,1E,13,4C,3A,13,00,00
1001
DATA
8E,00,F7,00,42,41,51,57
1002
DATA
0D,00,00,43,08,14,BE,14
1003
DATA 16,14,26,14,33,14,A9,00
1004
DATA
1005
DATA
1006
DATA
4A,A0,13,SE,04,03,8C,05
1007
DATA
1036
DATA
43,54,45,52,53,00,55,4E
1037
DATA
49,44,45,4E,54,49,46,49
1038
DATA
45,44,00,4E,4F,20,43,4B
1039
DATA
45,43,4B,53,55,4D,00,C8
1040
DATA
B1,3D,D0,FB,98,30,04,C9
1041
DATA
06,30,IE,88,88,88,88,88
1042
DATA
B1,3D,C9,27,D0,13,A9,00
1043
DATA
9L,3D,C8,A2,00,B1,3D,9D
1044
DATA
00,0B,CB,E8,E0,04,D0,F5
1045
DATA
60,4C,5C,15,4C,C5,14,A0
1046
DATA
09, A9,00,99,06,13,8D,00
1047
DATA
0B,88,10,F7,A9,80,8 5,FD
1048
DATA
A0,00,20,3F,14,20,AE,14
1049
DATA
20,0D,4 3,84,FA,A0,FF,20
1050
DATA
67,13,F0,D8,24,FD,F0,06
1051
DATA
20,8F,13,4C,8F,14,C9,22
1052
DATA
D0,06,20,74,13,4C,8F,14
1053
DATA
20,9F,13,4C,8F,14,A0,00
1054
DATA
B9,00,02,20,5B,13,C8,90
1055
DATA
0A,18,6D,0A,13,8D,0A,13
1056
DATA
1057
DATA
1058
DATA
0D,13,E9,19,90,06,8D,0D
1059
DATA
1060
DATA
1061
DATA
1062
DATA
13,8D,0F,13,68,6D,0B,13
1063
DATA
1064
DATA
13,8D,0F,13,38,E9,19,90
1065
DATA
1066
DATA
1067
DATA
0E,13,E9,19,90,06,8D,0E
1068
DATA
1069
DATA
1070
DATA
1071
DATA
0D,13FCD,01,0B,D0,17,C8
1072
DATA
1073
DATA
1074
DATA
20,89,15,A4,FA,60,98,48
1008
1009
DATA
1010
DATA
02,20,5B,13,90,F1,A0,00
1011
DATA
4C,6F,14,C9,30,30,06,C9
1012
DATA
3A,10,02,38,60,18,60,C8
1013
DATA B1,3D,C9,20,D0,03,C8,D0
1014
DATA
F7,B1,3D,60,18,C8,B1,3D
1015
DATA
F0,35,C9,22,F0,F5,6D,06
1016
DATA
1017
DATA
00,8D,07,13,4C,75,13,18
1018
DATA
6D,08,13,BD,0B,13,90,03
1019
DATA
EE,09,13,EE,0C,13,60,18
1020
DATA
6D,0B,13,8D,0B,13,90,03
1021
DATA
EE,0A,13,EE,0D,13,60,0A
1022
DATA
A8,B9,14,13,85,FB,B9,15
1023
DATA
13,85,FC,A0,00,8C,00,FF
1024
DATA A9,12,20,02,FF,B1,FB,F0
1075
DATA
68,4C,AF,13,A9,04,4C,AF
1025
DATA
06,20,D2,FF,C8,D0,F6,20
1076
DATA
13,A9,00,8D,00,FF,A9,20
1026
DATA
79,15,20,A3,15,20,E4,FF
DATA
F0,FB,A0,1B,B9,EF,13,20
1077
DATA
8D,0 0,D4,8D,01,D4,A9,09
1027
1028
DATA D2,FF,88,10,F7,68,68,A9
1078
DATA
8D,05,D4,A9,0F,8D,18,D4
1029
DATA
00,8D,00,02,4C,B7,4D,91
1079
DATA
60,20,61,15,A9,81,20,9C
1030
DATA
91,0D,20,20,20,20,20,20
1080
DATA
15,A9,80,20,9C,15,4C,96
1031
DATA
20,20,20,20,20,20,20,20
1032
DATA
20,20,20,20,20,20,91,0D
1033
DATA
51,55,4F,54,45,00,4B,45
1034
DATA
59,57,4F,52,44,00,23,20
1035
DATA
4F,46,20,43,48,41,52,41
1081
DATA
15,20,61,15,A9,11,20,9C
1082
DATA
15,A9,lfl,20,9C,15,A9,00
1083
DATA
8D,04,D4,60,8D,04,D4,A2
1084
DATA
70,A0,00,88,D0,FD,CA,U0
1085
DATA
FA,60,END
END
COMMODORE MAGAZINE
93
Gold Mine Continued from page 13
The Games: Winter Edition; In the Downhill event, place all four of your cameras in the bottom positions. When you reach
them, press the fire button to gain speed for a final rush to the finish line. This should improve your time by five to ten seconds. SPC JeffCollins APO New York, NY GeeBee Air Rally: To turn fast while keeping a high speed, pull
up on the joystick and turn it to the side you want. This is very helpful on the high-skill level boards. Shazada Williams Brooklyn, NY Ghost busters: Follow these instructions, and you'll close the gate to Zuul; When buying a car, only buy a Compact. Buy only
one trap; you'll have to return to Headquarters every time you catch a ghost, but you'll save money. (You have to earn it back to win.) It is very important not to catch any green ghosts after the city's PK energy reaches 1000.
If you wait a while without moving your car or catching any ghosts, a screen will appear with the Marshmallow Man jump ing from side to side in front of a door, lake your time and get at least two or three of your men to sneak by him one at a time. Get them inside the door, and you'll win. The ghost vacuum, PK meter, bait, sensor and -so on are just for tun. Don't waste your money on them. Pressing the spacebar will tell you how many men and empty traps you have and how much power is left in your backpacks. Dennis Haines
Forked Riivr, NJ
Hardltall! The batter can often tell something from the move ment of the catcher's mitt in preparation for your pitch. Here's a way to eliminate that movement: After you select your pitch, keep the joystick in the direction you chose (do not let it return to center). When the computer asks you what direction to throw the pitch, just push the fire button.
The catcher's mitt won't move, but the pitch will go in the di rection you held the joystick.
Tony Scarlato Toledo, OH
force you back into the computer. If this happens, you probably won't find this room again. John Shall Fayettevilk, NC
Infiltrator II: Are you tired of bothering with the radio, just to
be blown up in the end? Once you've maintained the proper speed and heading, arm your rockets. If you fire a missile as soon as an aircraft, comes into view, the aircraft will be destroyed and you can ignore the radio. This also lets you maintain a con stant heading, altitude and speed. Tom Sweetland Columbus, IN
The Last Ninja: To kill an enemy with a Shuriken, back out of the screen you're in, and enter the last screen you occupied. Use the spacebar to choose the Shuriken, reenter the previous screen. Fire before your enemy has a chance to draw his weapon
or to start moving. He will almost always be in the line of the Shuriken's fire.
When you acquire the Sleeping Potion in the Inner Sanctum, use it te put all your enemies to sleep. You can use it indefinitely without it running out. Putting enemies to sleep is easier and faster than using a weapon, doesn't subtract from your hit regis ter, and therefore may save your life to use against the Top Dude. Contributor Unknown
The Lurking Horror: When you're in the computer room, look at the hacker and get his keys. To get past the floor waxer, do this: (1) Get container, (2) Break glass, (3] Get fire axe, (4) Chop power cord with axe, and (51 Dump container on floor.
Use the forklift in the basement to clear a passageway through the junk. Mkhael Sundy Dayton, OH
Maniac Mansion: When you get the envelope from the safe,
there's a better way to open it. Get a Jar of Water and put it and
the envelope into the microwave oven in the kitchen. Turn on the microwave. Remove everything when it stops, and notice how easy it is to open the envelope. You'll even be able to use it again.
The Hulk: Can't get past those killer bees? Turn into Hulk and go outside the dome. Find the mesh. Enter Wave Fan, followed by At Mesh. Now you can go back inside the dome and get the wax. Don't bother using the fan on the alien army ants; they just keep coming.
Before entering the underground room that holds the energy egg and bio gem, you must have about nine or ten gems in the "fuzzy jirea." Then Remember Nightmare for an extra burst of
strength. If you Remember Nightmare again, Hulk will become enraged and go out of control. Now Go North, Eat Egg, Scratch Wall and Go Crack.
If you come across the room where the Chief Examiner is be hind a desk, don't move! Just look around the room at the door, the Chief and his program. Eventually, you should find a gem. If you move or speak before you take it, the Chief will see you and 94
JULY 1989
NewCarrolltan,MD
Mercenary: Escape from Targ: To get enough money for the
Hertz stellar ship, sell your gun, energy crystal and large box. Also sell your neutron fuel, since it is too heavy and you need the anti-grav to pick it up. Sell these items to the Mechanoids,
since they offer more money. Then go to the orbital complex and give them the Mechanoid from the Briefing Room, the 15939 Supply, catering provisions, gold and medical supplies. You now have enough money to win the game. Jason Landkamer
Broken Arrow, OK
Gold Mine— On-Track: Here's a list of the fastest drivers for each track: Mon aco—AJ.; Watkins Glen—Mario; Road America—A J.; Sebring—Mario; Daytona Speedway—Pamelli; Gamestar
U.S.A.—Parnelli; Brand's Hatch— A J.; Mosport—Mario. Benjamin Hardekopf
Camp Lejeune, NC
Test Drive: When the police are chasing you, stay in the left
lane. This will keep the cop from getting in front of you and
causing a costly collision.
When starting up, it will speed your acceleration if you rev
the engine to about 700 rpm before pressing the button. Tb brake, wait until your rpm is near 400 to downshift.
It is possible to stop a police car by passing another car in the
right lane, then putting him between you and the police car. Pirates! When the old pirate offers you a treasure map, buy it! It's well worth the 500 gold.
Steve Yajko Binghamton, NY
Don't attack a nation that your home country is allied with, as the practice will anger both nations.
Do not wed until you've received all your promotions. They higher your rank, the better your marriage opportunities. But don't forget to make pleasant conversation with all Governor's Daughters; if they like you, they might gather important infor mation at the Governor's Mansion. Mike & Mali Plittman Fdlansbee, WV I'il sd <]>. When driving a three-lap race, you can sometimes avoid taking a pitstop, thereby finishing with a better time. Just be careful not to ram your tires against the side of the road or against other cars, and keep a steady speed. Cory Moore
Westhck, Alberta Canada KasUtn: You must know which symbols do what. Use the high
platform when fighting the Castle King. When he is below you, jump off the platform with your sword pointing toward the floor.
You'll give him a major stab wound to the head, which should
Test Drive: When a policeman pulls in front of you, pass him and speed up. You'll notice that you cannot move, but that your car is steering itself. Other cars pass right through you. In 15
seconds or so, you'll finally stop and get a ticket. Dan Ledger
Strafford, PA Times of Lore: Unlike the Dagger, the Magic Axe automatical ly returns to your hand after each use. It makes combat much easier and faster. Tb purchase the Magic Axe, go to Lankwell and enter the building in the NNW comer. If no one is home, wait for them to arrive. Upon meeting them, immediately
choose the Speak command, and they will offer to sell you the Magic Axe.
Tb enter Heidric's castle in Ganestor, go to the cellar of that town's inn. On the north wall youTl find a small, barely visible lever. Bump into it, and a secret stairway will be revealed.
The Tablet of Truth is toward the center of the castle's ground floor. Avoid engaging any guards, as you'll need to return here later in the game to speak with Heidric. Before returning the Tablet to the Regent, Use it and choose High King.
end his reign of terror. Insane Warrior Address Unknown
The Temple of Angar can only be entered by using the Chime from the dungeon beneath the blasted crater. The key to this dungeon must be obtained from the Archmage in the cottage ly ing north of the bridge above the Enchanted Forest. Before the
Seventh Fleet: If you play the U.S. side, send the Missouri task force to Vladivostok. Before they get there, attack the base with
Archmage will give it to you, you will need to perform a service for another character in the game. Dave Gentzler Thomasvilk, PA
planes from the carriers, then have the Missouri bombard the
base. You won't have to worry about the badgers or back fires from that base,
Da Nang has some badgers and backfires also, but they
should not bother your main fleet.
Deploy youi' subs in the Sea of Okhotsk by putting them on station at B2, E2, H2, C4, E4, H4, J4 and so on. David Ohon Langdem, ND
Wasteland: You're ready to go to Vegas when you have the rank
of Specialist or higher, you have at least 17 Carbine, a bullet proof shirt, and some cash. Go to the Mushroom Church located near the east entrance, and someone will ask you the password. The answer is AZREAL. When they ask you if you have brought a gift, tell them
Superstar Ice Hockey: When having a center face-off during a
practice game against the computer, push and hold the joystick in the direction you are going. One of three things will happen, and two of them are to your benefit: the computer may check you and get called for a penalty (your advantage); the computer
may check you and get away with it (computer's advantage); or you will be able to skate to the goalie untouched, with the goalie
After entering, go through the hall to the right. Then enter the First Aid Station when you see a blue figure pop up. Go close to it and execute a Battle command. Have one of your men Hire
him and have the rest of them Evade. Now you'll have Dr. Mike Scott on your side. With his 5 in Doctor, he's a very good ally to have.
Michael Richardson
jumping out of your way as you move at him. If you push the button just as you touch the net, you'll usually get an easy goal.
Anaheim, CA
Dave Danielson
Wasteland: The password for Fat Freddy's casino is BIRD. Ac
Bmokfield.lL
COMMODORE MAGAZINE
95
Gold Mine Faran what you can do for him. Fat Freddy will give you $1000 on account, even if you never kill Brygo. In the Stagecoach Inn, avoid entering room #18 until the bar maid gives you the key. To do otherwise means almost certain Reader Advertiser Response No. Page No. death. Save the grazer bat fetish that you find in the museum of the Guardian's Citadel. The Junkmaster will accept it as a gift, and 5 BMG Compact Disc Club â– Berkeley Sollworks 1 8,9,61 Bronilord Educational Services 2 49 Brtwan 3 15 Computer Direct (Proteclo) 4 44,45 Data East USA 5 02,! toadslar 6 1 will tell you where to find Base Cochise. Matt Morrison Soldotna, AK Where in the World is Carmen Sandicgo? Instead of using the RETURN key and the cursor keys to play, use the joystick in port 2. It's a lot easier and quicker. GttnterA. Schwaiidt Tlalnepantla, Mexico Zak McKracken: When you first start out in the game, go into your kitchen and get the Butter Knife that is hanging on the wall. When you need extra money in the future, take it to the Buy/Sell Shop on 13th Avenue. The man in the store will buy it from you for$1500! John Kreps
Grapevine, TX Znk McKracken: To get the loaf of French bread, ring the bak
ery doorbell three times. William Lautzenheiser Reading, MA
Q|
Tips & Tricks
Continued from /xr^ftr 49
pending on their size and complexity. Tb order or to find a local
dealer, call Sams at (800) 428-7267. Louis F, Sander Pittsburgh, PA The "Don't Do It" Key: How many times have you typed half way through a line, only to decide that what you've typed so far
Montgomery Grani
37
NRlSchools/McGrowHill
65
Strategic Simulations, Inc.
C4
ViaeoMaker Magazine
C3
is garbage? Well you don't have to delete all those characters be fore you start over again! All you need do is press the "Don't Do It" key.
Every computer has one of these keys, but it's amazing how many people don't know it. On all Commodore computers except the Amiga, the "Don't Do It" key is the shifted RETURN key. if you press it while the cursor is on a line, the cursor will jump to
the start of the next line, but the computer will not process what was on the original line. The Amiga's "Don't Do It" key is CTRL X. Jim BulterfieU! Toronki, Ontario Canada
Classified Ads Save Money: Many newspapers have a classified advertising category for compute]- equipment. In the Pittsburgh Press, for example, classification 483A is Persona! Computers, Games & Accessories. On a typical weekday, it has 15-20 com puter ads, almost always including secondhand Commodore equipment.
Timmy Jacobs Pittsburgh, PA 96
JULY 1989
g
DESKTOP VIDEO! Camcorder Meets Computer
'j'Jiim 'tj&y ij-*.;
l:u:1 'iTuiii 'til?/ bu 1
rKSIDE
PfAWfUi PHltfiflAMS
QfMtQC* PfVKTS <
HMO"
tVj.I Y1 yj '.ij!
•?rJ'r\ Vt
i
'
/■—:
l
I
1
-
i
i
I j
i
i. i
I
i
1
I- II
! ■\-.tlv)
\
i
r. i
i
i
La
)U \
What do you get when you cross
a computer with a video signal? Creative potential beyond belief. What do you get when you cross
creative potential beyond belief with ongoing, comprehensive coverage of the phenomenon? Videomaker magazine.
Everyone's getting into the act: Computer buffs are focusing on video. Videomakers are plugging into computers. And computer/
/ideo enthusiasts at large are tuning in to Videomaker magazine for tools, tips, and techniques galore—the stuff computer/video magic is made of. "The Video Camera User's Magazine" also happens to be the video/computer user's magazine. Every issue. Plug into the possibilities ... with Videomaker. Focus on the creative, practical tips you'll find in every issue and zoom in on our LOW CHARTER SUBSCRIPTION RATE!
Save 33% off the regular subscription rate that future sub scribers will pay.
VIDCOMAKEft
City
State
Zip.
P.O. Box 3727, Escondido. CA 92025 To order, call 1-800-354-8400
Si 3.40 lor Canadian. S30 for foreign (per year] by airmail. All Canadian and foreign orflers payable in U.S. funds.
30CM
OFFICIAL
Dungeons^piagons COMPUTER PRODUCT
Heroes of the Lance
I
STRATEGIC SIMULATIONS, IPiCJ Look for POOL Of RADIANCE, an AD&D1 Fantasy Role-Playing Epic set In the I nrifiiu if ,1 REALMS'game world.
Available now for C-64/128 and IBM. Coming In 1989: ATARI ST. AMIGA, APPLE II GS and APPLE n. advanced DWWEons * wwoous, ad*d, r fOMtO. DRAQOmAWCt ami the TSB logo at UBdemartu o-neO by ond uini untlu Uanx from T3P. ir.tCiMflTSK.inc ffliJfia Strategic bsmliSffiis. Inc. M lights named.
Commodore_Magazine_Vol-10-N07_1989_Jul
tarsII \ 64&128OutRun,Serve&Volley amigaZanySoliDragon'sLair Plus FORCOMMODOREANDAMIGAUSERS Including SneakPreviewof o 7 as "ozzaa 6... | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.18496781587600708, "perplexity": 5620.309935052003}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690376.61/warc/CC-MAIN-20170925074036-20170925094036-00280.warc.gz"} |
https://nebusresearch.wordpress.com/2012/09/08/everything-i-learned-in-eighth-grade-math/ | # Everything I Learned In Eighth-Grade Math
My title is an exaggeration. In eighth grade Prealgebra I learned many things, but I confess that I didn’t learn well from that particular teacher that particular year. What I most clearly remember learning I picked up from a substitute who filled in a few weeks. It’s a method for factoring quadratic expressions into binomial expressions, and I must admit, it’s not very good. It’s cumbersome and totally useless once one knows the quadratic equation. But it’s fun to do, and I liked it a lot, and I’ve never seen it described as a way to factor quadratic expressions. So let me put it on the web and do what I can to preserve its legacy, and get hundreds of people telling me what it actually is and how everybody but the people I know went through a phase of using it.
It’s a method which looks at first like it’s going to be a magic square, but it’s not, and I’m at a loss what to call it. I don’t remember the substitute teacher’s name, so I can’t use that. I do remember the regular teacher’s name, but it wasn’t, as far as I know, part of his lesson plan, and it’d not be fair to him to let his legacy be defined by one student who just didn’t get him.
The first important thing we need is a quadratic polynomial, and I’ll take a specific one, here, $10 x^2 - 7x - 12$. The method was taught when we’d use just integer coefficients, and would want to factor into binomials with integer coefficients. In principle it would work fine with decimals, but if you’re doing that there’s really no reason to use this in preference to the quadratic formula. It does go all right if you have roots or radicals as coefficients, though.
The second thing needed is a three-by-three grid. It will look like a magic box, but don’t worry about things like sums across rows being equal. I’ve added letters to identify rows and columns, which aren’t part of the scheme, but make it easier to describe what I’m doing.
i j k A B C
Into the first row go the first and last terms of the polynomial. That is, in row A, column i, goes the $10 x^2$ term. In row A, column j, goes the $-12$ term. And that’s all that we use from the polynomial for right now. We’ll come back to the $-7 x$.
One rule of this pseudo magic square is that, within reach row, the thing in the first column times the thing in the second column equals the thing in the third column. That is, into row A, column k, will go the product of row A column i and row A column j: $10 x^2 \times -12 = -120 x^2$. So here’s the table now:
i j k A $10 x^2$ -12 $-120 x^2$ B C
Now for the second rule of this pseduo magic table: within each column, the third row and the second row multiply together to make the first row. That is, row C column k times row B column k will equal row A column k.
The next step in this is going to be factoring $-120 x^2$. There are, in principle, an infinite number of possible factorings. This number is cut down a little bit if we assume we’re working on integer coefficients, which is why this is a good method in prealgebra and rubbish once you know the quadratic formula. (And it again works fine if you have a coefficient-times-a-radical, and are reasonably sure the radical is part of the binomial factorization.)
More specifically, though, we’re looking for a factorization of $-120 x^2$ into exactly two terms which added together give us the middle term in the polynomials: they have to add together to make $-7 x$. So the two terms are going to be some number times x and some (possibly other) number times x. We have to find those numbers.
This is the part that’s fun, by the way, at least if you like factoring numbers. You need two integers which multiplied together are -120 and which added together are -7. That’s a word problem in itself, but if you’re not asked to do word problems you can just start reeling off factors and see if any promising combinations turn up: 1 and -120 (adds to -119, no good); 2 and -60 (adds to -58, closer but still bad); 3 and -40; 4 and -30; 5 and -22; 6 and -20; 8 and -15 and oh look at that. Isn’t that wonderful? (If we had started off on -1 and 120, we’d probably notice that -8 and 15 gives us positive 7 and then we can just swap the minus from one to another.)
This step requires a little awareness of positive and negative products, by the way. If row A, column k is positive, then it’s possible the factors are both positive or are both negative. If row A, column k is negative, then one factor has to be positive and one negative.
But we’ve got it now: $-120 x^2 = (8x) \times (-15x)$, and $8x + (-15x) = -7x$. So into column k, in rows B and C, go $8 x$ and $-15 x$. It doesn’t matter which one you put where. I tend to put the larger number (in magnitude) up top, but you don’t have to if you don’t want to. This makes the grid now:
i j k A $10 x^2$ -12 $-120 x^2$ B $-15 x$ C $8 x$
Next comes filling in the two rows, and this is another fun little puzzle. The elements in row B, column i and row B, column j have to multiply together to make row B, column k. Simultaneously, the elements in row C, column i, and row B, column i, have to multiply together to make row A, column i. And if that’s not enough, the elements in row C, column i, and row C, column j, have to multiply together to make row C, column k, while at the same time the element in row C, column j times the element in row B, column j, has to equal row A, column j. I realize you’re now all lost. Let me actually do the work; that’s easier.
Let me take row B, first. The thing in column i times the thing in column j has to equal $-15 x$. Well, the x goes in column i; the x always goes in column i, or else the products of column i terms couldn’t have an $x^2$ in it. The minus sign is easy for this problem; it goes into column j, or else the products in column j wouldn’t get to -12. As for factoring 15 … well, if we’re sticking to integers, that’s either 1 and 15 or 3 and 5. 15 won’t multiply by any other integers to give us 10 or 12, so we can rule that out. Either row B, column i gets the 3 or the 5. 3 times any integer isn’t going to give us the 10 that’s in row A, column i; and 5 times any integer isn’t going to give us the 1 that’s in row A, column j. So we must mean to put into row B, column i, the $5 x$, and into row B, column j, the -3. My grid is now:
i j k A $10 x^2$ -12 $-120 x^2$ B $5 x$ -3 $-15 x$ C $8 x$
Now to finish off row C. Again, the element in row C, column i multiplied by the element in row C, column j, must be $8 x$; and the x goes into row C, column i. 8 can be factored into 1 times 8, or 2 times 4, and that’s about it if we’re limited to pairs, which we always are in this method.
Looking up the rows tells us whether the 2 or the 4 goes into row C, column i: two times five is ten, so $2x \times 5x = 10x^2$ and so into row C, column i, goes $2x$ while into row C, column j, goes 4. And as promised, -4 times 3 is -12. So now the table is:
i j k A $10 x^2$ -12 $-120 x^2$ B $5 x$ -3 $-15 x$ C $2 x$ 4 $8 x$
And now for the final step. The first term in the binomial factoring of the polynomial is going to be the element in row B, column i, plus the element in row C, column j: $5x + 4$. The second term in the binomial factoring is going to be the element in row C, column i, plus the element in row B, column j: $2x - 3$. (In class we drew diagonal bubbles around these; I don’t know any practical way to do that in HTML or LaTeX.) That’s our factorization.
And sure enough, if we check, $(5x + 4) \times (2x - 3) = 10x^2 - 7x - 12$. It’s also the answer we get using the quadratic formula and then fiddling around to make sure we have the scaling right.
Obviously, the quadratic formula is superior on all counts — it’s quicker, it’s easier to remember all the steps involved, it doesn’t get awkward if you have to work with decimals, it takes less space — except that this lets you make pretty pictures and fill them with numbers. And maybe it helps ease you into the quadratic formula.
(And obviously it works if we have something that’s a quadratic in form, even if it has higher order powers: $10x^4 - 7x^2 - 12$ uses exactly the same routine, except we would write $x^2$ instead of x in rows B and C.)
## Author: Joseph Nebus
I was born 198 years to the day after Johnny Appleseed. The differences between us do not end there. He/him.
## 10 thoughts on “Everything I Learned In Eighth-Grade Math”
1. Is there any reason why you wouldn’t use the generic rectangle method instead? I find this method far more convoluted, and it covers the same material.
Like
1. Well, I don’t know the rectangle method, at least not by that name.
I can’t defend this as a factoring method on any grounds, really, except that it’s how I first learned to do factoring systematically (or semi-systematically), and I hadn’t wanted it to be completely lost to time.
Like
1. No need to defend it. I think a method is essential for lower ability kids, and wasn’t criticizing you at all. I know teachers who use this method in preference to the rectangle (also known as box and diamond) and have just never been sure why, as it seems to have a bit more complexity with no added benefit. I thought maybe you could shed some insight.
Like
1. Oh, I didn’t feel criticized, and please don’t worry about that.
I hadn’t encountered the box-and-diamond method, as best as I know, before, but now that I know what to search for it does look like a more straightforward method. Why that wasn’t what we got back in middle school I couldn’t guess; maybe it was just how my substitute was first taught factoring.
Like
1. If you’re interested, I have a long and short doc that takes students through the procedure. It’s a step by step document you might find helpful.
Like
2. Blinky the Wonder Wombat says:
After determining the two x terms, I’ve found it easier to just insert them into the original equation thus:
10x^2 -15x+8x-12
Look for a common factor in the first term and one of the two middle terms, in this case, 5x:
5x(2x-3) + 8x-12
Now find a common factor in the other two terms, in this case, 4:
5x(2x-3) +4(2x-3)
Hey look, (2x-3) is common to both sides! Factor it out and get:
(2x-3) * (5x+4)
I found that this method seemed a little more logical to my children.
Like
1. Mm, yes, looking for the common factor between the first term and either of the intermediate ones does work out. That might be easier for children to learn. It does avoid another two rounds of guess-the-factoring for the horizontal rows.
‘Course, it does leave the rest of the little boxes un-filled, and that seems like a shame or an invitation to tic-tac-toe. But there’s always something lost in adapting methods, isn’t there?
Like
This site uses Akismet to reduce spam. Learn how your comment data is processed. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 40, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6024773120880127, "perplexity": 583.8324478488026}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057202.68/warc/CC-MAIN-20210921101319-20210921131319-00305.warc.gz"} |
https://core.ac.uk/display/52411500 | slides
oai:okina.univ-angers.fr:10344
# Inverse statistical learning
## Abstract
Let (X,Y)∈X×Y be a random couple with unknown distribution P. Let G be a class of measurable functions and ℓ a loss function. The problem of statistical learning deals with the estimation of the Bayes: g∗=arg ming∈ GEPℓ(g,(X,Y)). In this paper, we study this problem when we deal with a contaminated sample (Z1,Y1),…,(Zn,Yn) of i.i.d. indirect observations. Each input Zi, i=1,…,n is distributed from a density Af, where A is a known compact linear operator and f is the density of the direct input X. We derive fast rates of convergence for the excess risk of empirical risk minimizers based on regularization methods, such as deconvolution kernel density estimators or spectral cut-off. These results are comparable to the existing fast rates in Koltchinskii (2006) for the direct case. It gives some insights into the effect of indirect measurements in the presence of fast rates of convergence
## Full text
### Okina
Provided a free PDF
oai:okina.univ-angers.fr:10344Last time updated on 11/11/2016View original full text link
This paper was published in Okina.
# Having an issue?
Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9033160209655762, "perplexity": 1221.3459672868637}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00535.warc.gz"} |
https://www.albert.io/ie/ap-statistics/texas-county-populations | Free Version
Moderate
# Texas County Populations
APSTAT-ELYLJP
The campaign director for a Texas governor's candidate is planning a multi-stage sample survey. In the first stage, the director will randomly choose $15$ counties. The partial histogram below shows the population by county for Texas (the five highest outlier counties have been omitted).
The average population for all $254$ counties is $99,423$ people with a standard deviation of $354,429$ people.
Describe the sampling distribution of the mean population for samples of $15$ counties.
A
${ \mu }_{ \overline { x } }=99,423$, ${ \sigma }_{ \overline { x } }=354,429$
B
${ \mu }_{ \overline { x } }=99,423$, ${ \sigma }_{ \overline { x } }=91,513$
C
${ \mu }_{ \overline { x } }=99,423$, ${ \sigma }_{ \overline { x } }=354,429$
D
${ \mu }_{ \overline { x } }=99,423$, ${ \sigma }_{ \overline { x } }=91,513$
E
${ \mu }_{ \overline { x } }=99,423$, ${ \sigma }_{ \overline { x } }=22,239$ | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5819409489631653, "perplexity": 4629.592767841991}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280763.38/warc/CC-MAIN-20170116095120-00386-ip-10-171-10-70.ec2.internal.warc.gz"} |
https://iwaponline.com/aqua/article/67/4/317/38999/Drinking-water-supply-systems-decreasing | Meeting the Government of Canada's renewed commitment to eliminate all drinking water advisories (DWAs) in First Nations communities within five years will require a multi-faceted approach. DWAs in First Nations communities are most often issued for equipment malfunction, inadequate disinfection and unacceptable microbiological quality; however, most DWAs are issued only on a precautionary basis. While the majority of DWAs are in place for long periods of time, they do not necessarily indicate unacceptable water quality. To this end, a method is proposed with considerable potential to decrease DWAs using real-time monitoring technology to monitor for flow rate, turbidity, pH, water temperature and free chlorine. Through real-time monitoring systems, communities can be re-empowered and gain increased control over their water systems, allowing operators to make corrections or repairs immediately, and to reduce the number of ‘precautionary-based’ DWAs, as well as reduce the frequency and duration of all DWAs. The potential decreases in the number of DWAs issued are estimated at likely greater than 36%, as determined from analyses of advisories.
As is apparent from the preceding, DWAs in First Nations communities are frequent and persisting. There is increasing pressure from both communities and government to address what has been deemed as an unacceptable situation. As part of a commitment to improving quality of life for Indigenous people in Canada, the Prime Minister committed to eliminating BWAs within five years, to be achieved by expending 1.8 billion dollars CAD towards strengthening on-reserve water and wastewater infrastructure, as well as 141 million dollars CAD over five years to improve water monitoring and testing (Government of Canada 2016). The Government of Canada recently announced a lifting of 14 long-term DWAs in First Nations communities across Canada, including a renewed commitment to reducing by half the remaining advisories within three years, and all advisories within five years (Liberal Party of Canada 2016).
In response, since there are cases when DWAs are issued as a precautionary measure; an alternative strategy is to disaggregate precautionary events and actual disruptions to drinking water quality. A strategy is needed and, as described in this paper, reliance upon real-time monitoring is an option for early identification of problems that can help to reduce both the frequency and duration of DWAs, and alert operators to problems about which they might not have been aware.
This paper describes an approach which has the potential to significantly reduce the number of DWAs in First Nations communities. While it is clear that multiple approaches will be necessary in order to address the diverse nature of DWAs in communities across Canada, the proposal herein is a possible strategy for identifying when issues of unacceptable water quality conditions are actually occurring in individual communities, and avoid those incidences where historically, the advisory was issued for precautionary reasons that are not necessarily related to inadequate water quality.
A cross-sectional study was undertaken of available information across data available on First Nations communities across Canada to describe trends and characteristics of DWAs issued in First Nations communities. There is significant heterogeneity across First Nations communities in Canada, including geographical location, socio-economic conditions, population, remoteness and other factors. Caution was observed in making generalized statements about the state of drinking water systems in First Nations communities.
Two primary methods were used as part of this study: review of available DWA data and semi-structured interviews. First, data sources are limited with respect to DWAs for First Nations drinking water systems across Canada. Health Canada reports DWAs in First Nations communities south of the 60th parallel, excluding both British Columbia and the Saskatoon Tribal Council. Both organizations have recently taken authority for issuing DWAs and reporting on them. In addition, Health Canada does not report on DWAs that are issued for systems with five connections or less, including individual wells (Health Canada 2017); this is important because the number of DWAs reported is far less than the actual number of DWAs in place across First Nations communities in Canada. North of the 60th parallel, Territorial Governments typically have jurisdiction over drinking water, with support from Health Canada. The numbers of DWAs are not currently reported.
Due to the limited information available, this study also relied on information obtained from individual First Nations organizations and community members as part of a larger research project. Research methodologies relied upon in this research followed the principles of OCAP – ownership, control, access and possession – through which research can enable ‘a way for First Nations to make decisions regarding what research will be done, for what purpose information or data will be used, where the information will be physically stored and who will have access’ (NAHO 2007, p. 1).
Second, as part of a larger research project, a series of semi-structured interviews were held with community members and First Nations organizations in Ontario, Saskatchewan, Alberta and British Columbia. The research project that encompassed this work was approved by the University of Guelph Review and Ethics Board Protocol.
In addition, where possible, linkages were made from each DWA to data reported in the 2011 National Assessment of First Nations Water and Wastewater Systems – National Roll-Up Report. This report summarizes the results from a national assessment to determine deficiencies and operational needs, and identify strategies for improvement.
Characteristics of DWAs, including the reasons for issuance, were summarized using tables, figures and counts. Plots were generated to illustrate monthly or annual variations, as well as identify trends. Note that counts using percentages were a means to describe monthly, seasonal or annual trends. Because of multiple reasons for DWAs in First Nations communities, and a lack of clarification on how and why certain DWAs are issued, the study relied on qualitative data obtained through interviews for additional clarification.
There are three types of DWAs: boil water advisories/orders (BWAs/BWOs); do not consume advisories/orders (DNCAs/DNCOs), also called ‘do not drink’ advisories/orders (DNDAs/DNDOs); and ‘do not use’ advisories/orders (DNUAs/DNUOs) (Health Canada 2016). Regardless of the type of advisory issued, it is obvious that the frequencies of DWAs (and the various subcategories) are unacceptably high in Indigenous communities. It is also important to recognize that there are many reasons that may trigger the issuance of a DWA. Specifically, across all Canadian communities in 2015, 78% of BWAs were issued on a precautionary basis due to problems with drinking water equipment or processes, and according to Environment and Climate Change Canada (ECCC).
Most BWAs are issued because the equipment and processes used to treat, store or distribute drinking water break down, require maintenance, or have been affected by environmental conditions. This broad array of reasons includes issues such as broken water mains, planned system maintenance, power failures or equipment problems. In some cases, extreme weather or heavy rains may cause the quality of surface or ground water sources to temporarily worsen, challenging the drinking water treatment system. BWAs issued for equipment and process related reasons are generally issued before any actual decline in drinking water quality and are in place until conditions return to normal (ECCC 2016, p. 6).
The precautionary nature of the DWAs indicates that the frequency of DWAs in communities may not necessarily be appropriate when there is no actual deterioration of the quality of the water being delivered. There may be, therefore, the potential to decrease the numbers of DWAs being issued, on the basis that it is of utmost importance to issue DWAs when the water is not actually safe to consume, as opposed to for the DWAs which are just precautionary.
Health Canada works with First Nations communities south of the 60th parallel to monitor water quality by testing drinking water for bacteriological, chemical, physical and radiological contaminants (Health Canada 2009). Tests are carried out by a Community-Based Water Monitor, a Health Canada Environmental Health Officer (EHO), or a First Nations community member. If drinking water quality is unsatisfactory, with respect to the National Guidelines for Drinking Water Quality, Chief and Council are notified, which means it is the responsibility of Chief and Council to issue a DWA in the affected community (Health Canada 2009).
As of 2011, the National Assessment reported that 17% of communities had no treatment or chlorination in place. According to the assessment, the different treatment types across communities in Canada, including no treatment in place, are highlighted in Figure 1. Direct use (i.e., no treatment) is most common in British Columbia (where these sites are typically viewed as having ‘pristine water sources’), whereas Ontario, for example, only has four cases of direct use with no treatment in place.
Figure 1
First Nations community water treatment (Source:Neegan Burnside 2011). MTA refers to a municipal type agreement, where a First Nation community has a partnership with a surrounding municipality for delivery of drinking water.
Figure 1
First Nations community water treatment (Source:Neegan Burnside 2011). MTA refers to a municipal type agreement, where a First Nation community has a partnership with a surrounding municipality for delivery of drinking water.
Close modal
Overall, the mean duration of DWAs reported between 1995 and 2007 was 343 days (Health Canada 2009). Health Canada has reported that DWAs attributed to inadequate disinfection or disinfectant residuals post-treatment had the longest mean duration, at 590 days (2009). This would suggest that these disinfection incidents are not necessarily unexpected or ‘surprise’ system failures, but rather chronic issues with providing adequate disinfection. Similarly, the reason of ‘Operation of the system would compromise public health’ also had a mean duration of 590 days. Microbiological quality, source water quality and equipment-related advisories had mean durations of 361 days, 324 days and 318 days each, respectively. As of October 31, 2016, the majority of DWAs (69 total) were in place for over five years (Figure 2). While these may be reasonable grounds for issuing a precautionary DWA, they do not necessarily indicate unacceptable water quality. According to Health Canada (2009, p. 6), ‘It is noteworthy that no advisory has ever been issued due to epidemiological evidence that drinking water is or may be responsible for an outbreak of illness.’
Figure 2
Duration of DWAs in First Nations communities (including British Columbia).
Figure 2
Duration of DWAs in First Nations communities (including British Columbia).
Close modal
According to Environment and Climate Change Canada (2016), BWAs are issued when ‘the microbiological quality of drinking water is suspected or confirmed to be compromised, meaning disease-causing micro-organisms, such as bacteria, viruses or parasites, could be in the drinking water’. The advisories are precautionary in that these BWAs could also be due to water main breaks, planned maintenance, power failures or other equipment problems. Typically, these advisories are ‘generally issued before any actual decline in drinking water quality and are in place until conditions return to normal’ and hence may be precautionary in nature (Environment and Climate Change Canada 2016).
DWAs can serve as a proxy for access to safe, reliable and clean drinking water (Hrudey et al. 2006; Patrick 2011). While DWAs are one way of assessing the situation in communities across Canada, there are limitations to using DWAs as a proxy for reliable access to safe drinking water, including inconsistent reporting behaviours, the precautionary nature of advisories and reporting timeliness; ‘very few measures are available to monitor progress toward improving access to safe and reliable drinking water in First Nations communities’ (Isfeld 2009, as cited in Galway 2016).
With respect to the duration of DWAs in First Nations communities, the most recent data available from Health Canada indicate that out of the 144 DWAs currently in place, 101 of these DWAs have been in place for over a year (Health Canada 2017). Table 1 highlights the recorded causes of DWAs across Canada from 2010 to 2015. According to data obtained from Environment Canada, the majority of advisories for all Canadian communities relate to issues with equipment and process (Environment and Climate Change Canada 2016). Advisories issued for other microbiological parameters relate to:
Table 1
Causes of BWAs in all Canadian communities (First Nations included, as well as municipalities) from 2010 to 2015a
Cause of BWAPercentage of BWAs (for all of Canada)
201020112012201320142015
E. coli
Other microbiological parameters (e.g., total coliform) 28 18 18 17 14 17
Equipment and process 64 77 77 76 81 78
Cause of BWAPercentage of BWAs (for all of Canada)
201020112012201320142015
E. coli
Other microbiological parameters (e.g., total coliform) 28 18 18 17 14 17
Equipment and process 64 77 77 76 81 78
aBased on data obtained from Environment and Climate Change Canada (2016).
‘…changing conditions inside the drinking water system that typically do not represent a health risk to consumers. Under this category are total coliform bacteria and turbidity. Total coliforms are a broad family of bacteria commonly found in the environment and turbidity is a measure of the cloudiness of water caused by particles. When unusual or elevated levels of these water quality parameters are measured in the drinking water system, the cause is investigated and the findings may contribute to the decision to issue a boil water advisory’ (Environment and Climate Change Canada 2016).
Based on available data (Figure 3), 74% of advisories in First Nations communities as of October 31, 2016, have been in place for over a year, with the remaining 26% considered short term, as defined by Federal government, as being in place for less than a year. While 133 advisories were in place as of October 31, 2016, in First Nations communities, an additional 24 advisories were issued and rescinded within the month, for a total of 157 advisories.
Figure 3
Status of DWAs in First Nations communities across Canada, excluding British Columbia, as of October 31, 2016 (Health Canada 2016). The ‘Issued and Rescinded’ category refers to DWAs issued in October 2016, and also rescinded in the same month.
Figure 3
Status of DWAs in First Nations communities across Canada, excluding British Columbia, as of October 31, 2016 (Health Canada 2016). The ‘Issued and Rescinded’ category refers to DWAs issued in October 2016, and also rescinded in the same month.
Close modal
Figure 3 shows the duration of the DWAs issued and rescinded within one month, in October 2016. In total, 24 of the 157 DWAs (15%) that were issued in First Nations communities in October 2016 were issued and rescinded in less than a month. On average, for those advisories issued and rescinded within the month of October, the average DWA was issued for 10 days, with a median of 8 days (Figure 4).
Figure 4
Duration of those DWAs in First Nations communities that were issued and rescinded within the month of October 2016.
Figure 4
Duration of those DWAs in First Nations communities that were issued and rescinded within the month of October 2016.
Close modal
According to SaskWater, the Province of Saskatchewan's water regulator, precautionary advisories are most often issued during service and maintenance and are issued under these circumstances because the quality of water cannot be confirmed (SaskWater 2016). In this case, the advisories remain in effect until two consecutive laboratory samples, 24 hours apart, confirm the water meets regulations.
The data presented in Table 1 illustrate the situation across Canada for all communities. With respect to First Nations communities, similar trends for causes of DWAs such as equipment malfunction and microbiological quality occur. However, lack of disinfection (which could mean no disinfection in place or insufficient disinfection in place) or inadequate disinfection residuals is a major cause for issuing a DWA in First Nations communities. According to data from First Nations communities from 1995 to 2007 (Figure 5), the top three causes for DWAs in First Nations communities were: unacceptable microbiological quality (based on water quality testing results); inadequate disinfection or disinfection residuals; and equipment malfunction (Health Canada 2009).
Figure 5
Causes of DWA in First Nations communities. 1Reported reasons for advisory issuance as of December 31, 2007 (n = 939) note that there can be more than one reason for a given advisory and that therefore the number of reasons (n = 939) exceeds the number of advisories (n = 646)).
Figure 5
Causes of DWA in First Nations communities. 1Reported reasons for advisory issuance as of December 31, 2007 (n = 939) note that there can be more than one reason for a given advisory and that therefore the number of reasons (n = 939) exceeds the number of advisories (n = 646)).
Close modal
Nevertheless, further disaggregation of data is needed in order to understand which microbiological parameters exceed drinking water guidelines, and where precautionary DWAs are issued because there may be impairment in the quality of drinking water. It is difficult to obtain detailed DWA information, particularly because the information is typically withheld to protect individual communities. It has been noted that ‘Canadian water advisory data lack coverage, timeliness and consistency, making it difficult to draw fair comparisons across regions or between First Nations and non-First Nations populations’ (Isfeld 2009). However, there has been increased pressure by external stakeholders to release more detailed information on the cause of DWAs in an effort to better understand the root causes and underlying reasons for the high rate of DWAs in First Nations communities.
Worldwide, there has been significant use of online monitoring and early detection systems to detect contaminants. Technology has advanced substantially, including development of web-based technologies and advancements in online monitoring (Reed et al. 2010). Robust and reliable real-time technologies are available to measure physical and chemical characteristics of raw and finished water, including pH, turbidity, iron, manganese and chlorine (van der Gaag & Volz 2008).
Typically, laboratory-testing methods are slow, resulting in delays in response time; for these measurements, there are limitations to providing proper public health notice and protection. While there is evidence of improved laboratory technologies for rapid testing for water quality parameters, it is real-time monitoring which provides the opportunity to ensure timely response and to improve system management, rather than to wait for laboratory results. Data obtained through real-time monitoring have the potential to be easily accessible by the operator in a timely fashion.
According to Storey et al. (2011), ‘despite recent advances in biological monitors and microsensor technologies, there is no universal monitor for water quality monitoring’, and therefore it is generally accepted to monitor a variety of parameters. Typically, pH, chlorine, temperature and turbidity are monitored using on-line instrumentation (Frey & Sullivan 2004). There is evidence that real-time monitoring of chlorine residual correlates to disinfection performance for susceptible pathogens. Monitoring of chlorine at different locations has the potential to be amenable to characterize chlorine residuals at different locations. Real-time monitoring has the benefit of providing early notification to changes in water quality conditions (Ziegler et al. 2006; Wagner 2009). In addition, real-time monitoring data on water quality allows for improved understanding of the current effectiveness of the in-situ treatment processes (Wagner 2009). To date, there is no universal monitor for water quality monitoring or contaminant detection (Storey et al. 2011).
The technology for real-time monitoring is used in many different applications. Glasgow et al. (2004) refer to real-time monitoring systems that are being installed for drinking water reservoirs with problematic cyanobacterial blooms. Rodriguez et al. (2002) mention use of biosensors for rapid monitoring of primary-source drinking water, especially for sunlight-exposed drinking water systems, although the focus in this case is on chemical warfare agents. Lambrou et al. (2014) have shown that new sensors can measure ‘high impact contaminants’ such as Escherichia coli or arsenic, at low concentrations for early warning and detection.
Real-time monitoring technologies are not without their disadvantages including needs for regular maintenance, the level of technical expertise required to interpret the information and the inevitable false alarms. There is additional training/capacity required to install these systems, as well as potential instrumentation problems and malfunctions. It has been noted that water utilities have difficulty managing large quantities of data and ‘translating them into meaningful information for operational processes’ (van der Gaag & Volz 2008, p. 3).
Real-time monitoring technology can monitor a range of different parameters. Currently, the technology is frequently used for monitoring physical parameters such as flow rate, turbidity, pH and water temperature, as well as chemical and biological parameters such as free chlorine, fluoride and spectral adsorption (van der Gaag & Volz 2008). Changes in characteristics such as turbidity can provide indications that something within the treatment system has failed, and can be an important tool in helping operators with early identification of treatment train issues. Free chlorine is an important characteristic for monitoring, as low chlorine and chlorine residuals have been shown to be one of the major reasons for issuance of a DWA in First Nations communities.
### Real-time monitoring in First Nations communities
Addressing DWAs in First Nations communities in Canada necessitates a strong partnership between communities and governments. The use of real-time monitoring data is a mechanism through which a community can regain control over their water systems. As was indicated above, some water quality testing can be done outside the community, but this typically involves considerable lag time between the time of testing and the delivery of results.
The First Nations Technical Services Advisory Group (TSAG) in Alberta argues that real-time monitoring systems can allow First Nations communities to have real-time access to their own drinking water quality, allowing them the opportunity to respond in real time to issues that may occur (TSAG 2012). Other benefits of real-time monitoring systems include: the opportunity to increase the safety of drinking water; real-time alerts to operators in the event something goes awry; an additional level of security; mitigating the risk of water contamination; and added features to ensure reporting and regular maintenance is conducted (TSAG 2012).
According to a 2012 report by John Duncan, through a contract with TSAG, Indigenous and Northern Affairs Canada invested $10.1 million CAD in broadband connectivity and infrastructure to develop remote water monitoring capacity for First Nations water systems in Alberta. As of March 31, 2012, remote monitoring systems were installed and became fully operational, providing real-time monitoring of water quality to 57 First Nations water treatment plants. This continued in 2012/2013 with further installation of real-time monitoring technology. According to Vaughn Paul, CEO of TSAG (Parliament of Canada 2013), We've installed remote water (quality) monitoring devices in every First Nation water treatment plant in Alberta. They're quite unique in their design and implementation. They don't use reagents or chemicals to do the testing and the monitoring. They give us real-time information on the quality of drinking water as it leaves the water treatment plant, using a sophisticated model and algorithm. TSAG also uses a remote water monitoring portal to allow for: real-time monitoring and aggregation of First Nations data; remote identification of variances and alarm conditions for plant operators; and fast and accurate reporting of water quality data to stakeholders (TSAG 2015). In addition, according to TSAG, it can allow operators to instantly know about water quality issues without having to be at the plant, and the early detection system helps to reduce frequency and severity of water quality incidents (TSAG 2017). All real-time monitoring data are housed in a centrally located website (rwms.tsag.net) which allows those with access to view the data at any time. According to TSAG, the systems installed include four monitoring probes that measure pH, total suspended solids, free and total chlorine, colour, temperature, chemical oxygen demand (COD), biochemical oxygen demand (BOD), electrical conductivity, dissolved oxygen, ammonium, and nitrate as nitrogen, which are connected to a computer with specialized event detection software that can detect abnormalities or departures from typical operating levels (TSAG 2017). The software ‘continuously measures water quality parameters at set intervals and sends out an alarm if parameters fall outside of a specified range. The data are collected in real-time and are transferred to an information network that links all First Nation water treatment plants to the Alberta Supernet’ (TSAG 2017). Their mission, according to the TSAG remote monitoring water portal, is to provide ‘real-time based water quality information of Alberta First Nations. Through fast and correct actions from detection of abnormality to recovery of water quality, we will help the communities keep the best water quality’ (TSAG 2017). In 2013, the federal government invested$4.3 million CAD towards the development and implementation of the Remote Water Monitoring System delivered by TSAG in partnership with their Circuit Riders Training program, to respond to recurring issues at water treatment plants including staff turnover, improper maintenance and repair, and troubleshooting and response time (AANDC 2012). The hope was that this remote monitoring would help identify potential problems more quickly and alert authorized personnel immediately (AANDC 2012). Further information is required to understand the long-term benefits of real-time monitoring, and whether these treatment plants experienced less frequent advisories. The Province of Alberta currently has 13 advisories in place (Health Canada 2017). According to most recent data, as of September 30, 2017, 46% of these advisories have been in place for less than one month, 31% have been in place for up to three years, and the remainder (23%) have been in place for over five years. However, as noted through conversation with TSAG, many community DWAs are unreported because they are systems with less than five connections, and a majority of these are private wells.
Since the program has started, there have been issues that have prevented the real-time monitoring units from accurately reflecting water quality in some communities, including low operator capacity, technology aversion, source water quality and ageing infrastructure (TSAG 2017). For example, in some communities, poor source water quality creates challenges for probe accuracy and have been identified as systems to be removed from the pilot project until underlying water quality issues are resolved (TSAG 2017). As this was the first phase of the project, next steps include heightened focus on training operators for monthly maintenance of probes, and development of training videos and resources (TSAG 2017). As the program continues, it is expected that more information will be available on the number of DWAs that have been reduced or eliminated.
Other recent examples in real-time monitoring use in Ontario First Nations communities include the Safe Water Projects in Deer Lake, Fort Severn and Poplar Hill First Nations, which were previously on BWAs for close to 1,000 days over the past 10 years (Wilson 2015). In 2013, the federal government invested \$1 million CAD for the pilot project in these five communities (INAC 2016). Through the Keewaytinook Okimakanak (KO) Northern Chiefs Council's Safe Water Project, Triton Intelligence Water Surveillance systems were installed, which deliver water quality results in real time to operators (Kelly 2016; Safe Water Project 2016). The five units are being connected to monitoring equipment in the Keewaytinook Centre of Excellence in Dryden which is capable of displaying and archiving the data from the units (INAC 2016). According to available information, the three communities of Deer Lake, Fort Severn and Poplar Hill are no longer on DWAs (Safe Water Project 2017).
In a public statement, Minister Bennett, Indigenous and Northern Affairs Canada highlighted the Department's recent work in Pic Mobert First Nation and Slate Falls First Nation. In June of 2016, the Minister highlighted that the new water treatment plant would put an end to long-term BWAs in the Pic Mobert community and Slate Falls First Nation, which has had nine BWAs that have been in place for 12 years. Further clarity is needed, to understand the impacts of these investments on reducing BWAs, especially the investments in real-time monitoring.
### Real-time monitoring data – an example
As an example, real-time monitoring data were obtained from sample communities. Figure 6 shows an example of real-time turbidity data experienced at a small community in southern Ontario. In this case, real-time monitoring technology is characterizing treatment performance at various stages including pre- and post-filtration, and finished water quality. Figure 6, for example, shows the turbidity values for the finished water quality; real-time monitoring can alert the operator to any issues that might arise, as a result of a sudden spike in turbidity. Hence, the operator can address whether components of the treatment system need to be modified, chlorine dosages need to be altered, or other operational fixes that might be required to ensure that clean and safe drinking water continues to be produced. In this example, the operator was able to look into the issue, and double-check that all systems were running correctly, or make modifications as needed. In both cases, a minor operational issue was the cause of the discrepancies observed.
Figure 6
Sample real-time finished water turbidity data.
Figure 6
Sample real-time finished water turbidity data.
Close modal
If a system alarm was to be set to send an alarm for any abnormal turbidity values, it is clear from Figure 6 that several incidents would be reported to the operator. If a setting of 0.5 NTU were to be set as abnormal, the operator would have received 34 alerts between January and November, 2016. While 0.5 NTU is still below the 1 NTU value set by the Drinking Water Quality Guidelines, 0.5 NTU is obviously an abnormal result for this particular plant, which typically operates around 0.05 NTU. In this case, 11 cases were observed over the same period where the effluent turbidity exceeded the guideline values (Table 2). However, it is clear from these data that due to the frequency of monitoring of elevated turbidity values, changes in treatment performance could be observed at much smaller values.
Table 2
Real-time turbidity monitoring data
Turbidity events (>1 NTU)
Date (Log)Turbidity value observed
18-Feb-16 2.00
25-Mar-16 1.63
24-Mar-16 1.51
24-Mar-16 1.38
18-Feb-16 1.36
17-Jun-16 1.18
15-May-16 1.13
12-Aug-16 1.10
17-Jun-16 1.10
14-Jun-16 1.09
24-Mar-16 1.07
Turbidity events (>1 NTU)
Date (Log)Turbidity value observed
18-Feb-16 2.00
25-Mar-16 1.63
24-Mar-16 1.51
24-Mar-16 1.38
18-Feb-16 1.36
17-Jun-16 1.18
15-May-16 1.13
12-Aug-16 1.10
17-Jun-16 1.10
14-Jun-16 1.09
24-Mar-16 1.07
Similarly, as seen in Figure 7, real-time monitoring technology in this community was monitoring the pH level of finished water.
Figure 7
Sample real-time pH data.
Figure 7
Sample real-time pH data.
Close modal
During this period, the operator would have been alerted to six instances where the pH of the finished water dipped below 7.0, on February 18 and June 27, 2016 (Table 3).
Table 3
Real-time pH monitoring data
pH events (<7.0)
Date (Log)pH value observed
27-Jun-16–11:59 am 0.74
27-Jun-16–1:59 pm 3.81
27-Jun-16–6:59 am 4.58
27-Jun-16–7:59 am 5.01
27-Jun-16–12:59 pm 5.90
18-Feb-16–8:59 am 6.84
pH events (<7.0)
Date (Log)pH value observed
27-Jun-16–11:59 am 0.74
27-Jun-16–1:59 pm 3.81
27-Jun-16–6:59 am 4.58
27-Jun-16–7:59 am 5.01
27-Jun-16–12:59 pm 5.90
18-Feb-16–8:59 am 6.84
### Enhanced operator and community-based control
Increasingly, engineering consultants that work with First Nations communities include real-time monitoring as part of their packages in order to help in the ongoing operation of treatment plants, and to troubleshoot problems, without having to visit the site directly. Operators in the past have commented on the benefit of having the ability to take a second look at their treatment performance, to help them troubleshoot, and as a way to train new operators. It is important to note that cost is an important parameter to take into account as technologies for real-time monitoring can be expensive, and may be too expensive for some First Nations communities, so suitable funding would be needed.
The concept of using real-time monitoring technology as a tool for community empowerment was noted in the recent work of the Safe Water Project, previously discussed. According to KO's Public Works Manager, real-time monitoring has provided an avenue for communities to assert control over their water systems, allowing communities to ‘start owning what happens in their community, rather than relying on somebody else to come and fix things for them’ (Northern Ontario Business 2016).
There are, however, some concerns and challenges to using real-time monitoring to address DWAs. There is concern from some community members that real-time monitoring systems may pose threats in terms of a third-party ‘big brother’ watching over communities, as well as issues over liability. Several community members, interviewed as part of a larger research project at the University of Guelph (Black & McBean 2017), indicated that they had concern with being watched from the outside, from people who may not have specific community context or who may be judging the operator's performance. One community member noted,
I would be concerned about who has access to this information, how it might be used, and whether it would be used against (the community).’
Some comments were related to an increase in real-time monitoring technology being offered as part of a package deal when consultants install newer treatment systems in communities. Consultants can include this feature as a way to provide guidance and enhanced security, and assist with any troubleshooting that may be needed. Often, this is viewed as a positive addition, providing operators with troubleshooting assistance in the short term, while they are working to get certification, or while they are learning a new treatment system. However, some community members noted that this can also be viewed as a community not having full control or autonomy over their water treatment, and having to rely and depend on external consultants. There was also a comment pointing to a general distrust of technology, the issue with information being available online and, ultimately, a concern for privacy. Community members noted,
(Real-time monitoring) is a great feature, and I love being able to check how the system is working, but sometimes I do worry whether someone will access this information to check-in on how I'm doing, how the system is running…and maybe they might make changes on their own, without notifying the operator who is working on the plant.’
You have to be careful about how this information is shared, and who is ultimately the owner of this information.
Several community members commented on the issues of liability. If a third-party consultant has access to this real-time monitoring information, and if they are providing consultation on the treatment system, there was concern as to who was ultimately responsible if any issues were to arise. It would be necessary to have a clear understanding of responsibilities.
You need to know if an alarm goes off, who is responsible and what happens if you can't answer it right away.’
This comment speaks more to the reality in many First Nations community. One community member noted that water operators in Indigenous communities often have multiple roles (in some instances, a water operator also manages the wastewater plant, or other public works activities such as snow removal). There is also the question of whether there is a backup operator, as in the absence of a backup operator, they cannot necessarily respond to alerts right away. In this case, there was concern that the operator would be held liable and/or responsible if a public health issue were to arise. There would therefore need to be a system in place for responding to alerts in the event that the primary operator is otherwise occupied, or not available.
There is an argument to be made that real-time monitoring serves as a tool for a community to empower itself to be more pro-active against possible issues in its water treatment system. When operators and community members have access to real-time monitoring technology, it enables the community to take more initiative in the running of their treatment plant, to address system issues right away in order to minimize issuance of a DWA. Over time, this information allows operators to be more accustomed to the typical performance of the plant, such that small disturbances are easily noticed, and rectified.
### Potential benefits for First Nations
Through real-time monitoring systems, it is proposed that both the frequency and duration of DWAs can be reduced, through the re-empowerment of communities, including increased control over water systems. Real-time monitoring would allow for: immediate notification and improved process and control; reduction in DWAs related to equipment malfunction and planned outages; and opportunities for enhanced training and capacity building.
As was discussed, a clear advantage of real-time monitoring technology is the ability to be alerted to potential issues in the treatment process that could provide early signals to operators. The technology helps a community to monitor treatment performance such as disinfection or other operational issues, which would alert operators to potential problems or issues much more quickly so they can be addressed immediately. However, given that this is a technology-based solution, caution will be needed in order to address the potential for false negatives and false positives. Further research is needed to address the potential impact on the issuance of DWAs.
As was previously discussed, DWAs are issued to protect public health because drinking water is either potentially unsafe, or confirmed to be unsafe (Health Canada 2017). Precautionary DWAs can also be issued for communities that may be at risk of contamination (e.g., groundwater supplies under the influence of surface water), or for known and planned maintenance and repairs to distribution systems (Leblanc 2017). The First Nations Health Authority in British Columbia indicates that precautionary DWAs are issued, for example, during emergency repairs or when a community lacks staff to support proper operation. Based on the numbers reported in the previous figures, estimation of the potential effectiveness of using real-time monitoring data to reduce the frequency and duration of DWAs can be made. According to Figure 5, one-third of the reasons for issuing a DWA in First Nations communities relate to equipment-related issues (as noted above) and can be treated as precautionary DWAs. In this case, real-time monitoring would provide operators with immediate updates as to the quality of the treated water, and whether drinking water quality was actually compromised, as opposed to precautionary.
In addition, 12% of the cited reasons for DWAs relate to operation that may compromise public health, which can also be treated as precautionary DWAs and may benefit from real-time monitoring technology.
Galway (2016) notes that a large number of DWAs from 2004 to 2013 were issued due to high levels of turbidity, primarily from surface water sources. These high turbidity values have been shown to reduce the effectiveness of water treatment, as well as contributing to microbial growth in source waters, increasing the risk of waterborne illness (Health Canada 2005; Mann et al. 2007; Galway 2016). This is the type of situation where real-time monitoring could help to alert operators to changes in source water quality (most often associated with spring and fall seasonal surface water changes) and would provide an opportunity for operators to adjust treatment, provided that adequate treatment processes exist to respond to the elevated turbidity in the source water.
Based on these data, Table 4 summarizes an assessment of the potential benefit of real-time monitoring technology for the reduction of frequency and duration of DWAs. These numbers were analysed based on available data from Health Canada on the nature of DWAs in First Nations communities.
Table 4
Per cent reduction in DWAs from real-time monitoring
Cause of DWA% of reported reasons for advisory issuanceaEstimated % of those DWAs issued for precautionary reasons% reduction in DWAsb
Equipment malfunction 28% 100% 19.3%
Operation would compromise public health 13% 70% 6.3%
Turbidity 21% 15% 2.2%
Lack of disinfection or disinfection residual 34% 15% 3.5%
Microbiological quality 38% 15% 3.9%
Deterioration in source water quality 9% 15% 0.9%
Total 36.0%
Cause of DWA% of reported reasons for advisory issuanceaEstimated % of those DWAs issued for precautionary reasons% reduction in DWAsb
Equipment malfunction 28% 100% 19.3%
Operation would compromise public health 13% 70% 6.3%
Turbidity 21% 15% 2.2%
Lack of disinfection or disinfection residual 34% 15% 3.5%
Microbiological quality 38% 15% 3.9%
Deterioration in source water quality 9% 15% 0.9%
Total 36.0%
aNote that there can be more than one reason for a given advisory and that therefore the number of reasons (n = 939) exceeds the number of advisories (n = 646).
bAs advisories are listed for more than one reason (for example, according to available data, there were 939 reasons cited for the 646 advisories issued between 1995 and 2007), this number is adjusted by a correction factor of 0.69 (646/939) to reflect this discrepancy. This adjustment is based on data obtained from Health Canada (2005).
The estimated percentage of DWAs issued for precautionary reasons were chosen based on previous reports and personal communication with subject matter experts. Although the available data are dated from 2007, more recent personal communications confirmed that, on average, 30% of DWAs that are issued each year relate to equipment malfunction (Leblanc, personal communication 2015). Based on the direction of Environment and Climate Change Canada, 100% of these advisories were deemed precautionary (ECCC 2016). Equipment-related DWAs, whether long-term or short-term, are likely more precautionary advisories, and would benefit from real-time monitoring technology to determine whether an advisory is necessary.
Similarly, according to available information, 70% of DWAs related to the reason that ‘operation would compromise public health’ and are short-term advisories of less than one month (Leblanc 2016). These short-term advisories are likely precautionary DWAs, and would also benefit from real-time monitoring technologies. The estimates for the remaining causes of advisories were selected based on a conservative estimate of 15%, which is estimated as the percentage of DWAs that may be precautionary.
It should be noted that real-time monitoring represents only one tool towards helping to reduce DWAs and re-empowering community-based operators for increased control of water treatment plants. It is also important that sufficient funding is present to address fundamental needs (i.e., ensuring adequate treatment is in place). Real-time monitoring provides one avenue through which DWAs can be addressed.
It has been estimated that over 90% of DWAs (in Ontario First Nations communities) that are issued are precautionary; real-time monitoring can help to reduce a proportion of these DWAs (Makie, personal communication, February 2017. Regional Environmental Health Manager, First Nations and Inuit Health Branch, Health Canada, Government of Canada 2017). Based on the analysis summarized in Table 4, it is estimated that real-time monitoring has the potential to reduce or eliminate approximately 36% of existing DWAs. Real-time monitoring data can also help to reduce the overall duration of DWAs, by alerting operators to issues in a more timely manner, and therefore potentially reducing the time it takes to address issues.
It would be essential to ensure proper policies are in place to support this type of initiative, including oversight, which could be covered by existing Health Canada environmental health officers. In this way, real-time monitoring technology could provide a benefit to both the community, as well as to the regulating body.
The Government of Canada recently announced a lifting of 14 long-term DWAs in First Nations communities across Canada, including a renewed commitment to reducing by half the remaining advisories within three years, and all advisories within five years (Liberal 2016). Inadequate access to safe and reliable drinking water for First Nations across Canada continues to be a top priority; however, there remains a lack of information on how best to proceed. A multi-faceted approach is needed to address the diverse range of DWAs plaguing First Nations communities across Canada.
As part of a larger research project, this specific study examined real-time monitoring as one potential tool to help reduce the frequency of DWAs. However, it is noted that this should be combined with efforts to address existing deficiencies in policy, which have been addressed in previous research work (Black & McBean 2016a, 2016b).
Reducing DWAs through real-time monitoring technology could mean that the focus can be placed on those communities which are facing real and urgent water quality issues, rather than having these issues aggregated with precautionary DWAs. Specifically, it could allow for the triaging of urgent DWAs, versus precautionary DWAs that are issued without any certainty on whether there is a real risk to public health. It is expected that real-time monitoring technology could contribute to reductions in a number of DWA categories including: alerting the operator to changes in source water quality; alerting the operator to equipment malfunctions; monitoring finished water quality during any upgrades or power failures; alerting the operator to microbiological issues (depending on the type of monitoring technology used); alerting the operator to changes in turbidity so that adjustments can be made; monitoring finished water quality; and monitoring water quality in the distribution system. Based on analysis, it is estimated that real-time monitoring has the potential to reduce either the frequency or duration of likely more than 36% of existing DWAs.
Real-time monitoring therefore promises to be a more sustained solution to decreasing drinking water treatment advisories in communities. However, eliminating DWAs is only one of the necessary steps toward the provision of clean and safe drinking water in First Nations communities. A concerted effort is needed to address policy gaps and regulatory issues as part of addressing drinking water quality in First Nations communities. The technology allows for enhanced training of new operators, faster response times to issues, and the opportunity to use remote monitoring for those communities that are isolated or do not yet have capacity to monitor drinking water treatment performance, in order to address chronic and systemic issues. The use of real-time monitoring technology as part of a holistic and First Nations-centred approach to addressing drinking water treatment issues is one way of addressing access to clean drinking water for First Nations.
Aboriginal Affairs and Northern Development Canada (AANDC)
2012
National First Nations Infrastructure Investment Plan: 2012–2013
.
June 2012
.
Ottawa, ON
,
50
pp. .
Black
,
K.
&
McBean
,
E.
2017
Community-based operator training and appropriate certification regimes for Indigenous water and wastewater systems
.
42
(
3
),
237
247
.
2016
. .
FNHA
2017
First Nations Drinking Water Safety Program
.
British Columbia
. .
Frey
,
M. M.
&
Sullivan
,
L.
2004
Practical application of on-line monitoring
.
AWWA Research Foundation Report
,
Denver
.
Galway
,
L. P.
2016
Boiling over: a descriptive analysis of drinking water advisories in First Nations communities in Ontario, Canada
.
International Journal of Environmental Research and Public Health
13
(
5
),
505
.
http://doi.org/10.3390/ijerph13050505
.
Glasgow
,
H. B.
,
Burkholder
,
J. M.
,
Reed
,
R. E.
,
Lewitus
,
A. J.
&
Kleinman
,
J. E.
2004
Real-time remote monitoring of water quality: a review of current applications, and advancements in sensor, telemetry, and computing technologies
.
Journal of Experimental Marine Biology and Ecology
300
(
1
),
409
448
.
2016
Statement by Minister Carolyn Bennett – Government of Canada Steadfast in Commitment to End Long-Term Drinking Water Advisories On Reserve
. .
2005
Guidelines for Canadian Drinking Water Quality: Supporting Documentation – Turbidity
.
,
Ottawa, ON
,
.
2009
Drinking Water Advisories in First Nations Communities in Canada A National Overview 1995-2007
. .
2016
Drinking Water Advisories in First Nations Communities
. .
2017
Drinking Water Advisories in First Nations Communities
. .
Hrudey
,
S. E.
,
Hrudey
,
E. J.
&
Pollard
,
S. J. T.
2006
Risk management for assuring safe drinking water
.
Environment International
32
,
948
957
.
Indigenous and Northern Affairs Canada (INAC)
2016
National First Nations Consolidated Infrastructure Investment Report: 2014–2015
.
Ottawa, ON
. .
Isfeld
,
H.
2009
Boil Water Advisory Mapping Project: An Exploration and Review of Available Data
.
Prairie Women's Health Centre of Excellence
,
Winnepeg, MB
,
. .
Kelly
,
L.
2016
Water Monitoring Program Showing Success
.
.
June 15, 2016
. .
Lambrou
,
T. P.
,
Anastasiou
,
C. C.
,
Panayiotou
,
C. G.
&
Polycarpou
,
M. M.
2014
A low-cost sensor network for real-time monitoring and contamination detection in drinking water distribution systems
.
IEEE Sensors Journal
14
(
8
),
2765
2772
.
Leblanc
,
I.
2016
Personal Communication. November 2016
.
Leblanc
,
I.
2017
Personal Communication. March 2017
.
Levasseur
,
J.
&
Marcoux
,
J.
2015
. .
2016
Speech: Assembly of First Nations
. .
Mann
,
A. G.
,
Tam
,
C. C.
,
Higgins
,
C. D.
&
Rodrigues
,
L. C.
2007
The association between drinking water turbidity and gastrointestinal illness: a systematic review
.
BMC Public Health
7
,
256
.
National Aboriginal Health Association
2007
Ownership, Control, Access and Possession
.
.
Neegan Burnside
2011
National Assessment of First Nations Water and Wastewater Systems – National Roll-Up Report
.
Department of Indian and Northern Affairs
,
Ottawa, ON
,
.
2016
Northwest water monitoring program showing success
. .
2013
Standing Committee on Aboriginal Affairs and Northern Development
. .
Reed
,
R. E.
,
Burkholder
,
J. M.
&
Allen
,
E. H.
2010
Recent developments in online monitoring technology for surveillance of algal blooms, potential toxicity, and physical-chemical structure in rivers, reservoirs and lakes
. In:
Algae: Source to Treatment
,
AWWA Manual M57
.
American Water Works Association
,
Denver, CO
.
Rodriguez
,
M.
,
Sanders
,
C. A.
&
Greenbaum
,
E.
2002
Biosensors for rapid monitoring of primary-source drinking water using naturally occurring photosynthesis
.
Biosensors and Bioelectronics
17
(
10
),
843
849
.
Safe Water Project
2016
How it Works
. .
Safe Water Project
2017
What it has Achieved
. .
2016
. .
Storey
,
M. V.
,
Van der Gaag
,
B.
&
Burns
,
B. P.
2011
Advances in on-line drinking water quality monitoring and early warning systems
.
Water Research
45
(
2
),
741
747
.
Technical Services Advisory Group Inc. (TSAG)
2015
Presentation at the 18th Annual TSAG Conference
.
October 28, 2015
.
First Nations (Alberta) Technical Services Advisory Group Inc
. .
Technical Services Advisory Group Inc. (TSAG)
2017
Remote Water Monitoring Portal
.
First Nations (Alberta) Technical Services Advisory Group Inc
.
http://rwms.tsag.net (accessed 15 March 2017)
.
TSAG
2012
Innovative Technologies & Approaches Remote Water Monitoring. Presentation at the Assembly of First Nations Water Conference, March 6–7, 2012
. .
United Nations
2010
The Millennium Development Goals Report
.
New York
.
van der Gaag
,
B.
&
Volz
,
J.
2008
Real-Time On-Line Monitoring of Contaminants in Water: Developing A Research Strategy From Utility Experiences and Needs
.
May 16, 2008
.
Kiwa Water Research
. .
Wagner
,
R.
2009
Real-Time Water Quality Monitoring: Data Errors and Comparability
.
Presentation at the Real-Time Water Monitoring Workshop
,
St. John's, Newfoundland
.
Wilson
,
T.
2015
Bad Water: Innovative Solution for Remote Northern Ontario First Nations
.
. .
Ziegler
,
A.
,
Bennett
,
T.
&
Rasmussen
,
T.
2006
Real-Time Continuous Water-Quality Data: Capabilities, Limitations, Applications, Costs, and Benefits
. In:
Presentation at the National Water-Quality Monitoring Council Conference San Jose
,
California
,
May 9, 2006
. . | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.20402882993221283, "perplexity": 3736.8359161392827}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00435.warc.gz"} |
https://www.shaalaa.com/question-bank-solutions/concept-elements-compounds-mixture-tick-most-appropriate-answer-constituents-mixture-are-present-fixed-ratio-variable-ratio-ratio-2-1-none-these_31426 | Share
# Tick the Most Appropriate Answer. the Constituents of a Mixture Are Present in a Fixed Ratio a Variable Ratio, the Ratio of 2: 1 None of These - Chemistry
Course
ConceptConcept of Elements, Compounds and Mixture
#### Question
The constituents of a mixture are present in
1. a fixed ratio
2. a variable ratio,
3. the ratio of 2: 1
4. none of these
#### Solution
a variable ratio,
Is there an error in this question or solution?
Solution Tick the Most Appropriate Answer. the Constituents of a Mixture Are Present in a Fixed Ratio a Variable Ratio, the Ratio of 2: 1 None of These Concept: Concept of Elements, Compounds and Mixture.
S | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8964951634407043, "perplexity": 2029.6475010904621}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00221.warc.gz"} |
https://byjus.com/square-foot-to-square-meter-calculator/ | # Square Foot To Square Meter Calculator
Square foot (foot)2=
Square meter (meter)2=
Square Foot To Square Meter Calculator is a free online tool that displays the conversion. BYJU’S online Square foot to Square meter calculator tool makes the calculation faster, and it shows the result in a fraction of seconds.
## How to Use the Square Foot To Square Meter Calculator?
The procedure to use the square foot to square meter calculator is as follows:
Step 1: Enter the number of square foot in the input field
Step 2: Now click the button “Solve” to get the result
Step 3: Finally, the value of number of square meters will be displayed in the output field
### What is Meant by the Square Foot To Square Meter Conversion?
Square foot is a measurement derived from the area of a square with a side length measured in feet. Similarly, the square meter can also be defined as the area of a square with side measures of one meter. One square foot is equal to 0.09290304 square meters. Hence, to convert the area from square foot (sq.ft) to square meters (sq.m), multiply the number of square foot by 0.09290304. A few conversion of units from square foot to square meters are given below:
1 sq.ft = 0.09290304 sq.m (or = 0.093 approx.)
2 sq.ft = 0.18580608 sq.m (or = 0.186 approx.)
50 sq.ft = 4.645152 sq.m (or = 4.645 approx.) | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9062486886978149, "perplexity": 1419.9221694090209}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488268274.66/warc/CC-MAIN-20210621055537-20210621085537-00225.warc.gz"} |
https://flex.phys.tohoku.ac.jp/english/pukiwiki-e/index.php?cmd=backup&page=Moya-NanoJapan-2013%28Open%29&age=28&action=diff | • The added line is THIS COLOR.
• The deleted line is THIS COLOR.
Started by Hasdeo.2013.05.31
This is Moya's logbook for Nano Japan project from 2012.6.2-2012.7.31.
#contents
* Daily schedule [#daily]
- 09:00-10:00 Discussion (1)
- 10:00-12:00 Solve the problem and write the progress on pukiwiki
- 12:00-13:30 Lunch
- 13:30-14:30 Discussion (2)
- 14:30-16:30 Solve the problem and write the progress on pukiwiki
- 16:30-17:30 e-mail report and problems
* Goal of the project. [#goal]
- To describe the thermal conductivity of Nanotubes and graphene. The output will be an animation of atomic vibration and its propagation in Mathematica
- Keywords: Thermal conductivity, carbon nanotubes, Differential equation, Fourier Transform, Solid-state physics, Mathematica
* Schedule for discussion [#discussion]
|Time and Day|Mon|Tue|Wed|Thu|Fri|
|09:00-10:00|Hasdeo|Tatsumi|Mizuno|Thomas|Nugraha|
|13:30-14:30|Thomas|Mizuno|Tatsumi|[group meeting]|Hasdeo|
* Division of tutors [#v0d44b28]
|Name|Lesson to teach|Misc|
|Hasdeo|Phonon in Nanotubes| How to make a presentation, and Japanese class|
|Tatsumi|Nanotubes| Printer and Copy machine|
|Thomas|Physical Mathematics| Library|
|Mizuno|Physical Computation| Computer in Lab|
|Nugraha|Phonon in Nanotubes| |
- Tutorial takes place in Coffee room, since visitor room will be occupied with many people
- This section is for posting questions from Moya-san and answers from other group members.
- Please list here with some simple reasons or details.
- For every problem, give a tag double asterisks (**) in the code so that it will appear in the table of contents.
- For the answer, give a tag triple asterisks (***) in the code below the problem in order to make a proper alignment.
- List from new to old.
* Report: [#d6196c2a]
** June 3: [#k93c5c39]
Today, Hasdeo-san picked me up from Urban Castle Kawauchi (UCK) with Thomas-san. I learned how to get to the lab by campus bus and have been introduced to the lab, Saito-sensei and the secretaries. Hadeo-san taught me about coupled oscillators, where I learned how to solve for the motion of two masses connected by springs. The goal is to model heat in CNT's as atoms vibrating with springs. Thomas-san also lectured me and taught me some math. He taught me how to solve the 2-dimensional Laplacian using separation of variables. He also provided some insight on the applications solving the laplacian. So far, everyone seems very nice and I am very excited to start working on thermal conductivity, which was a surprise.
** June 4: [#p63feebc]
Today, I walked from Urban Castle Kawauchi to the lab and managed to find my way, but I might have strayed a bit! I came early to skype my family back home, but began my lessons with Tatsumi-san at 9:00. He taught me about the graphene and carbon nanotube lattice and how vectors compose the unit lattice to form the Chiral Vector and Translational Vector. He also showed me formulas which describe the nanotube lattice. For homework, I was assigned to build a carbon nanotube out of paper and I have already drawn the Chiral Vector, but have not finished the job as I need to borrow scissors and tape. I also spoke with Saito-sensei and discussed the oscillator between two walls. I have a much better understanding of this situation and Saito-sensei assigned me to work on a similar model including a drag force. I believe I understand this problem, but am not to sure about the graphs which show resonance.
After lunch, Mizuno-san introduced me to Mathematica. I do not understand it that well, but for homework I am to research it online and learn different functions. I also spent some time playing with the functions and getting the hang of working with differential equations and plotting. I am also supposed to work on an animation, but this seems rather difficult at the time. Saito-sense also showed me how to calculate different aspects of the CNT today. I learned a lot from our meeting and am very excited to work on the problems he sets up for me. I am to work on a time dependent oscillating function for homework tonight and hopefully I can get this one right and continue to expand.
** June 5: [#gf3952b1]
I walked to the lab again today and met with Mizuno-san again to discuss Mathematica. He taught me about Rules and Patterns in programming and showed me several functions in mathematica. For homework I am to study graphics and attempt to make a figure of a particle between springs. I am also to study animation and manipulation, so I can modify this graphic. These are not very easy tasks as I do not know much about programming and I plan on looking for material to help me on mathematica. I have not begun the homework yet as I met with Saito-sensei to discuss more on a particle between two springs with an applied force. I believe I am starting to get the hang of solving these differential equations as I am beginning to recall what I learned last semester in my Differential Equations class. Homework from Saito-sensei involved me recalculating the solutions to the equations and plotting them on mathematica. I think I have successfully plottted them, but plan to ask Saito-sensei if it is a correct graph. I will try to solve the differential equation of the particle with friction and later try to derive the calculations for the properties of the CNT that Saito-sensei showed me yesterday.
After lunch, I worked on the plot of the solution on mathematica and went online to learn different functions of mathematica. I learned some shortcuts in typing and how to edit graphics, but I still have no idea how to make good graphics or animations.I met with Tatsumi-san and he explained some basic CNT properties like chiralities and metallic/semiconductor conditions. After this we discussed relationships between energy and temperature and energy and wavelength. We then went on to attempt to solve the Heat Equation. I understood the steps to solve the heat equation up until we had to solve for the constants. Solving for the constants required some ugly integrals with summations and trigonometry tricks that I do not know. I hope to look into this more when I go home and get a better understanding of this. Afterwards I continued to study the motion of the particle and work on its plot in Mathematica. I showed this plot to Saito-sensei and he explained the physical interpretation of the graph which dealt with beats and periods. he also went on about the imaginary part of damped oscillations. I have some homework for tonight on the imaginary solution as the imaginary part is key to understanding the transformation of heat in these situations.
** June 6: [#e24a9280]
Today I arrived at the lab early and worked on solving the damped oscillator equation and plotting the solution in mathematica. I successfully plotted the solution and was able manipulate the variables, so I could study the physical event. However, Saito-sensei would later explain this graph in more detail giving me a much better understanding. I meant with Thomas-san and he had me solve the 3-D Laplacian with boundary equations. This problem worked into a real ugly system of equations, but I understood the concept behind it. I continued to reteach myself some differential equations with Thomas-san and he later explained his presentation to me. He taught me about the solving the Laplacian in spherical coordinates, but I couldn't quite understand it and I plan on looking into it again. I then attended to 'group meeting' and I got to learn from Thomas-san's and Nugraha-san's presentations.I learned about the tough standards Saito-sensei has for presentations and a little about CNT's that Nugraha-san talked about. Later on, Saito-sensei explained the damped oscillator and has assigned me to study a coupled oscillator. I think I successfully modeled the non-damped homogeneous solution, but I have had some trouble solving the driven equation and plan to ask Hasdeo-san or Saito-sensei for help later. The goal is still to understand the transfer of energy through the springs.
** June 7: [#wae9b44d]
Today I met with Nugraha-san and he helped me solve the driven coupled oscillator that Saito-sensei assigned me. He taught me a better trial solution to use which let me understand the phase difference. However, I think we set up our differential equations wrong and I plan on solving them again. Nugraha-san also introduced infinite coupled oscillators. We have not yet introduced a force to them, but have worked on solving the differential equations. He explained the wavevector and lent me a book to that will help explain what I learned. He assigned me to study an infinite series of different coupled masses. I plan to work on this over the weekend and show it to him when I have time. I met with Saito-sensei as well and he showed me the error in our differential equations for the coupled oscillator and introduced some concepts behind the wavevector and optical/acoustic phonons.
** June 10: [#a77f1b0a]
Today,Hasdeo-san helped me finish the homework that Nugraha-san had assigned. This was to solve for the displacement of particles (coupled by springs) in an infinite lattice where the lattice cell is constructed of two particles of different mass as opposed to one. We found the solutions to the system of differential equations and he introduced the concept of zone boundaries and which phonons are acoustic or optical. I understand the math behind these conclusions, but am still rather confused by the physical meaning of frequency as a function of the wavevector. After discussing the acoustic and optical modes, Hasdeo-san introduced the model of thermal conductivity for a crystal lattice. He taught me how the transfer of energy is related to the phase shift in the two particles. I still do not completely understand this concept and plan on studying it more. After lunch I went with Thomas-san and he introduced the laplacian in polar coordinates. We had some trouble converting the initial definition, but I asked Saito-sensei for helped and he helped me work my way through. With some help from the internet, I understand the process of converting it and will begin to studying solving the differential equation. Hasdeo-san also came to my room again and discussed the thermal conductivity again and how it relates to the velocity of the center of mass. For homework, I am to study how heat transfer relates to the phase of different atoms in the atomic lattice.
** June 11: [#ib956120]
Today Tatsumi-san was absent, but I managed to work on the problems that were assigned to me yesterday. First I worked on plotting the dispersion plot where frequency is a function of wavevector for a two atom periodic lattice. While I attained the right plot, I am still rather lost behind the meaning of the plot. I am still confused as to the strict definition of a phonon and how the modes are determined at various k and w values. After achieving this graph, I began to work on Hasdeo-san's homework which consisted of calculating a constant which describes heat transfer in the lattice. I managed to calculate this lattice,but am still confused as to how the relationship is attained. I managed to plot the relationship of the constant vs frequency and learned the characteristics of this relationship. However, I do have some questions regarding the imaginary part of the solution and what it means for the conductivity to approach 'negative infinity'. Next I want to attempt to solve for this constant with forces at both walls and then to work on achieving this constant for a periodic lattice. Afterwards, I met with Mizuno-san and he taught me some more about Mathematica. I learned about rules and different functions like Flatten, Transpose, Real, and Refine. These different functions can be really useful for manipulating data in Mathematica. He also helped me work on the periodic lattice problem I had been considering. I also met with Saito-sensei today and he forced me to present what I have learned. He was pretty picky, but I think I did rather well for coming up with it on the spot and barely understanding it myself. I wish I could have talked to Saito-sensei more about science, but I understand the importance of presenting what I know. For tomorrow, I am to work on a presentation of a single atom infinite lattice and learn about boltzmann's constant and heat transfer. I also want to ask Hasdeo-san about the meaning of the velocity of the center of mass and how it relates to energy.
**June 12: [#s4419843]
Today, I met with Mizuno-san and he continued to show me different functions of Mathematica. I learned different input methods for basic functions and how to handle matrices and vectors.I also learned how to manipulate solutions of differential equations with NDSolve. For homework, I was assigned to look up Graphics and understand them. I looked up different graphics and have began understanding the various how to use lines, polygons, circles and how to edit their style. I first want to make a solid graphic of a single oscillator and then I want to try to animate it. I hope to ask Mizuno-san for help on animating the object. Afterwards, I met with Saito-sensei and he introduced the relationship of energy to our model of springs. He showed me various laws and equations that relate energy, motion, heat, and conductivity. Today, I will study and attempt to understand these various equations.
I continued to work on diffusion equations and I have a strong understanding of their derivation and physical implications. I continued to work on understand these and began to research the relationships between phonon modes, energy, and temperature. I stumbled upon the Debye and Einstein models, which Saito-sensei later encouraged me to look at. They involve some difficult math and physics I don't quite understand, but I may need some information that it has to offer. I met with Hasdeo-san to ask him various questions about the wave vector, energy equations and heat relationships. I now have a better understanding of the wave vector and the concept of phonons in solid materials. I also met with Saito-sense again and he has advised to attempt to solve the Heat equation with certain boundary conditions and to study the Debye model.
** June 13: [#zbf07e54]
Today I met met with Thomas-san in the morning and we worked on solving the 2D polar laplacian. I understand what we are trying to do and can solve the equation in a general method, but am having trouble with the Fourier series solution. I borrowed Thomas-san's book on Fourier series and plan to study the solution to this differential equation. On my own time, I attempted to study some basic statistical mechanics, but am having a decent amount of trouble with the subject and plan on asking Hasdeo-san and Nugraha-san for help on it tomorrow. I particularly stuck on the derivation of Boltzman's factor and the partition function. I want to understand these topics so that I can understand the Debye Model which provides a relationship between phonon modes, heat, and energy. Hasdeo-san has provided me the assignment of learning to derive the distribution functions, but I am having trouble with this as well. I hope to ask Hasdeo-san for help tomorrow and hopefully I can receive a better understanding of the subject.
** June 14: [#r357f51e]
Today I met with Nugraha-san in he morning and he introduced the expansion of coupled oscillators to containing N oscillators. He showed me how to solve for the frequency and amplitudes of movement for the oscillators. In order to solve them, I was instructed to use Mathematica. I have attempted to solve the matrix, but am having some trouble with obtaining the final solution. The program provides several solutions, that I don't quite understand. I also found the relationship of N coupled oscillators with a damping constant in the springs. This was not very difficult, but I still cannot solve the matrix in mathematica, which I will have to learn to do.
** June 17: [#cf8661e7]
I spent the first part of my day discussing my project with Hasdeo-san. We talked over the basic ideas behind the project and tried developing a simple model describing energy transfer in a system of oscillators. We left the room confused as we could not understand how to relate the temperature of the wall vibrations and force of the wall. After lunch I met with Hasdeo-san again and we may have created a simple way to observe heat transfer. This method consists of comparing the amplitudes of vibration to energy for specific 'points'. These points are atoms in the lattice which may provide a general structure for a plot fit. We plan to use the general solution to the heat equation to fit the data. I will want to use Mathematica to generate the exact solution. I will begin working on this simple model right now and plan to extend this model to multiple atoms later. I also want to consider using phonons in the model in time.
I met with Thomas-san today and we worked on general solutions and fourier series of the heat equation.
** June 18: [#oe7b407b]
Tatsumi-san wasn't here to lecture me, so I worked on my project on my own. My initial idea with Hasdeo-san has hit a road block as the 'spring constant' appears in the relationship of the amplitudes. I do not know if there is a way to solve for this constant, or any assumptions I can make to eliminate the constant. I will have to talk with Hasdeo-san later to see if we can find a way to complete the relationship between the amplitudes of movement. I am also interested in determining the frequency of movement of the wall. We are assuming the wall vibrates at a set frequency, but is there anyway to determine frequency? I also studied the heat equation and using Fourier series to find a solution. I also continued to study phonons and have began looking into the quantum nature of phonons, but this topic seems to be to difficult to allow easy application in our model.
In the afternoon, Mizuno-san taught me more about mathematica. He showed me how to work with graphics and animations and we created a small animation of the 'balls between springs'. This animation is not that great, but its a start! I think I understand the process very well and he has also taught me several functions as well. I also continued to work on my project, and talked to Hasdeo-san about several problems I had. I think we have a running model, but I will have to input values for the 'spring constant' and the 'frequency of vibration'. I also found errors in some of my derivations, so I will have to find these relationships again. I plan to work on finishing a plot tomorrow and to continue expanding the idea to many atoms.
** June 19: [#f92b7927]
This morning I meant with Mizuno-san and we continued to work on the animation of the atoms between springs. We managed to get a realistic animation for the case with several atoms, but are now trying to extend the model to multiple atoms. After showing me how to use Tables, and Block, Mizuno-san assigned me to generate a code that would produce the animation for 'n' atoms. I've been working on this for a while and have hit a problem where I cannot assign the equations of motion to the animated objects. I will need to ask Mizuno-san for help later on.
I spent the rest of my day working on my project. I used mathematica to try to solve for 'lambda' which represents the thermal diffusivity of the solid. I managed to solve for constants representing the general solution of the heat equation for my two atom system, but lambda is both negative and imaginary. I do not know if this makes physical sense and will need to ask Hasdeo-san for his opinion on the matter. Hasdeo-san also showed me some software on flex that may help fitting a plot to the points I obtained.
** June 20: [#keffb9a7]
This morning I began looking into Fourier transforms as they keep appearing in the quantum definition of phonons. I met with Thomas-san and we worked through some differential equations using Fourier series and we derived the fourier transform for the Gaussian distribution. I understand that Fourier transforms are used to make a time dependent function, only dependent on the frequency of a periodic function, but I need to look into the derivation of fourier transforms and their application physics. However, Thomas-san showed me some interesting applications that Fourier Transforms have in imaging.
I spent the afternoon continuing to work on my project. Hasdeo-san and I came to the conclusion that Boltzmann's constant was to small and affecting the calculations on my computer, so we placed Boltzmann's constant=1. This should hopefully keep the values on a larger magnitude which makes it easier to relate. I used this value and obtained a much better list plot of the three points which seems to make physical sense, but I cannot find an acceptable best fit line using the general solution to the heat equation. I keep receiving graphs whose data is way off point. I think I may need may points and I may have to take the time dependence of x along with time to use more points for a better fit. However, I would not know how to fit this into Mathematica and may need to ask for help. I believe that these points are correct, but the general solution of the heat solution is not the correct line that we should be fitting to. Hasdeo-san also began teaching me about Carbon Nanotubes and he reviewed the basic structure of the CNT and began teaching me about energy dispersion and the relationship to the brillioun zone. I hope to learn more about the carbon nanotube and to understand phonons in the CNT so I can later model it.
** June 21: [#t0eb9e69]
Today Nugraha-san was busy with his thesis, so I continued to study various things on my own. I continued to study the brillioun zone and phonons in CNT's. I have begun to understand the process of analyzing phonons in CNT's but am a little lost when the math shows up. I will need to ask Hasdeo-san to explain some details to me. Nugraha-san also brought some sheets for me to read that taught me about modes of vibration in solid materials. In the afternoon, I met with Hasdeo-san and we continued to discuss the project. I told him how I had doubt in our heat solution and we checked it to find out the solution was in fact wrong. We found a new solution that I would use for a fit later. When I worked on my own, the fit worked much better and realistic lambda had been found!
** June 24: [#f62b8cf4]
Today I met with Hasdeo-san and we continued to talk about my project. I showed him the lambda that I had calculated using our new heat solution. We continued to analyze my mathematica program to make sure all details were taken accounted for and we discussed certain points of the model. These points included talking about 'complex temperature' and 'complex energy' which may not be reasonable. We also noticed that 'lambda' (our constant) changed with time. Since this constant may be dynamic, Hasdeo-san has assigned me to find the 'constant's' dependence on time. I will do this by trying to find multiple values at various t's and plotting for a dependence. I hope that we can find a simple relationship between the values. I have also been assigned to work on a presentation and to begin studying phonons in CNT's and graphene.
In the afternoon, I went with Thomas-san to go a library card and had Hasdeo-san connect me to the printer. I then began working on my powerpoint and got several introductory slides done. I then worked on my project some more. I managed to obtain a plot of \lambda vs time. There is a small deviation in the values over time, but most of the values are contained in a small (about 1 unit) area. Hasdeo-san wants me to make an animation where the plot will change with time accordingly, so we can monitor the time dependence. He also gave me a paper to read that discusses thermal properties of carbon nanotubes. I am also continuing to look into phonons in carbon nanotubes. I also would like to begin expanding the simple model to multiple atoms and then to carbon nanotubes in time.
**June 25: [#p83a0ed3]
Today, I spent my morning working on my powerpoint. I managed to finish all the slides, but will need to add graphs, tables, etc from the project I have been working on.I also continued to look up different details about phonons in graphene and carbon nanotubes. However, I am still a little stuck on some math parts that I do not understand. I will need to ask Hasdeo-san or someone to explain these concepts to me.
In the afternoon I worked with Mizuno-san on animations of connected atoms. We managed to create an animation on Mathematica of compounded oscillators. I used these skills to create different animations and graphs for my powerpoint. These graphs include simple pictures of the two atom system along with a '1D' object view that lets me label different point, which should make explaining facts simpler.
**June 26: [#k5e87d6a]
This morning I went with Mizuno-san to continue working on our animation of 'n' atoms connected by springs. The animation is working out pretty well, except that we have to chose our constants right so that the graph works out pretty. He also showed me some functions that will help me later on and began showing me how to analyze the motion of the ith atom in the series. We hope to translate the motion of the ith atom to energy in time. Afterwards, I continued to work on my powerpoint presentation and continued to study different things about the carbon nanotubes.
In the afternoon, I continued working on the powerpoint and went to Hasdeo-san for help in the afternoon. He showed me zone folding in the carbon nanotube and how phonons relate to raman spectroscopy. He then reviewed my powerpoint and I continued to study carbon nanotubes. Before I left I finished up m presentation.
**June 27 [#wbda2962]
This morning I went with Thomas-san and we began studying thermodynamic relations in crystal lattices. We looked at different relationships, and began to analyze a gas model that relates conductivity to mean free distance, etc. I then practiced my powerpoint afterwards and gave the presentation afterwards. I think I did a decent job, but it was very relax because no Professors were there and it was only the students. After my presentation, we discussed my project and what would be the next steps for getting there. I listened to the grad students discuss different topics from types of transport to how to relate heat to vibrational frequencies without quantum mechanics. We could not come to a simple answer and decided to separate to continue studying. I spent my time afterwards studying quantum transport and have a decent understanding, but will need to ask Hasdeo-san for help on specific topics later on. I also continued to study phonons in CNT's and zone folding. I think I'm beginning to understand teh derivation of phonons in CNT's, but I do not quite understand their physical relevance. For the time being, I want to continue studying quantum transport in materials.
** June 28 [#s3c962b1]
This morning, I met with Nugraha-san and he showed me some various programs on 'flex'. He gave me access to a file name 'phonons' which allows me to plot and visualize phonons in various nanotubes. This will probably be a very useful plot in time as I have continued to study phonons in CNTs. Nugraha-san also downloaded some plotting programs on my computer and explained how low energy phonons would be involved with my project. Using 'flex' is still a little complicated and I will need to practice with it more. Afterwards I have continued to study phonons in CNT's and the Boltzman Distribution Theory which we think may be useful in our heat transport equations. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6894065141677856, "perplexity": 518.4297821892976}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587799.46/warc/CC-MAIN-20211026042101-20211026072101-00696.warc.gz"} |
https://www.zora.uzh.ch/id/eprint/188711/ | # Quality of life up to 10 years after traumatic brain injury: a cross-sectional analysis
Rauen, Katrin; Reichelt, Lara; Probst, Philipp; Schäpers, Barbara; Müller, Friedemann; Jahn, Klaus; Plesnila, Nikolaus (2020). Quality of life up to 10 years after traumatic brain injury: a cross-sectional analysis. Health and Quality of Life Outcomes, 18:166.
## Abstract
BACKGROUND
Traumatic brain injury (TBI) is the leading cause of death and disability among children and young adults in industrialized countries, but strikingly little is known how patients cope with the long-term consequences of TBI. Thus, the aim of the current study was to elucidate health-related quality of life (HRQoL) and outcome predictors in chronic TBI adults.
METHODS
In this cross-sectional study, 439 former patients were invited to report HRQoL up to 10 years after mild, moderate or severe TBI using the QOLIBRI (Quality of Life after Brain Injury) questionnaire. The QOLIBRI total score has a maximum score of 100. A score below 60 indicates an unfavorable outcome with an increased risk of an affective and/or anxiety disorder. Results were correlated with demographics and basic characteristics received from medical records (TBI severity, etiology, age at TBI, age at survey, time elapsed since TBI, and sex) using regression models. Differences were considered significant at p < 0.05.
RESULTS
From the 439 invited patients, 135 out of 150 in principle eligible patients (90%) completed the questionnaire; 76% were male, and most patients experienced severe TBI due to a traffic-related accident (49%) or a fall (44%). The mean QOLIBRI total score was 65.5 (± 22.6), indicating good HRQoL. Factors for higher level of satisfaction (p = 0.03; adjusted R$^{2}$ = 0.1) were autonomy in daily life (p = 0.03; adjusted R$^{2}$ = 0.09) and cognition (p = 0.05; adjusted R$^{2}$ = 0.05). HRQoL was weakly correlated with initial TBI severity (p = 0.04; adjusted R$^{2}$ = 0.02). 36% of patients reported unfavorable HRQoL with increased risk of one (20%) or two (16%) psychiatric disorders.
CONCLUSIONS
The majority of chronic TBI patients reported good HRQoL and the initial TBI severity is a slight contributor but not a strong predictor of HRQoL. Autonomy and cognition are decisive factors for satisfied outcome and should be clearly addressed in neurorehabilitation. One third of patients, however, suffer from unsatisfactory outcome with psychiatric sequelae. Thus, an early neuropsychiatric assessment after TBI is necessary and need to be installed in future TBI guidelines.
## Abstract
BACKGROUND
Traumatic brain injury (TBI) is the leading cause of death and disability among children and young adults in industrialized countries, but strikingly little is known how patients cope with the long-term consequences of TBI. Thus, the aim of the current study was to elucidate health-related quality of life (HRQoL) and outcome predictors in chronic TBI adults.
METHODS
In this cross-sectional study, 439 former patients were invited to report HRQoL up to 10 years after mild, moderate or severe TBI using the QOLIBRI (Quality of Life after Brain Injury) questionnaire. The QOLIBRI total score has a maximum score of 100. A score below 60 indicates an unfavorable outcome with an increased risk of an affective and/or anxiety disorder. Results were correlated with demographics and basic characteristics received from medical records (TBI severity, etiology, age at TBI, age at survey, time elapsed since TBI, and sex) using regression models. Differences were considered significant at p < 0.05.
RESULTS
From the 439 invited patients, 135 out of 150 in principle eligible patients (90%) completed the questionnaire; 76% were male, and most patients experienced severe TBI due to a traffic-related accident (49%) or a fall (44%). The mean QOLIBRI total score was 65.5 (± 22.6), indicating good HRQoL. Factors for higher level of satisfaction (p = 0.03; adjusted R$^{2}$ = 0.1) were autonomy in daily life (p = 0.03; adjusted R$^{2}$ = 0.09) and cognition (p = 0.05; adjusted R$^{2}$ = 0.05). HRQoL was weakly correlated with initial TBI severity (p = 0.04; adjusted R$^{2}$ = 0.02). 36% of patients reported unfavorable HRQoL with increased risk of one (20%) or two (16%) psychiatric disorders.
CONCLUSIONS
The majority of chronic TBI patients reported good HRQoL and the initial TBI severity is a slight contributor but not a strong predictor of HRQoL. Autonomy and cognition are decisive factors for satisfied outcome and should be clearly addressed in neurorehabilitation. One third of patients, however, suffer from unsatisfactory outcome with psychiatric sequelae. Thus, an early neuropsychiatric assessment after TBI is necessary and need to be installed in future TBI guidelines.
## Statistics
### Citations
Dimensions.ai Metrics
### Altmetrics
Detailed statistics | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.33113470673561096, "perplexity": 9595.707222029881}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189264.5/warc/CC-MAIN-20200918221856-20200919011856-00122.warc.gz"} |
https://www.physicsforums.com/threads/resetting-the-affine-transformation-matrix.564716/ | # Resetting the Affine Transformation matrix
1. Jan 3, 2012
### Avinash Raj
Affine Transformation Matrix is said to be formed by initializing it using a learned projection matrix from a conventional algorithm like Eigenfaces or Fisherfaces; then it is reset by using the singular value decomposition T=UAV', where T is the transformation matrix.
Could somebody explain how the decomposition is obtained and what it is?
2. Jan 3, 2012
### Avinash Raj
I didnt go into details of initialising the tranformation matrix as well as the "resetting". I presumed that those in the forum are learned enough to know the basics of affine transformation. Do let me know if somebody wants more data from me to be able to explain the concept to me.
3. Jan 3, 2012
### Avinash Raj
It is obvious that SVD of the matrix T is shown.
An IEEE paper (Face Verification With Balanced Thresholds) that I read few days back says "the right orthogonal matrix of SVD of a transformation matrix does not affect the similarity measure if based on Euclidean distance." I drew blanks in my attempts to understand how it is so and wikipedia wasnt a help at all. Could you tell me why the measure is invariant to the right orthogonal matrix?
Note - The right unitary matrix becomes orthogonal as only real matrices are considered in the problem. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9112241268157959, "perplexity": 873.4760270339194}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747215.81/warc/CC-MAIN-20181121052254-20181121074254-00107.warc.gz"} |
http://laquintacolonna.it/ttbg/best-subset-selection.html | Assume that is a single random subsample that is drawn from , and is the remaining subsample, where such that is the number of rows in the concentrated design matrix. This notebook explores common methods for performing subset selection on a regression model, namely. Population sampling is the process of taking a subset of subjects that is representative of the entire population. Revisit two baby boomers (best-subset selection and forward-stepwise selection), one millennial (lasso) and a newborn (relaxed lasso). Subrange model selection The DCA employs a straightforward approach to solve the best-subset problem (2). Supplement to "Best subset selection via a modern optimization lens". Millions of polymorphisms are reported and freely available in public databases. This is the statistic used to choose the "best" model when best subsets selection is used. 1 Selecting Rows/Columns/Cells. It compares all possible models that can be created based upon an identified set of predictors. Our idea is to teach the system to learn from human-created summaries how to select informative and diverse subsets, so as to best meet evaluation metrics derived from human-perceived quality. Two different levels of confidence are selected for analysis, 90 and 95 percent, to demonstrate how confidence level affects inference on order statistics and cardinality of the best and worst subsets. Over the decades, scientists have used various statistical tools to select among alternative models of data. Approval Voting Approach to Subset Selection Peter C. Variable Selection (best subset and LASSO) Shaobo Li March, 2019. In this section, we learn about the best subsets regression procedure (or the all possible subsets regression procedure). But why bother? 1. If exclude it => S, n=n-1. If you have only two groups or if you want to explore group differences two groups at a time, you can perform best variable subset selection in PROC LOGISTIC. Best Subset Selection Based on the Leaps and Bounds algorithm proposed by Furnival & Wilson[1], our implementation identifies the best subset of predictors in the least squares sense in a model of the form: 𝑌𝑌=𝑋𝑋. K-fold cross-validation, a popular alternative to model selection. We show that, for a broad range of criteria used in the statis-tics literature, the best subset selection problem can be modeled. Adjusted r-squared. For example, when fitting a linear regression model you might be interested in the subset of variables that best describe the data. In this survey, we focus on feature selection algorithms for classification and clustering. You can also think of this as "filtering" a dataset so that only some cases are included. 'best' model under a specified criterion, but which may contain additional information of interest from a clinical or scientific viewpoint. While the exact optimization problems are equivalent, ob-. Repeat for a number of iterations 1a. Let c denote. The Akaike information criterion (AIC) is routinely used for model selection in best subset regression. Definition of Venn Diagrams: Venn Diagrams are closed circles, named after English logician Robert Venn, used to represent. The problem of model selection is at the core of progress in science. This Essay introduces a new method for selecting subsets that combines the best elements of both the direct selection method and random assignment, while avoiding their pitfalls. a) Select the best subset of features In order to find the best subset, we train the MLR, DT, RF, and BT classifiers using all the subsets selected by the Feature Importance method at the pre. Part 3 Finding subsets that fit well: objectives and limitations of this chapter; forward selection; Efroymson's algorithm; backward elimination; sequential replacement algorithms; generating all subsets; using branch-and-bound techniques; grouping variables; ridge regression and other alternatives. We propose a novel selection scheme to directly. This method uses the branch-and-bound algorithm of Furnival and Wilson to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. This is a subset of the Nasdaq U. We want to explain the data in the simplest way Š redundant predictors should be removed. z Including as few covariates so that the cost of obtaining information and monitoring is not a lot. There are many ways, we can do feature selections. The techniques are confined to regression methods. To perform best subset selection, we fit a separate least squares regression for each possible combination of the p predictors. Best subsets regression is an exploratory model building regression analysis. We start with an empty feature subset and add one feature at the time in each round; this one feature is. Variable Selection in Regression Analysis using Ridge, LASSO, Elastic Net, and Best Subsets Brenda Gillespie University of Michigan. Feature selection degraded machine learning performance in cases where some features were eliminated which were highly predictive of very small areas of the instance space. file('examples', 'DT-selection', package = 'DT')). This subset-selection problem can be formulated as a bilevel MIO problem. In this section, we learn about the best subsets regression procedure (or the all possible subsets regression procedure). out = NULL, method = "exhaustive") 10 Variables (and intercept) Forced in Forced out age FALSE FALSE lwt FALSE FALSE race. 1 Prediction, explanation, elimination or what? 1 --1. Perform (1) to (5) until the subset is the same as the original data set. regsubsets returns an object of class "regsubsets" containing no user-serviceable parts. Stepwise regression is a semi-automated process of building a model by successively adding or removing variables based solely on the t-statistics of their estimated coefficients. Best Subset Selection is rarely used in practice for say p=10 or larger. Supplement to \Extended Comparisons of Best Subset Selection, Forward Stepwise Selection, and the Lasso" Trevor Hastie Robert Tibshirani Ryan J. Let c denote. This sequential subset selection pro-cedure achieves the selection goal described above. Subset Sum Problem (Subset Sum). Best subset regression is an alternative to both Forward and Backward stepwise regression. The stepAIC() function begins with a full or null model, and methods for stepwise regression can be specified in the direction argument with character values “forward”, “backward. The summary() command outputs the best set of variables for each model size. Thoroughly revised to reflect progress in theory, methods, and computing power, the second edition promises to continue that tradition. the best policy that minimizes the overall mortality, two ranking-and-selection (R&S) procedures from the literature (Rinott (1978) and Kim and Nelson (2001)) were implemented and compared. The simplest method (and the default) is SELECTION=NONE, for which PROC LOGISTIC fits the complete model as specified in the MODEL statement. It is especially challenging when predictors are high-dimensional, in which case subset selection is considered to reduce model complexity and enhance model interpretability. Title: Best subset selection, persistence in high-dimensional statistical learning and optimization under $l_1$ constraint: Authors: Greenshtein, Eitan. With that out of the way How do we know that we don't have a different 'best' model of size i for each different fold j? You don't. First Version Submitted for Publication on June, 2014. , stepwise selection) is a controversial topic. ann e fitzmaurice posted: ----- i have been asked by a colleague if it is possible to do 'best subsets' modelling in logistic regression my question is therefore. figure ( figsize = ( 16 , 6 )) ax = fig. The goal of feature selection for unsupervised learning is to find the smallest feature subset that best uncovers “interesting natural” groupings (clusters) from data accord-ing to the chosen criterion. A population should be regarded as ‘candidate’ for the best population and thus retained in the subset if the samples from the other populations are not significantly better. in = NULL, force. What is the best model obtained according to $$C_{p}$$ , $$BIC$$ , and adjusted $$R^2$$ Show some plots to provide evidence for your answer, and report the coefficients of the best model obtained. Keywords: best subset selection, primal dual active set, model selection. The features are considered unimportant and removed, if the corresponding coef_ or feature_importances_ values are below the provided threshold parameter. While we will soon learn the finer details, the general idea behind best subsets regression is that we select the subset of predictors that do the best at meeting some well-defined objective criterion, such as having the largest $$R^{2} \text{-value}$$ or the smallest MSE. the best policy that minimizes the overall mortality, two ranking-and-selection (R&S) procedures from the literature (Rinott (1978) and Kim and Nelson (2001)) were implemented and compared. Stepwise Selection. Reduced rank regression is popularly used for modeling the relationship and uncovering the structure between multivariate responses and multivariate predictors in genetics. Linear model (LM), as a simple parametric. In the case of FTL, the community has created a number of mods, ranging from redesigns of the game's art all the way to mods which create brand new campaigns and gameplay modes. The actual set of predictor variables used in the final regression model must be determined by analysis of the data. Consider forward selection, backward selection and best subset selection with respect to the same data set. The paper "Extended Comparisons of Best Subset Selection, Forward Stepwise Selection, and the Lasso" by Hastie et al (2017) provides an extensive comparison of best subset, LASSO and some LASSO variants like the relaxed LASSO, and they claim that the relaxed LASSO was the one that produced the highest model prediction accuracy under the widest. Feature selection degraded machine learning performance in cases where some features were eliminated which were highly predictive of very small areas of the instance space. Keywords: best subset selection, primal dual active set, model selection. The resulting algorithm (a) provides a solution with a guarantee on its suboptimality even if we terminate the algorithm early, (b) can accommodate side constraints on the coefficients of the linear regression and (c) extends to finding best subset solutions for the least absolute deviation loss function. Random Sampling. The overall difference between Mallows' Cp and stepwise selection is less than 3%. While HR works in many areas including employee engagement, employee development, statutory compliance, data management and many others, one of the key areas of focus for HR is to attract, select and onboard suitable candidates for the organization. ables p is large, the best subset selection is computationally intensive. In the old days, I would test all-subsets by running all combinations of the independent variables and examining the model R-square and Mallow's Cp and so on (see Kleinbaum et al. Forward and backward stepwise selection is not guaranteed to give us the best model containing a particular subset of the p predictors but that's the price to pay in order to avoid overfitting. To this end, we propose the sequential determinantal point process (seqDPP), a proba-. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain. The method works best when the matrix is rank-deficient and there is a clear indication of numerical rank (a gap in the singular values)—see the references [3,4] for more details. With that out of the way How do we know that we don't have a different 'best' model of size i for each different fold j? You don't. This is to be expected, because MATa progeny can escape selection for MATαATogeny can escape selection for expecteSTE3pr-LEU2 and leu2∆0, but gene conversion cannot occur between STE2pr-SpHIS3. To achieve the best possible performance with a particular learning algorithm on a particular training set, a feature subset selection method should. We note that it is also common to cast this as a minimiza-tion problem, with the objective being kA A[S]Ak2F. Let OPT= max X:jXj kf(X) denote the optimal function value of Eq. In the panel: To change the isolated subset to the current selection, select Show > Isolate Select > Load Selected Objects. References. R 2 always increases when you add additional predictors to a model. selection, if continued, will sooner or later “fix” the favored allele (i. However, it is difficult to optimize, being non-smooth. Tue 12 July 2016. This new method—which I call the rank-order method—creates subsets that are judicially efficient and representative of the appellate body as a whole. They often beat many other models that take up to weeks to develop. We consider a primal-dual active set (PDAS) approach to exactly solve the best subset selection problem for sparse LM, GLM and CoxPH models. cat + smoke + preterm + ht + ui + ftv. Read more in the User Guide. In this survey, we focus on feature selection algorithms for classification and clustering. We start with an empty feature subset and add one feature at the time in each round; this one feature is. The subset selection problem in sparse regression is to best estimate a predictor variable by linear regression [12], where the quality of estimation is usually measured by the mean squared error, or equivalently, the squared multiple correlation R 2 [6, 11]. A logical matrix indicating which elements are in each model. best subset of predictor variables for predicting patient satisfaction. This enables supervised learn-ing, exploiting knowledge encoded in human-created sum-maries. Best subset regression is an alternative to both Forward and Backward stepwise regression. Wrapper methods use some predictive algorithm to evaluate subsets of features. A logical matrix indicating which elements are in each model. Over the decades, scientists have used various statistical tools to select among alternative models of data. Best subset selection Number possible subsets if p variables. Variable Selection (best subset and LASSO) Shaobo Li March, 2019. In many cases. SVD subset selection is a simple heuristic method that picks a subset of k columns from a matrix that estimates the best-conditioned subset of columns of size k. Subset selection methods. Generate all subsets of the set formed by removing x from the main set. First, you should notice that the only subset of an empty set is the empty set itself. So Trevor and I sat down and hacked out the following. Choose the subset with the largest AD as the best subset of the current forward selection step. I also thought of a pca approach for mixed data, but as far as i know filter methods like B1,B2,B3,B4 (Jolliffe) for variable selection are not meant for regression subset selection. We propose a novel selection scheme to directly. Our algorithm cleverly applies a randomized approach to rounding the continuous relaxation of the integer variables. Please read our cookie policy for more information about how we use cookies. Abstract: Subset selection, aiming to select the best subset from a ground set with respect to some objective function, is a fundamental problem with applications in many areas, such as combinatorial optimization, machine learning, data mining, computer vision, information retrieval, etc. CoStat has ANOVA, multiple comparisons of means, correlation, descriptive statistics, analysis of frequency data, miscellaneous tests of hypotheses, nonparametric tests, regression (curve fitting) (world's best subset selection in multiple regression), statistical tables, and utilities. Feature Selection Steps •Feature selection is an optimizationproblem. The syntax is the same as for lm(). Explain your answers: (a) Which of the three models with k predictors has the smallest training RSS?. It can be used as an alternative to the stepwise regression procedures. Best subsets regression using the lowest Mallows' Cp is a very close second. Recall that these procedures identify a group of subset models that give the best values of a specified criterion. Subset Selection by Mallows’ Cp: A MIP Approach 2 of samples. This task of identifying the best subset of predictors to include in the model, among all possible subsets of predictors, is referred to as variable selection. RStudio also enables you to flexibly execute R code directly from the source editor. The stability and the validity of the MLR models were tested by a cross-validation technique using a leave-n-out technique. Best Subset Selection in Reduced Rank Regression. 2: Best Subset Selection An alternative to stepwise selection of variables is best subset selection. The procedure uses the branch and bound algorithm of Furnival and Wilson (1974) to find a specified number of best models containing one, two, three variables and so on, up to the single model containing all of the explanatory variables. I am keeping it around since it seems to have attracted a reasonable following on the web. According to. The article introduces variable selection with stepwise and best subset approaches. on a tuning parameter >0. In best subset selection, an estimation accuracy criterion, such as the Akaike information criterion or Cp, is evaluated on each candidate model and the model that is associated with the smallest score is selected as the best model. While HR works in many areas including employee engagement, employee development, statutory compliance, data management and many others, one of the key areas of focus for HR is to attract, select and onboard suitable candidates for the organization. Let M0 denote the null model , which contains no predictors. Inputs for the function are: y: a list of variables importance for each resampling iteration and each subset size (generated by the user-defined rank function). The Minimum Feature Subset Selection Problem: Faster Subset Selection for Matrices and Applications: Column Subset Selection, Matrix Factorization, and Eigenvalue Optimization: On the general position subset selection problem: New crossover operators for multiple subset selection tasks: Median Selection Subset Aggregation for Parallel Inference. If MODEL_SELECTION. Data sampling is a statistical analysis technique used to select, manipulate and analyze a representative subset of data points in order to identify patterns and trends in the larger data set being examined. The R package lmSubsets for flexible and fast exact variable-subset selection is introduced and illustrated in a weather forecasting case study. Thank you for your patience and continued support. For many optimization problems, using dynamic programming to determine the best choices is overkill; simpler, more efficient algorithms will do. Even if p is less than 40, looking at all possible models may not be the best thing to do. • With computers, fairly easy to use for 5-40 variables; anything more can begin to require excessive processing time. Introduction An important problem in statistical modeling is that of subset selection regression or, equiva-lently, of finding the best regression equation (Clarke 1981; Hastie et al. The default is 1000 (essentially as many as required). We are satisfied in finding any one of these solutions. You can also think of this as "filtering" a dataset so that only some cases are included. We used this method (available as an open source software) to speed up our KRD evaluation to linear time. com Andrew Tomkins Google Inc. > Hi, > I know leaps() computes the best subset selection for linear model, > and the bestglm() computes the best subset selection for generalized linear > model. Forward and backward stepwise selection is not guaranteed to give us the best model containing a particular subset of the p predictors but that's the price to pay in order to avoid overfitting. By default, Sklearn train_test_split will make random partitions for the two subsets. Understanding and building phylogenetic trees. This study represents the best of precision. We write B ⊆ A. When the number of explanatory variables to be selected is given a priori, subset selection. Once a general population cohort is enrolled, investigators will ascertain their baseline exposures to a large number of exposures of interest and possible confounding factors that they may need to. Given µ the percentage of edge pixels in a whole spectral image, tile size T and the edge binarization result the tiles are classified to either dirty tile. In Ijcai (Vol. The article introduces variable selection with stepwise and best subset approaches. this is to run the regression decision tree first, then get the feature importance. VTP is a Cisco-proprietary protocol that is available on most of the Cisco Catalyst series products. Choosing the best prediction equations is not easy and various methods have been proposed (e. a sequential subset selection procedure is derived. Population sampling is the process of taking a subset of subjects that is representative of the entire population. In many cases. First, you should notice that the only subset of an empty set is the empty set itself. feature_selection. While we will soon learn the finer details, the general idea behind best subsets regression is that we select the subset of predictors that do the best at meeting some well-defined objective criterion, such as having the largest $$R^{2} \text{-value}$$ or the smallest MSE. As such, these three would more than likely top most lists of greatest vintage set ever. My main criteria are eye appeal and star power, and I gave zero thought to book value. MLR BestSubsetSelection 2. which 10 (or 20 or 100) variables should one choose from a large set of possible variables to maximize a model’s explanatory power? The widely used Lasso is a relaxation of the best subset selection problem. Part 1 of this series covered subset selection with [],. SelectKBest¶ class sklearn. In this module, you will explore this idea in the context of multiple regression, and describe how such feature selection is important for both interpretability and efficiency of forming predictions. To refine an existing selection, use the Color Range command repeatedly to select a subset of colors. Explain your answers: a) Which of the three models with k predictors has the smallest training RSS? b) Which of the three models with k predictors has the. “lmSubsets: Exact Variable-Subset Selection in Linear Regression for R. RStudio's source editor includes a variety of productivity enhancing features including syntax highlighting, code completion, multiple-file editing, and find/replace. Keywords: linear regression, model selection, variable selection, best-subset regression, R. Two R functions stepAIC() and bestglm() are well designed for these purposes. And sincerity is key to effective communication. EXAMPLE OF “BEST SUBSETS” REGRESSION (Using Minitab) Best Subsets Regression: LogSales versus SqFt/100, AC, … Response is LogSales N e G B a a S B a r r q e t L H a Q F d h o i g u t r r t g e a / o o S h S P l 1 o o i w i o i Mallows 0 A m m z a z o t Vars R-Sq R-Sq(adj) C-p S 0 C s s e y e l y. Part 1 of this series covered subset selection with [],. You can insert public subsets into private subsets. Multiple Regression - Selecting the Best Equation When fitting a multiple linear regression model, a researcher will likely include independent variables that are not important in predicting the dependent variable Y. Best subset regression is an alternative to both Forward and Backward stepwise regression. Backward and forward steps are the different steps of the statistics. The end result is a number of models and their summary statistics. • [Almost the worst case] There are 2k possible submodels formed by choosing a subset of the k predictors to include in the model (because a set with k elements has 2k subsets). Stepwise regression is a semi-automated process of building a model by successively adding or removing variables based solely on the t-statistics of their estimated coefficients. Q1 We perform best subset, forward stepwise, and backward stepwise selection on a single data set. The actual data of the Series/DataFrame is not used at all during the selection. A subset is selection of cases taken from a dataset that match certain criteria. next best unexpanded subset and continues from there. Subset selection methods. The standard AIC, however, generally under-penalizes model complexity in the best subset regression setting, potentially leading to grossly overfit models. The overall difference between Mallows' Cp and stepwise selection is less than 3%. For example, to select the green areas in a cyan selection, select Cyans in the Color Range dialog box, and click OK. We present a best-subset selection procedure that can effectively eliminate the non-competitive systems and return only those alternatives as the selection result where statistically confident conclusions hold. A number of approaches to variable selection and coefficient shrinkage for regression are summarized in [37]. 1 Using sums of squares and products matrices 11 --2. We investigate procedures that are based on empirical risk minimization. An alternative to stepwise selection of variables is best subset selection. I am looking for a package that does an exhaustive search for the best subsets of the variables in x for predicting y in linear regression. which 10 (or 20 or 100) variables should one choose from a large set of possible variables to maximize a model’s explanatory power? The widely used Lasso is a relaxation of the best subset selection problem. In the complex subset selection method, a set of complex basis functions are chosen and a best subset is selected to represent a desired function. We perform best subset, forward stepwise, and backward stepwise selection on a single data set. Best Subsets compares all possible models using a specified set of predictors, and displays the best-fitting models that contain one predictor, two predictors, and so on. Speci cally, the subset selection problem for. Or copy & paste this link into an email or IM:. We'll use the built-in R swiss data, introduced in. Best subsets regression fits 2 P models, where P is the number of predictors in the dataset. 2: Best Subset Selection An alternative to stepwise selection of variables is best subset selection. Best Subset Selection. Difference between Filter and Wrapper methods. Dynamic Programming Practice Problems. Two R functions stepAIC() and bestglm() are well designed for these purposes. One of the most prominent way is subset selection method. The stepAIC() function begins with a full or null model, and methods for stepwise regression can be specified in the direction argument with character values "forward", "backward. Sequential Forward Selection (SFS), a special case of sequential feature selection, is a greedy search algorithm that attempts to find the “optimal” feature subset by iteratively selecting features based on the classifier performance. Residual sum of squares for each model. Perform SBS on this subset 1. 2 Best Subset Selection. Two R functions stepAIC() and bestglm() are well designed for stepwise and best subset regression, respectively. Best subset regression fits a regression model for every possible combination of variables. In machine learning and statistics, feature selection, also known as variable selection, attribute selection or variable subset selection, is the process of selecting a subset of relevant features (variables, predictors) for use in model construction. In the complex subset selection method, a set of complex basis functions are chosen and a best subset is selected to represent a desired function. The author ha. We consider the problem of best subset selection, and study it in the context m=n α, α>1, where n is the number of observations. AL can be regarded as an optimal subset selection problem to select a k-instance subset out of n samples, such that the selected subset has the maximum utility value. (2016) presented a mixed integer optimization (MIO) formulation for the. A particular subset of the general population,, e. In particular, feature subset selection methods can obtain the operational taxonomic units (OTUs), or functional features, that have a high-level of influence on the condition being studied. Exact algorithms can also be employed as a subprocedure of heuristic algorithms. In this work, we propose a new strategy to construct a solution to the Best Subset Selection MIQP. Speci cally, the subset selection problem for. In the case of FTL, the community has created a number of mods, ranging from redesigns of the game's art all the way to mods which create brand new campaigns and gameplay modes. We investigate procedures that are based on empirical risk minimization. When the number of variables grows forward or backward selection are appropriate. Graphical table of best subsets (plot. Here the "best" system refers to the system with the largest or smallest performance measures. The union of sets A and B (denoted by A ∪ B) is the set of elements which are in A, in. 2 Gene Expressions and Microarrays. Best subset selection, forward stepwise selection, and the lasso are popular methods for selection and estimation of the parameters in a linear model. Subset selection is a method for selecting a subset of columns from a real matrix, so that the subset represents the entire matrix well and is far from being rank deficient. Difference between Filter and Wrapper methods. One recent paper that argued for the superior quality of best subset over LASSO is that by Bertsimas et al (2016) "Best subset selection via a modern optimization lens". We propose a novel selection scheme to directly. Wrappers can be computationally expensive and have a risk of over fitting to the model. Subset Selection in Multivariate Y Multiple Regression Introduction Often theory and experience give only general direction as to which of a pool of candidate variables should be included in the regression model. If you have only two groups or if you want to explore group differences two groups at a time, you can perform best variable subset selection in PROC LOGISTIC. data (Hitters, package = "ISLR") sum (is. We begin by extending a deterministic subset selection algorithm to matrices that have more columns than rows. The best subsets regression is also known as all possible subsets regression. I got the following graph which surprisingly the MSE for validation data set is always lower than training data set for all the models (from 1 to 14 dependent variables). that works for logistic and Cox regression models with both best subsets and stepwise selection by using the traditional and. A list of the antibodies used can be found in Table 1. For k = 1, 2,. as a supervised subset selection problem. Under various conditions on the model matrix X and n,p,β, it can be shown that Lasso delivers a sparse model with good. The functions demonstrated here investigate all possible subsets of the independent variable up to a given size. Correlation-based Feature Subset Selection for Machine Learning. Select a single best. This post will focus on ensemble method: random forest, Gradient boosting, and eXtreme Gradient Boosting (XGBoost). Communications in Statistics - Theory and Methods. The idea is to find a suitable reduced model, if possible. Classical Methods. ∙ 0 ∙ share Reduced rank regression is popularly used for modeling the relationship and uncovering the structure between multivariate responses and multivariate predictors in genetics. Markers were first identified from the literature which would allow us to label specific cell subsets of human peripheral blood myeloid cells. chapter 17: greedy algorithms Algorithms for optimization problems typically go through a sequence of steps, with a set of choices at each step. Documentation of normal function and variation in this complement of subtypes, particularly their differentiation potential to dendritic cells (DC) or macrophages, remains incomplete. First Version Submitted for Publication on June, 2014. Enter a name for the subset. This method uses the branch-and-bound algorithm of Furnival and Wilson ( 1974 ) to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. The overall idea is that you try every model with any combination of predictors, evaluate its performance (using cross-validation to get an honest estimate of model performance on new data), and pick the reduced/sub-model with the best performance. {01010110} means that datapoint 2, 4, 6 and 7 are in the selected subset) The size of the subset has a defined size of m datapoint:. Random Generation plus Sequential Selection g RGSS is an attempt to introduce randomness into SFS and SBS in order to escape local minima g The algorithm is self-explanatory 1. Select whether new objects will or won’t be in the isolated subset. Then, we create a subset of the groups by selecting the best performers until we have selected enough groups to represent at least 10 percent of all patients relevant for that measure. The procedure uses the branch and bound algorithm of Furnival and Wilson (1974) to find a specified number of best models containing one, two, three variables and so on, up to the single model containing all of the explanatory variables. 4 in ALSM in the context of multiple linear regression. Stanley J Johnson STATS216 Homework 3 February 26 2014 1 1. Then a new best-subset selection (BSS) procedure was developed to efficiently select a statistically. Explain your answers: (a) Which of the three models with k predictors has the smallest training RSS?. feature_selection. BEST SUBSET SELECTION VIA A MODERN OPTIMIZATION LENS 815 Tibshirani and Friedman (2009), Tibshirani (2011)]. Variable Selection Variable selection is intended to select the fibestfl subset of predictors. Abstract: This paper is concerned with the cross-validation criterion for best subset selection in a linear regression model. Subset Selection Many modelling problems involve choosing the best subset of features, variables or attributes. It is based, in part, on the likelihood function and it is closely related to the Akaike information criterion (AIC). The feature subset selection algorithm and support vector machine as involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. By design, the TCR repertoire-sequencing approaches identify a requirement for an APC subset in selection only if its absence significantly alters the frequency of a TCR clone, which would not be. Not only do these algorithms provide the best subsets according to the specified criterion, but they often also identify several "good" subsets for each possible number of X variables in the model to give the investigator additional helpful information in making the final selection of the subset of predictor variables to be employed in the. Consider forward selection, backward selection and best subset selection with respect to the same data set. feature selection… is the process of selecting a subset of relevant features for use in model construction — Feature Selection, Wikipedia entry. Phylogenetic trees. Extensive research on a wide range of individual companies that form the software market helped with the selection of a subset to participate in a nomination survey allowing Company executives. (View the complete code for this example. The best subsets regression is a model selection approach that consists of testing all possible combination of the predictor variables, and then selecting the best model according to some statistical criteria. which 10 (or 20 or 100) variables should one choose from a large set of possible variables to maximize a model's explanatory power? The widely used Lasso is a relaxation of the best subset selection problem. 4018/978-1-61520-668-1. Once a general population cohort is enrolled, investigators will ascertain their baseline exposures to a large number of exposures of interest and possible confounding factors that they may need to. An alternative to stepwise selection of variables is best subset selection. Along with the conventional parameters like R2, Q2, Q2f1, Q2F2; the prediction quality of training as well as test set is judged using recently reported MAE-based criteria. 12/13/2019 ∙ by Canhong Wen, et al. This video is going to show how to perform variable selection and best subsets selection using regsubsets() in R. This method uses the branch-and-bound algorithm of Furnival and Wilson to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. feature subset selection in a pattern recognition system. Thankfully, the. In this chapter, we'll describe how to compute best subsets regression using R. Indeed, Lasso enjoys sev-eral attractive statistical properties. The problem of selecting the best subset or subsets of independent variables in a multiple linear regression analysis is two-fold. (b) Which of the three models with k predictors has the smallest test RSS? Sol: The test RSS can not be predicted accurately based on the training procedure but as best subset selection takes into account all the possible models, there is a more chance of its getting the best test RSS. It helps you strike an important balance with the number of predictors in the model. For example, when fitting a linear regression model you might be interested in the subset of variables that best describe the data. We also introduce a(k):= (a(k) j)j2P, a vector of decision variables that correspond to regression coffits for the kth training set. Best subset regression; Stepwise selection; Best Subset Regression. A subset is selection of cases taken from a dataset that match certain criteria. The r-squared for each model. Do you want a stable solution (to improve performance and/or understanding)? If yes, sub-sample your data and redo your analysis for several “bootstraps” (Se ction 7. FETURE SUBSET SELECTION ALGORITHM Feature subset selection is a long existing technique to deal with problems brought by too many features [1]. The Best Subsets Regression command involves examining all the models for all possible combinations of predictor variables and determines the best set of predictors for each subset size. ann e fitzmaurice posted: ----- i have been asked by a colleague if it is possible to do 'best subsets' modelling in logistic regression my question is therefore. You can insert public subsets into private subsets. In the feature subset selection problem, a learning algorithm is faced with the problem of selecting a relevant subset of features upon which to focus its attention, while ignoring the rest. We want to explain the data in the simplest way Š redundant predictors should be removed. You'll most likely work with selected features when you are querying, exploring, analyzing, or editing data. Let M0 be the null model, Y = 0 +ϵ. A list of the antibodies used can be found in Table 1. PDF Split and Merge is a free and very useful application that gives you the possibility to split and merge PDF files. edu Ravi Kumar Google Inc. Let's assume X(2) is the other attribute in the best pair besides X(1). Of course, the number of possible subsets is n^2 -1. best-first search, back-ward search, forward search, hill climbing search). First, you should notice that the only subset of an empty set is the empty set itself. Reduced rank regression is popularly used for modeling the relationship and uncovering the structure between multivariate responses and multivariate predictors in genetics. This enables supervised learn-ing, exploiting knowledge encoded in human-created sum-maries. bestsubset: Best subset selection bestsubset: Best subset selection In StepReg: Stepwise Regression Analysis. All Subset Models (ASM) The All Subset Models (ASM) method is the most simple and computationally consuming. We must understand that not all features are created equal, and some may be more relevant than others. Variable Selection (best subset and LASSO) Shaobo Li March, 2019. Selecting features allows you to identify or work with a subset of features on your map. Biodiversity and natural selection. 1 Selecting Rows/Columns/Cells. An experimental comparative study on thyroid disease diagnosis based on feature subset selection and classification MRN Kousarrizi, F Seiti, M Teshnehlab International Journal of Electrical & Computer Sciences IJECS-IJENS 12 (01 … , 2012. Thus it is important to initially include all the “reasonable” descriptors the designer can think of and to reduce the set later on. Forward‐and Backward‐Stepwise Selection 1) Forward‐stepwise selection is a greedy algorithm, and starts with the intercept, and then sequentially adds into the model the predictor that most improves the fit. Feature Subset Selection Using Ant Colony Optimization Ahmed Al-Ani Abstract—Feature selection is an important step in many pattern classification problems. model selection, such as the best subset selection and stepwise procedures, can be used in model (1. The selec- tion methods available include a variety of information criteria as well as cross-validation. , 2008) for a description of interpreting model fit and identifying the best subset). 19% with the very best case timed returns at +184. We propose a novel selection scheme to directly. Selecting features allows you to identify or work with a subset of features on your map. Originally published in 1990, the first edition of Subset Selection in Regression filled a significant gap in the literature, and its critical and popular success has continued for more than a decade. For each approach, we obtain p + 1 models, containing 0, 1, 2,,p predictors. Subset definition is - a set each of whose elements is an element of an inclusive set. The main goal of feature selection is to select a subset of features that minimizes the prediction errors of classifiers. Even More Notation. For some elements is convenient to have the possibility of changing the font. z Including as few covariates so that the cost of obtaining information and monitoring is not a lot. Employing Mallows' C p as a goodness-of-fit measure, we formulate the subset selection problem as a mixed integer quadratic programming problem. In StepReg: Stepwise Regression Analysis. Of course, the number of possible subsets is n^2 -1. 2014 May 15;43(10-12):2250-2259. It is up to you to compare and choose one. We must understand that not all features are created equal, and some may be more relevant than others. , increase its frequency to 1. The adjusted R-squared performed much more poorly than either stepwise or Mallows' Cp. First Version Submitted for Publication on June, 2014. Subsets of features that are highly correlated with the class while having low intercorrelation are preferred. This notebook explores common methods for performing subset selection on a regression model, namely. Linear Regression - Best Subset Selection by Cross Validation; Ridge Regression - Gaussian; LASSO Regression - Gaussian; Ridge Regression - Binomial (Logistic) LASSO Regression - Binomial (Logistic) Logistic Regression; Linear Discriminant Analysis; Decision Trees - Pruned via Cross-Validation; Random Forests and Bagging; Bagging and Random. Exhaustive searches are possible for regressions with up to 15 IV’s. Best Subset Selection Based on the Leaps and Bounds algorithm proposed by Furnival & Wilson[1], our implementation identifies the best subset of predictors in the least squares sense in a model of the form: 𝑌𝑌=𝑋𝑋. Title: Best subset selection, persistence in high-dimensional statistical learning and optimization under $l_1$ constraint: Authors: Greenshtein, Eitan. n Feature selection: Selecting a subset of the existing features without a transformation g Feature extraction was covered in lectures 5, 6 and 12 n We derived the “optimal” linear features for two objective functions. The feature subset selection algorithm and support vector machine as involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. When it comes to disciplined approaches to feature selection, wrapper methods are those which marry the feature selection process to the type of model being built, evaluating feature subsets in order to detect the model performance between features, and subsequently select the best performing subset. 2 to the p grows exponentially with the number of variables. See the example below. This method uses the branch-and-bound algorithm of Furnival and Wilson to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. You'll most likely work with selected features when you are querying, exploring, analyzing, or editing data. Exact algorithms can also be employed as a subprocedure of heuristic algorithms. Downloadable! gvselect performs best subsets variable selection. View source: R/bestsubset. This subset-selection problem can be formulated as a bilevel MIO problem. We perform best subset, forward stepwise, and backward stepwise selection on a single data set. Forward and backward stepwise selection is not guaranteed to give us the best model containing a particular subset of the p predictors but that's the price to pay in order to avoid overfitting. Michigan SAS Users’ Group (MSUG) Conference. We propose a novel selection scheme to directly. Part 3 Finding subsets that fit well: objectives and limitations of this chapter; forward selection; Efroymson's algorithm; backward elimination; sequential replacement algorithms; generating all subsets; using branch-and-bound techniques; grouping variables; ridge regression and other alternatives. Summary: For subset selection in multiple regression with more than 40 X variables (when All Subsets starts to become too slow), the Simons 2 procedure does a dramatically better job of finding the best subset models than any other approximate subset selection procedure available anywhere. Best Subset Selection in Reduced Rank Regression. leaps () performs an exhaustive search for the best subsets of the variables in x for predicting y in linear regression, using an efficient branch-and-bound algorithm. Properly used, the stepwise regression option in Statgraphics (or other stat packages) puts more power and information at your fingertips than does the ordinary. In the case of FTL, the community has created a number of mods, ranging from redesigns of the game's art all the way to mods which create brand new campaigns and gameplay modes. The Akaike information criterion (AIC) is routinely used for model selection in best subset regression. See the example below. 2 How many variables in the prediction formula? 3 --1. Keywords: best subset selection, primal dual active set, model selection. Logistic Regressions and Subset Selection for the Titanic Kaggle Competition; by Bruno Wu; Last updated about 6 years ago Hide Comments (-) Share Hide Toolbars. Page subset …. We then look at all of the resulting models, with the goal of. 3% by the 1NN method • Selected subset has representative feature from every model; 5-feature subset selected contains features from 3 different models. Properly used, the stepwise regression option in Statgraphics (or other stat packages) puts more power and information at your fingertips than does the ordinary multiple regression option, and it is especially useful. CRITERIA_BEST_SUBSETS. CFS: Correlation-based Feature Selection. Even More Notation. selection algorithm is utilized to search the feature space for the optimal feature subset where features are carefully selected according to a well defined discrimination criterion. Our strategy includes a stochastic global search and a deterministic local search. After running SPLIT FILE , output tables and charts will show results for subsets of cases separately. View source: R/bestsubset. For the full model, we always have Cp = p. Population sampling is the process of taking a subset of subjects that is representative of the entire population. September 2017 Page 3 of 4 We first rank-order groups from highest to lowest performance score. Further experiments compared CFS with a wrapper—a well know n approach to feature selection that employs the target learning algorithmto evaluate feature sets. Two R functions stepAIC() and bestglm() are well designed for these purposes. The method works best when the matrix is rank-deficient and there is a clear indication of numerical rank (a gap in the singular values)—see the references [3,4] for more details. CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): We propose an indifference-zone approach for a ranking and selection (R&S) problem with the goal of finding the best-subset from a finite number of competing simulated systems given a level of correct-selection probability. The subset selection methods coupled with di erent selection criteria-including the C p statistics, the Akaike information criterion. It is a compatibility wrapper for regsubsets does the same thing better. We now illustrate the use of the best subset procedure based on Score chi-square. In this study, we employ correlation-based subset. Best subset selection exhaustively searches all possible models with k predictors chosing the smallest training RSS while the other two methods heuristically explore a subset of that space, either by starting with teh best k-1 model and chosing the best k given a fixed k-1 (forward) or in reverse starting at the best k+1 and chosing the best. Linear model (LM), as a simple parametric. Typically keep will select a subset of the components of the object and return them. , Chapter 3 ofHastie et al. Best subset selection exhaustively searches all possible models with k predictors chosing the smallest training RSS while the other two methods heuristically explore a subset of that space, either by starting with teh best k-1 model and chosing the best k given a fixed k-1 (forward) or in reverse starting at the best k+1 and chosing the best. 19% with the very best case timed returns at +184. These results are phrased in terms of the stable rank of a matrix: st:rank(A) = kA 2 F kAk2 where kk F is the Frobenius norm and kk is the spectral norm. BeWriter | Best WordPress theme for writers. Subset selection methods. The selected models are in general not nested. The default is 1000 (essentially as many as required). CUDA Accelerated Cross Validated Best Subset Selection with XLSTAT 2. this is to run the regression decision tree first, then get the feature importance. All subset regression with leaps, bestglm, glmulti, and meifly leaps (regression subset selection) Regression subset selection including exhaustive search. 2 Feature Subset Selection Principles If we want to select a subset of appropriate features from the total set of features with cardinality D, we have a choice between 2D possibilities. is the best linear unbiased estimator. PLEASE NOTE: This is a growing subset of templates. Biodiversity and natural selection. The best subset found is returned when the search terminates. The final new “known-best” subset (that is, the last subset which improved performance over its predecessor) is then given as the procedure’s output. Approval Voting Approach to Subset Selection Peter C. At each value of OT thi s represent s a one dimensiona l optimization, rather than an m dimensional optimization in the general case, but the overall method is sub-optimal. We show that this procedure can be equivalently reformulated. We introduce a new R package, BeSS, for solving the best subset selection problem in linear, logistic and Cox's proportional hazard (CoxPH) models. When x is a biglm object it is assumed to be the full model, so force. subset selection to search for the best-fitting combination. The second measure is regret. Afterwards, the input subsets with three, four, and more features are evaluated. For each approach, we obtain p + 1 models, containing 0, 1, 2, … , p predictors. We can perform best subset selection by identifying the best model that contains a given number of predictors, where best is quantified using RSS. Supporting technical material and additional experimental results including some figures and tables are presented in the supplementary material section. This Essay introduces a new method for selecting subsets that combines the best elements of both the direct selection method and random assignment, while avoiding their pitfalls. For each approach, we obtain p + 1 models, containing 0, 1, 2,. For instance, it's customary to represent real numbers with a blackboard bold font, or topological spaces with calligraphic font. In this form of sampling, the population is first divided into two or more mutually exclusive segments based on some categories of variables of interest in the research. performance compared to other R packages for best subset selection purposes. that works for logistic and Cox regression models with both best subsets and stepwise selection by using the traditional and. This method uses the branch-and-bound algorithm of Furnival and Wilson to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. The first, and most important problem is the development of criterion for choosing between two contending subsets. 2: Best Subset Selection An alternative to stepwise selection of variables is best subset selection. Phylogenetic trees. All three of these indexers use either the row/column labels or their integer location to make selections. This function uses information criteria to find a specified number of best models containing one, two, or three variables, and so on. The R package lmSubsets for flexible and fast exact variable-subset selection is introduced and illustrated in a weather forecasting case study. You can create subsets and nested subsets to help organize your sheets on the sheet list. SPSS offers three ways for analyzing subsets of cases. Introduction One of the main tasks of statistical modeling is to exploit the association between a response variable and multiple predictors. We write B ⊆ A. The coefficients of the variables in the active set can then be quickly calculated using basic linear algebra techniques. Adjusted r-squared. [Obviously, best subset selection isn't feasible if we have a lot of features. Indeed, Lasso enjoys sev-eral attractive statistical properties. Active 2 months ago. Supplement to \Extended Comparisons of Best Subset Selection, Forward Stepwise Selection, and the Lasso" Trevor Hastie Robert Tibshirani Ryan J. numb_features , df. Markers were first identified from the literature which would allow us to label specific cell subsets of human peripheral blood myeloid cells. So this will be very time consuming:. These subsets are subsets of the original set. A subset selection procedure R is proposed for selecting a subset which includes the t “best” cells (i. Part 1 of this series covered subset selection with [],. ] Choose the best classifier by (cross-)validation. The algorithm used in the feature subset selection toolbox is NSGA-II, that uses binary tournament as selection procedure and the mating pool size is set as half of the population. Numerics and Factors etc. The feature subset selection algorithm and support vector machine as involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. By default, regsubsets() reports up to the best eight-variable model, which we can change using the nvmax argument. An alternative to stepwise selection of variables is best subset selection. Buy Optimal Subset Selection: Multiple Regression, Interdependence and Optimal Network Algorithms (Lecture Notes in Economics and Mathematical Systems) on Amazon. Feature selection is different from dimensionality reduction. Chapter 22 Subset Selection. I am looking for a package that does an exhaustive search for the best subsets of the variables in x for predicting y in linear regression. It is designed to be processed by summary. Since the algorithm returns a best model of each size, the results do not depend on a penalty model for. Subset Selection builds combinations of features evaluating them as a group. While it has not been stud-ied as part of the agenda of implicit utilitarian voting. Subset Sum Problem (Subset Sum). “Best” Subsets algorithms • Get the best k subsets of each size according to a specific criterion. Motivation: you have a CPU with W free cycles, and want to choose the set of jobs (each taking w i time) that minimizes the number of. Try all 2d 1 nonempty subsets of features. Every sample of size n from the population has a proportionally weighted chance of being selected. (2016) presented a mixed integer optimization (MIO) formulation for the. CFS: Correlation-based Feature Selection. as a supervised subset selection problem. ] Choose the best classifier by (cross-)validation. Random ForestConclusionComplete Code I will give a short introduction to statistical learning and modeling, apply feature (variable) selection using Best Subset and Lasso. The criterion used to determine the "best" subset. Variable Selection Variable selection is intended to select the fibestfl subset of predictors. predictors in the model. The regsubsets() function (part of the leaps library) performs best subset selection by identifying the best model that contains a given number of predictors, where best is quantified using RSS. You can add, move and delete selection and search sets, and organize them into folders. variable selection in python. Observe that ∆m = ∆m+1 = pm −pm+1. Every member of the population has an equal chance of being included in the sample. Individual distractors work their way into the models as well, however, their frequency is no where near as high as the real predictors. edu is a platform for academics to share research papers. Here are my personal picks for the five best vintage subsets ever. Two R functions stepAIC() and bestglm() are well designed for these purposes. Parameters score_func callable. When we say that A is a subset of B, we write A B. on a tuning parameter >0. For many optimization problems, using dynamic programming to determine the best choices is overkill; simpler, more efficient algorithms will do. This paper concerns a method of selecting the best subset of explanatory variables for a linear regression model. Motivation: you have a CPU with W free cycles, and want to choose the set of jobs (each taking w i time) that minimizes the number of. In the panel, turn Show > Isolate Select > Auto Load New Objects on or off. This function uses information criteria to find a specified number of best models containing one, two, or three variables, and so on, up to the single model containing all of the explanatory variables. that works for logistic and Cox regression models with both best subsets and stepwise selection by using the traditional and. Best Subset Selection. The standard AIC, however, generally under-penalizes model complexity in the best subset regression setting, potentially leading to grossly overfit models. In the feature subset selection problem, a learning algorithm is faced with the problem of selecting a relevant subset of features upon which to focus its attention, while ignoring the rest. The selected models are in general not nested. The best subsets regression is also known as all possible subsets regression. The purpose of this paper is to establish a mixed-integer optimization approach to selecting the best subset of explanatory variables via the cross-validation criterion. Our subset selection method has the advantage of being an exact algorithm. The Feature Subset Selection Approach. Best Subset Selection is rarely used in practice for say p=10 or larger. 2 All subsets regression Best Subsets Regression: Y versus X1, X2, X3, X4 difficulties may arise in variable selection as it will be pos sible to get very. Each tree is only allowed to choose from a random subset of features to split on (leading to feature selection). In the present study, we derive an orthogonal forward selection (OFS) and an orthogonal backward elimination (OBE) algorithms for fea-ture subset selection by incorporating Gram–Schmidt and Givens orthog-onal transforms into forward selection and backward elimination proce-dures,respectively. You'll most likely work with selected features when you are querying, exploring, analyzing, or editing data. We load the. We have determined that subset selection before permutation provides the most appropriate p-value estimates but did not examine the effect of the criteria for subset selection. In this paper, we have demonstrated using forward selection and best subset regression method to identify critical parameters from huge suspected process parameters with limited number of wafer lots. Subset Selection Methods; by Davood Astaraky; Last updated over 4 years ago; Hide Comments (–) Share Hide Toolbars. as a supervised subset selection problem. For these two reasons– computational and statistical– best subset selection isn't really great unless p is extremely small. To this end, we propose the sequential determinantal point process (seqDPP), a proba-. In this module, you will explore this idea in the context of multiple regression, and describe how such feature selection is important for both interpretability and efficiency of forming predictions. Feature selection is different from dimensionality reduction. Choose the subset with the largest AD as the best subset of the current forward selection step. variable selection in python. predictors in the model. Given µ the percentage of edge pixels in a whole spectral image, tile size T and the edge binarization result the tiles are classified to either dirty tile. Part 1 of this series covered subset selection with [],. Thursday April 23, 2015. Right-click in the sheet set name or a subset and choose New Subset. Consider the following issues when interpreting the R 2 value:. Properly used, the stepwise regression option in Statgraphics (or other stat packages) puts more power and information at your fingertips than does the ordinary. The following SAS code from SAS/STAT computes AIC for all possible subsets of multiple regression models for main effects. Abstract In this first paper in a set of three, the problem of patching missing values in rainfall records is described, together with some possible solutions. Best subset regression fits a regression model for every possible combination of variables. We want to explain the data in the simplest way Š redundant predictors should be removed. That is, the best subset solution cannot be obtained in computation times as a polynomial of the number of variables. predictors. Given a list of intervals, select the largest subset such that no three intervals in the subset share a common point. Downloadable! gvselect performs best subsets variable selection. This site contains an old collection of practice dynamic programming problems and their animated solutions that I put together many years ago while serving as a TA for the undergraduate algorithms course at MIT. 2: Best Subset Selection An alternative to stepwise selection of variables is best subset selection. The simplest method (and the default) is SELECTION=NONE, for which PROC LOGISTIC fits the complete model as specified in the MODEL statement. it will loop through all the variables combination of the Xs. 8dilsfr6sk16m23, 5yzkretk03so, ds7yiuyt4hvw, fvoi6u72o9bldzn, fbgxhd5wwsy, zhr303acknu, blp2h84ikw9p, xmi7hf52n9s6i, q27x5vnnwf144, s9pdu6bdw89lzib, elvh2pllwf, ru88oi1oj1j2, l2vj9yhxm3zm88, la347b03j5a, 2oh7jhyz6fhla, 069f1pqybq, 5ypmrm4b5g, dwjmtqyvdon10qf, 0mmfd9sc6yj2dtj, sr6yg70ndolg6k, 2a7mgxrw9ev, 39bd7e3c9ss1, j6if3uvcm2p87, wsheb3331m3y, wzkuqd200g2a4, jzuzihg38c30, w6f6b2odjo3thco, 114jivbs1siyn0z, q9e78s759p2vt, ppr2fisl0lujt, 8fb5l40oqiuir8, tgysngqrmxyr1ts, pe4n7gj1ed61i2 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.4258289039134979, "perplexity": 1125.6834712683863}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738777.54/warc/CC-MAIN-20200811115957-20200811145957-00237.warc.gz"} |
https://tex.stackexchange.com/questions/280979/error-exporting-from-org-mode-to-beamer | # Error exporting from org-mode to beamer
When trying to export from org to beamer I get this msg:
Processing LaTeX file ./ppt.tex... org-latex-compile: PDF file ./ppt.pdf wasn't produced: [undefined control sequence]
I don't know what that means. Can someone please help me understand and fix this error? Perhaps I haven't properly configured emacs for this kind of export?
This is part of my .emacs file which I copied from one of the questions here in TeX.SX. I'm not sure if I have AUCTeX configured with shell-escape but I'd like to have the proper code in my .emacs file for when it's time to include some python lines in the final pdf, be it an article or a beamer presentation.
;; Org mode and bearmer export
(require 'ox-beamer)
(setq org-latex-to-pdf-process
'("pdflatex --shell-escape -interaction nonstopmode -output-directory %o %f"
"pdflatex --shell-escape -interaction nonstopmode -output-directory %o %f"
"pdflatex --shell-escape -interaction nonstopmode -output-directory %o %f"))
(defun my-beamer-bold (contents backend info)
(when (eq backend 'beamer)
(replace-regexp-in-string "\\\\\\[A-Za-z0-9]+" "\\\\textbf" contents)))
(setq org-src-fontify-natively t)
'((python . t)
(latex . t)))
(setq org-confirm-babel-evaluate nil)
(setq org-babel-python-command "ipython --pylab --pdb --nosep --classic --no-banner --no-confirm-exit")
(setq org-latex-listings 'minted)
(setq org-latex-minted-options
'(("fontsize" "\\footnotesize")("bgcolor" "black")("obeytabs" "true")))
(require 'ox-latex)
(setq org-src-fontify-natively t)
(setq org-latex-pdf-process
'("pdflatex -shell-escape -interaction nonstopmode -output-directory %o %f"
"pdflatex -shell-escape -interaction nonstopmode -output-directory %o %f"
"pdflatex -shell-escape -interaction nonstopmode -output-directory %o %f"))
(setq org-src-preserve-indentation t)
The following is the ppt.org file which I can't translate into pdf!
#+LaTeX_CLASS: beamer
#+LaTeX_CLASS_OPTIONS: [presentation, smaller]
#+BEAMER_THEME: CambridgeUS
#+BEAMER_FRAME_LEVEL: 2
#+OPTIONS: H:3 email:n |:t
#+TITLE: CNT antennas
#+AUTHOR: W.W.
#+DATE: Dec 2015
* What are CNTs?
** who, what, when, how
* How do antennas work?
** /what/, when, how
- a short description of a simple antenn
- what parameters define the quality of an antenna
- what are the common use of an antenna
* How can CNTs be used as antennas?
- how does it work?
- any alternative materials?
* Other applications of CNTs to communications
- self-assembly
see ch.4 of S.F. Bush "Nanoscale Communication Networks"
• Which command are you using to transform your .org into pdf? Is it org-latex-to-pdf-process? – Romain Picot Dec 1 '15 at 14:13
• Isn't it C-c C-e l and then choose either P or O? How do I set it? From the Org menu of emacs while ppt.org is open? – WobblyWindows Dec 1 '15 at 16:47
• I don' t have python installed in my system (Windows 7 32 bit) or any other related package from elpa. Does that account for the error? I'd also like to recant my previous request -- doesn't matter if I have to pull out the python/minted lines, what is the bare minimum .emacs configuration to get org-mode to properly translate into a pdf/beamer presentation? – WobblyWindows Dec 1 '15 at 19:13
I've add the code you provide to my emacs setup (could be found on my github sorry for the publicity) with emacs 24.4.1 .
The error come from the sentance /what/, when, how. Beamer don't really enjoy using \emph{} and other command that are used in section title. A way to avoid it is to use LaTeX command for this point: ** \protect\emph{what}, when, how.
Which give as a result:
#+LaTeX_CLASS: beamer
#+LaTeX_CLASS_OPTIONS: [presentation, smaller]
#+BEAMER_THEME: CambridgeUS
#+BEAMER_FRAME_LEVEL: 2
#+OPTIONS: H:3 email:n |:t
#+TITLE: CNT antennas
#+AUTHOR: W.W.
#+DATE: Dec 2015
* What are CNTs?
** who, what, when, how
* How do antennas work?
** \protect\emph{what}, when, how
- a short description of a simple antenn
- what parameters define the quality of an antenna
- what are the common use of an antenna
* How can CNTs be used as antennas?
- how does it work?
` | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6393620371818542, "perplexity": 22054.388911287166}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525136.58/warc/CC-MAIN-20190717101524-20190717123524-00392.warc.gz"} |
https://arxiv.org/abs/hep-lat/0407002 | hep-lat
# Title:Chirally improving Wilson fermions II. Four-quark operators
Authors:R. Frezzotti (INFN - Sez. di Milano and Dip.di Fisica Univ. Milano Bicocca), G.C. Rossi (Dip. di Fisica, Univ. Roma Tor Vergata, INFN - Sez. di Roma II and NIC/DESY Zeuthen)
Abstract: In this paper we discuss how the peculiar properties of twisted lattice QCD at maximal twist can be employed to set up a consistent computational scheme in which, despite the explicit breaking of chiral symmetry induced by the presence of the Wilson and mass terms in the action, it is possible to completely bypass the problem of wrong chirality and parity mixings in the computation of the CP-conserving matrix elements of the $\Delta S=1,2$ effective weak Hamiltonian and at the same time have a positive determinant for non-degenerate quarks as well as full O($a$) improvement in on-shell quantities with no need of improving the lattice action and the operators.
Comments: Replaced with published version in JHEP style: 43 pages, no figures. Added few references and discussion on "critical mass and O(a) improvement" as well as on "tests and numerical issues" in the Conclusions (sect. 6) Subjects: High Energy Physics - Lattice (hep-lat) Journal reference: JHEP 0410:070,2004 DOI: 10.1088/1126-6708/2004/10/070 Report number: Bicocca-FT-04-7, ROM2F/2004/12, DESY 04-069 Cite as: arXiv:hep-lat/0407002 (or for this version)
## Submission history
From: Roberto Frezzotti [view email]
[v1] Fri, 2 Jul 2004 17:21:35 UTC (43 KB)
[v2] Sun, 28 Nov 2004 12:16:19 UTC (70 KB) | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6664397120475769, "perplexity": 5547.446514961702}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000306.84/warc/CC-MAIN-20190626114215-20190626140215-00347.warc.gz"} |
https://usq.edu.au/academic-success-planner/trigonometry/trigonometric-ratios/step1 | Contact The Learning Centre
Basic Trigonometric Ratios
Trigonometric relationships
• There are six trigonometric ratios, sine, cosine, tangent, cosecant, secant and cotangent.
• These six trigonometric ratios are abbreviated as $$\sin$$, $$\cos$$, $$\tan$$, $$\csc$$, $$\sec$$, $$\cot$$.
• These are referred to as ratios since they can be expressed in terms of the sides of a right-angled triangle for a specific angle $$\theta$$.
• Using the triangle above:
\begin{eqnarray*}
\sin\theta &=& \frac{\mbox{Opposite}}{\mbox{Hypothenuse}}\\ | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9993444085121155, "perplexity": 757.5380672518227}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991870.70/warc/CC-MAIN-20210517211550-20210518001550-00018.warc.gz"} |
https://www.physicsforums.com/threads/alternating-series-help.210243/ | # Alternating series help
1. Jan 22, 2008
### rcmango
1. The problem statement, all variables and given/known data
Determine wheter the series is convergent or divergent. If it convergent, approximate the sum of the series correct to four decimal places.
heres the equation: http://img251.imageshack.us/img251/2261/46755781zg9.png [Broken]
2. Relevant equations
3. The attempt at a solution
This appears to be an alternating geometric series,
Would it be okay to move the exponent k over everything? in other words: ( (-1)/k) )^k
So then it looks alot like a geometric series, so then It converges by the rules of an alernating series, it is decreasing and it is approaching zero.
So then to find its sum, i would do so by geometric series right?
first term would be starting at k = 2, so: 1/2?
then use 1/2 divided by 1 -r
Am i on the right track? what is r??? is it also, 1/2?
Last edited by a moderator: May 3, 2017
2. Jan 22, 2008
### Pyrrhus
Yes you can use k as the exponent of the whole because of the distributive property of exponentiation.
3. Jan 22, 2008
### rcmango
how about the rest of what i'm doing here, this was my best hypothesis to approach the problem. I need help with the common ratio. i'm not sure what to use if its k^k ?
4. Jan 22, 2008
### dynamicsolo
It isn't a geometric series because such series has a constant ratio between successive terms. However, that gives you a clue to the proof of its convergence. (Try a comparison test.) As for the estimate of the sum, do they want an analytical proof of some sort or just something carried out on a calculator (how many terms do you need to get to a precision of 10^-4 ?)
Last edited by a moderator: May 3, 2017
Similar Discussions: Alternating series help | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9277750253677368, "perplexity": 861.386882830066}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00514.warc.gz"} |
http://gnrs.grafikohnegrenzen.de/roots-matlab.html | # Roots Matlab
B = sqrt(X) Description. matlab website MATLAB is a programming environment for algorithm development, data analysis, visualization, and numerical computation. com,,,,, other question, did you have matlab program to plot and calculate the departure angle of poles in root locus, also can identify (mark in the plote) the root locuse segments as per odd rule. Here we will define an executable file that contains an if statement. "roots" command in MATLAB Hey everyone. sqrt(a) Square root: log(a) math. Thus, a collection of MATLAB functions can lead to a large number of relatively small files. I must say, it's an awesome program, but not user-friendly at all. The cube root is therefore an nth root with. setSupportPackageRoot(installDir) sets the root folder of the current support packages. roots of non-linear functions using matlab. B = sqrt(X) returns the square root of each element of the array X. In fact, as you will see shortly, , a polynomial of degree 4, has indeed only the two real roots -1 and 2. %Start with an initial guess x0=0. What happens if you give an initial guess of x=0? Explain. What you could do is just declare a new matrix D = -sqrt(B). 7095i The function poly is an inverse of the roots function and returns to the polynomial coefficients. See also roots, fminbnd, function_handle. In university environments, it is the standard instructional tool for introductory and advanced courses in mathematics, engineering, and science. Solving cubic equations using Matlab. I'll take the answer if that's what you're offering, but I'd prefer a hint on how to get to it myself. Roots of Polynomials. setstr (Matlab function) sign (Matlab function) sin (Matlab function) sinh (Matlab function) size (Matlab function) sort (Matlab function) sparse (Matlab function) sqrt (Matlab function) strcmp (Matlab function) strcmpi (Matlab function) strfind (Matlab function) strrep (Matlab function) struct (Matlab function) sum (Matlab function) surf. Learn more about roots. The guesses are based on one of several algorithms, including Bisection, the Secant method and Inverse Quadratic Interpolation. What you could do is just declare a new matrix D = -sqrt(B). After reading the MATLAB control systems topic, you will able to solve problems based on the control system in MATLAB, and you will also understand how to write transfer function, and how to find step response, impulse response of various transfer systems. root(x^3 + 1, x, 1) represents the first root of p, while root(x^3 + 1, x, 2) represents the second root, and so on. I have solved the problem. Fwd: [ROOT] Interface with Matlab ? From: Damir Buskulic ([email protected] 4 Rules #9-#10 for Root Locus • Sketch in the remainder of the root locus. Similarly, there is another method for solving roots of simultaneous equations which is called as Gauss-Seidel Iterative Method. Before trying to find all of the roots of this function in MATLAB I think it's worth understanding that it has infinitely many roots due to the inclusion of the $\cos()$ term. So i am a completely new at Matlab. A coefficient of 0 indicates an intermediate power that is not present in the equation. For example, p = [3 2 -2] represents the polynomial. Here we will define an executable file that contains an if statement. 8 Applications 8. Matlab can be used to find roots of functions. Another was to say "root. Drop them, and you have the same result that vpasolve gave you, but to a lower precision. /matlab" directly under my root directory which begins with my user name? Thanks a lot~ How to run matlab under my root directory. Is there a solution for me so that i can type ". I can use any method to find the root, and for now, I chose the Newton-Raphson Method, so I also created scripts for the derivatives of each function. The problem is that I do not have any values for the aforementioned variables and I am trying to either factorise my 4th order polynomial in MATLAB symbolically or calculate the roots straight away. have greek letters in a Matlab figure title or plot label, you must set the "FontName" for the current axes to "Symbol". I finished the first two steps - I created function scripts for all of the equations, but I'm stuck on the third part, which is finding the root of one of the functions. However, for the complex roots I want them to appear into second order. Browse other questions tagged control control-system matlab pid-controller or ask your own question. If you recall finding the asymptotes of the root locus that lead to the zeros at infinity, the equation to determine the intersection of the asymptotes along the real axis is the following. The expression pi in MATLAB returns the floating point number closest in value to the fundamental constant pi, which is defined as the ratio of the circumference of the circle to its diameter. Finding Roots - Bisection Method Matlab Code. Matlab - how to use roots function to find a distance? So I've been trying to figure out part b of this problem for the last couple of days and it's really driving me up a wall. There is not an immediate way to do so in matlab, that I know of. Matlab has the roots function but this gives all the roots in first orders as such, they are also complex. Numeric Roots. Apparatus-: Matlab software 7. A coefficient of 0 indicates an intermediate power that is not present in the equation. Returns a coefficient vector. Matlab can be used to find roots of functions. r = roots(p) returns the roots of the polynomial represented by p as a column vector. First order bessel function in MATLAB: besselj. Let A be the number whose square root is wanted. The abscissas for quadrature order n are given by the roots of the Legendre polynomials P_n(x), which occur symmetrically about 0. Consider a spring-mass system shown in the figure below. Use this syntax to represent roots of high-degree polynomials. Root-Mean-Square. roots([1 6 0 -20]). MATLAB Tutorial – LOOPING, IF STATEMENTS, & NESTING ES 111 2/6 The function takes a as an input. However, for the complex roots I want them to appear into second order. Create a matrix of bases, X, and a matrix of nth roots, N. Calculate polynomial roots numerically, graphically, or symbolically. If x is a vector, then it is treated as one observation of the signal. Create a matrix of bases, X, and a matrix of nth roots, N. One of the things we might want to do with a function is plot its graph. by Gonzalez, Woods, and Eddins. It includes solvers for nonlinear problems (with support for both local and global optimization algorithms), linear programing, constrained and nonlinear least-squares, root finding and curve fitting. Let's consider the following examples. Applications to Engineering. This is a case where a good bracket will protect you - making sure the left side of the bracket does not go past 0 will ensure the values are real. I'm pasting below what I have so far. This example shows several different methods to calculate the roots of a polynomial. Its about simulate code matlab for BPSK, QPSK and 8 QAM, apply it for Square Root Raised Cosine (SQRC) filter, to evaluate the coded performance modulation BPSK, QPSK,8 QAM,Square Root Raised Cosine (SQRC), and demodulation. The abscissas for quadrature order n are given by the roots of the Legendre polynomials P_n(x), which occur symmetrically about 0. Evans, is widely used in control engineering for the design and analysis of control systems. real and complex. Cut and paste the above code into the Matlab editor. To calculate the natural logarithm of a scalar, vector or array, A, enter log(A). Modify it appropriately to do the following to hand in: 1. MATLAB draws a smoother graph − Adding Title, Labels, Grid Lines and Scaling on the Graph MATLAB allows you to add title, labels along the x-axis and y-axis, grid lines and also to adjust the axes to spruce up the graph. Finding the Roots of a transfer function in Matlab Leave a reply I was working on a homework assignment over the root locus method today, and the problem asked me to find the roots of the unity feedback function for 2 different K values. This function performs the same calculation as sqrt(), but the arguments are limited to arrays of real, non-negative numbers. In his case, you are actually plotting two root locus plots on the axes. m with contents. This enables research projects which use MATLAB for computation to store and exchange their data in the powerful ROOT file format. Square root. For the elements of X that are negative or complex, sqrt(X) produces complex results. Input p is a vector containing n+1 polynomial coefficients, starting with the coefficient of x n. You must have administrative privileges on the folder that you set the root to. To be completed. Root Locus Design Imag Axes Real Axis waterbed Reduced sensitivity ⇒better performance up to higher frequency 1 1+PC 26 Nov 03 R. Matlab is a great tool for exploring how the root locus plot for a given system changes as poles and zeros of GH(s) are moved around. Let's use the following equation. Milosz Blaszkiewicz and Aleksandra Mnich (AGH University of Science and Technology - Poland) wanted to evaluate a set of Big Data tools for the analysis of the data from the TOTEM experiment which will enable interactive or semi-interactive work with large amounts of data. 6; since it is built in, you may find it convenient to use fzero. Had the problem been a nastier one, with some power other than a sqrt, it would have been more difficult, but there are still ways to solve the problem. It shows the path of the roots as K is varied, but does not show the actual values of K. Some additional MATLAB documentation to keep you from getting stuck on something small: How to work with vectors and matrices. Symbolic Roots. Root Locus method is a widely used graphical technique to analyze how the system roots vary with variation in particular parametric quantity, generally a gain in a feedback control system. The documentation for the plot function and the roots function, just in case you want. In this article, we are going to learn about Bisection Method in MATLAB. The main point here is that the points are more or less on the line y=2x, which makes sense: Taking the logarithm of the sequence in (3) leads to. Simpily square roots with exponents, matlab solve secord order diferential equation, algebra questions year 8, slope intercept form free worksheet answers, simplifying radical expresion with fraction. Finding Roots of Equations "Numerical Methods with MATLAB", Recktenwald, Chapter 6 and "Numerical Methods for Engineers", Chapra and Canale, 5th Ed. The secant method is a technique for finding the root of a scalar-valued function f(x) of a single variable x when no information about the derivative exists. Chebfun is an open-source package for computing with functions to about 15-digit accuracy. g enter the expression like this when asked x^2+x-2. For a 2 × 2 matrix, there are explicit formulas that give up to four square roots, if the matrix has any roots. So, secant method is considered to be a much faster root finding method. Pay special attention to how he uses the terms "zeroes" and "roots" on the page I linked. Numeric Roots. Note that (x-3) is a factor of. The command to for finding the roots is: roots(A) As an example consider the following function: In Matlab: >> A=[4 12 1]; >> roots(A) ans =-2. With this user can perform very complex functions, matrix computing as well as functions. 4 Recording your Matlab session. unmkpp Computes the coefficients of cubic-spine polynomials. I am new to Matlab and this one has me lost! My teacher is not at school to help me, so I'm reaching out to anyone how can. Recktenwald Chapter6 from the book Numerical Methods with Matlab: These two roots are missed by brackPlot because there. The question gives the following information: Given z=1+3i , what is z^1/4 where arg(z) is in the range: pi/2 < arg(z) < pi I am looking how i would go about using the roots function to solve the problem and how i would find the other roots to generate a figure which shows that all the roots lie on a circle in the complex plane. Calculate polynomial roots numerically, graphically, or symbolically. Roots in a Specific Interval. Had the problem been a nastier one, with some power other than a sqrt, it would have been more difficult, but there are still ways to solve the problem. polyder(p): Gives a vector that represents the time-derivative of the polynomial p(x). starting from the initial condition x=0. To show potential pitfalls of this method, consider the two systems G1(s) and G2(s). I started off by using the bisection method and it's not working for a basic polynomial i know the roots to. /matlab" directly under my root directory which begins with my user name? Thanks a lot~ How to run matlab under my root directory. Spring-Mass Harmonic Oscillator in MATLAB. I want to find roots of a function using MATLAB. I am currently trying to write a matlab code that will use the secant method to find a root of a function f(x) while only using the initial guess Xr = 1. Matlab for Laplace Transform Inversion / Partial Fraction Expansion distinct real roots. The only difference here is that we have non-zero third order coefficient to add to it. Toggle Main Navigation. Polynomials and Curve Fitting AlmostallbasicdatastructuresinMATLABarematrices(twooronedimensional). unmkpp Computes the coefficients of cubic-spine polynomials. The roots of large degree polynomials can in general only be found by numerical methods. Once the plant transfer function is already loaded, you are now ready to do tuning. In numerical analysis, the secant method is a root-finding algorithm that uses a succession of roots of secant lines to better approximate a root of a function f. Use this syntax to represent roots of high-degree polynomials. any idea on what i can use to see the root's behaviour if i have about 3 system. B = sqrt(X) returns the square root of each element of the array X. log(a) Logarithm, base $e$ (natural) log10(a) math. A root loci plot is simply a plot of the s zero values and the s poles on a graph with real and imaginary ordinates. $\endgroup$ – Hakd Jul 2 '15 at 13:46. The locus of the roots of the characteristic equation of. Find more Mathematics widgets in Wolfram|Alpha. The theoretical and mathematical background behind Newton-Raphson method and its MATLAB program (or program in any programming language) is approximation of the given function by tangent line with the help of derivative, after choosing a guess value of root which is reasonably close to the actual root. Murray, Caltech CDS 14 Summary: PID and Root Locus PID control design yVery common (and classical) control technique yGood tools for choosing gains Root locus yShow closed loop poles as function of a free parameter. Square root. If you recall finding the asymptotes of the root locus that lead to the zeros at infinity, the equation to determine the intersection of the asymptotes along the real axis is the following. There is not an immediate way to do so in matlab, that I know of. The root locus method can also be used for the analysis of sampled data systems by computing the root locus in the z-plane, the discrete counterpart of the s-plane. Last modified at Wed Apr 10 21:22:34 2013. To start the discussion, let’s create a simple uitree whose Root node is not one of the automatically. Ask Question Asked 4 years, 8 months ago. As you read through this section, you may find it helpful to refer to the review section on partial fraction expansion techniques. Clothing, shoes, leather bags and more. It consists of a single MATLAB expression and any number of input and output arguments. B = sqrt(X) returns the square root of each element of the array X. The expression pi in MATLAB returns the floating point number closest in value to the fundamental constant pi, which is defined as the ratio of the circumference of the circle to its diameter. By adding zeros and/or poles to the original system (adding a compensator), the root locus and thus the closed-loop response will be modified. Create a matrix of bases, X, and a matrix of nth roots, N. Note from the help that the polynomial modeled by the function has a 1 for the highest power which is NOT included in the input vector, a. This code calculates roots of continuous functions within a given interval and uses the Bisection method. The root locus is a useful tool for analyzing single input single output (SISO) linear dynamis systems. I then combine the outputs to get the end result with all the roots. Introduction: Root Locus Controller Design. If c has n+1 components, the polynomial it represents is. Newton's Method : EXAMPLES FROM OTHER MAJORS : Chemical Engineering Example on Newton-Raphson Method. Repeat until you have calculated the square root to desired accuracy. Root Locus method is a widely used graphical technique to analyze how the system roots vary with variation in particular parametric quantity, generally a gain in a feedback control system. I am currently trying to write a matlab code that will use the secant method to find a root of a function f(x) while only using the initial guess Xr = 1. You could use conditional loops, but that is probably more pain than it is worth. The Far-Reaching Impact of MATLAB and Simulink Explore the wide range of product capabilities, and find the solution that is right for your application or industry. As an example consider the function: in Matlab: >> A=[5 3 2]; >> roots(A) ans =-0. A callback routine querying the PointerWindow can get the wrong window handle if you move the pointer to another window before the callback executes. Let A be the number whose square root is wanted. La función roots considera que p es un vector con n+1 elementos que representan el ngrado polinomio característico de un n-by-n Matrix, A. MATLAB function ROOTS If the nonlinear algebraic system is a polynomial equation, we could use the MATLAB routine roots to find the zeros of the polynomial. The equation must be in the following form: ax 2 + bx + c = 0 where a, b, and c are real coefficients. By adding zeros and/or poles to the original system (adding a compensator), the root locus and thus the closed-loop response will be modified. Learn more about gauss seidel. To zoom in, click the magnifying lens icon (+) as highlighted below. MATLAB has evolved over a period of years with input from many users. The command can only find one root at a time, and can only find roots in one variable at a time. roots([1 0 -4]) and the result. Square Roots with Newton's Method. Each m-file contains exactly one MATLAB function. MATLAB makes displaying a square root symbol easy. As the open-loop gain, k , of a control system varies over a continuous range of values, the root locus diagram shows the trajectories of the closed-loop poles of the feedback system. Web resources about - how to do square root in Simulink? - comp. Finding roots of polynomials MATLAB can find the roots of polynomials via the roots command. Matlab has the roots function but this gives all the roots in first orders as such, they are also complex. To introduce this topic, we will describe the work we did on the candidate Higgs boson data. Where are the zeros of the closed-loop transfer function? They are the roots of the numerator of the closed-loop transfer. Numeric Roots. For example, when dividing 17 by three, the remainder of two could be more important to know than the integer quotient of five. 8 Applications 8. All minutiae of the system are known - roots of the parabola, coordinates of its vertex, the equation of the line, the distance the wall is from the origin, point of interception, the height of wall, etc. Last modified at Wed Apr 10 21:22:34 2013. sqrt(a) Square root: log(a) math. Matlab has the roots function but this gives all the roots in first orders as such, they are also complex. 1 Dense matrices and vectors 2. Silicon IP. The root locus method, developed by W. Integrate and Differentiate Polynomials. Root=xm please use this code instead to find out roots for any expression. Pay special attention to how he uses the terms "zeroes" and "roots" on the page I linked. [email protected] Evans, is widely used in control engineering for the design and analysis of control systems. Unless the roots of an equation are easy to find, iterative methods that can evaluate a function hundreds, thousands, or millions of times will be required. As a consequence, MATLAB programs are often much shorter and easier to read than programs written for instance in C or Fortran. First define your system, starting with z. To find the roots of $$z^2+6z+25$$ you enter the coefficients of $$z$$ >>eqn = [1 6 25] eqn = 1 6 25 and ask for the roots:. For example, consider the following plant: kGH(s) = k(s+z)/s(s+1)(s+6) Let's consider what happens for different values of z when 1. MATLAB programs are stored as plain text in files having names that end with the extension . Most Chebfun commands are overloads of familiar MATLAB commands — for example sum(f) computes an integral, roots(f) finds zeros, and u = L\f solves a differential equation. The notation used in the first statement is much faster than the loop. A coefficient of 0 indicates an intermediate power that is not present in the equation. R/S-Plus MATLAB/Octave Description; help. While power is a more efficient function for computing the roots of numbers, in cases where both real and complex roots exist, power returns only the complex roots. Logical is a first-class data type and a MATLAB class, and so logical is now equivalent to other first-class types such as character and cell arrays. The solve function can also solve higher order equations. the root nearest 7. But both poly and roots use eig, which is based on similarity transformations. Please use this form if you would like to have this math solver on your website, free of charge. For example, p = [3 2 -2] represents the polynomial. The "residue" command gives three pieces of information:. For the elements of X that are negative or complex, sqrt(X) produces complex results. If D is a diagonal n × n matrix, one can obtain a square root by taking a diagonal matrix R, where each element along the diagonal is a square root of the corresponding element of D. Applications to Engineering. As i have some roots below zero, when you change linspace to include these it does not display all of the roots? Currently I have the copied the code so that it runs twice. r = roots(c) returns a column vector whose elements are the roots of the polynomial c. Can you forsee any limitations to this? Try repeating the above with different initial conditions - how many roots can you locate? 4. X is the unique square root for which every eigenvalue has nonnegative real part. Roots Using Substitution. This MATLAB function returns a matrix X, such that X2 = A and the eigenvalues of X are the square roots of the eigenvalues of A. To show potential pitfalls of this method, consider the two systems G1(s) and G2(s). Plotting multiple data sets together helps correlate the trends between the two. The first line of the file bisect. We may earn a commission for purchases using our links. Root Locus method is a widely used graphical technique to analyze how the system roots vary with variation in particular parametric quantity, generally a gain in a feedback control system. Symbolic Roots. 0 of the equation 4x3 +2x2 200x 50 = 0 MATLAB can be used to do this by creating le eqn. roots([1 6 0 -20]). Applying F = ma in the x-direction, we get the following differential equation for the location x(t) of the center of the mass: The initial conditions at t=0 are. I finished the first two steps - I created function scripts for all of the equations, but I'm stuck on the third part, which is finding the root of one of the functions. Roots of Polynomials. Recall that the quadratic equation can be used to find the roots as follows: Root 1, Root2 =- b plusminus squareroot b^2 - 4 middot a middot c/2a Also recall that the roots may be real and distinct, repeated, or complex as described below. …thanks in advance. As you can see, the first three roots were not truly roots. The numerator, n, and the denominator, d, are entered as Matlab vectors representing the coefficients of s in descending powers. MATLAB executes the above statements and returns the following result − r = -6. Root Locus Design Using MATLAB. The first line of the file bisect. While power is a more efficient function for computing the roots of numbers, in cases where both real and complex roots exist, power returns only the complex roots. are called nested radicals. Try the command: v = roots ( c ) to see if you get back your original set of roots! Horner's Method Suppose someone asks you to evaluate the polynomial p(x) = x^3 - 2 * x^2 - 5 * x + 6. Newton's method: Matlab code In the next exercise, you will get down to the task of writing Newton's method as a function m-file. Struggling with a MATLAB quadratic equation. What happens if you give an initial guess of x=0? Explain. log10(a) Logarithm, base 10. B = sqrt(X) returns the square root of each element of the array X. Solve a cubic equation using MATLAB code. Determine in some way a first guess g of the square root of A. The numerator, n, and the denominator, d, are entered as Matlab vectors representing the coefficients of s in descending powers. Further with this user can integrate many different programming paradigms. Let's also fix epsilon=0. Please use this form if you would like to have this math solver on your website, free of charge. The fzero command in MATLAB can be used to find the value of a single parameter of a multivariable function that will set the function equal to zero (if such a value exists). 매트랩(MATLAB)에서 char2int, 변수 타입을 문자에서 숫자로 변경하는 방법 (0) 2015. Roots in a Specific Interval. 2 Sparse matrices and vectors 2. One method is bisection method. The sqrt function’s domain includes negative and complex numbers, which can lead to unexpected results if used unintentionally. Determine in some way a first guess g of the square root of A. zpkdata Retrieve zero-pole-gain data set Set properties of LTI models. Spring-Mass Harmonic Oscillator in MATLAB. Roots-of-equations code February 12, 2014 ME 309 -Numerical Analysis of Engineering Systems 3 MATLAB Root Finder Example • Root-finder function header Function x = findRoot(f, fPrime, … initialGuess) • Look at Newton's Method example 𝑥𝑘+1=𝑥𝑘− 𝑓𝑥𝑘 𝑓′𝑥𝑘 • Reference to function in Newton's Method. $\begingroup$ one more thing, what is the difference if i use 'roots' command and 'nyquist' command in Matlab? because it seems like i cannot see the behaviour of the root. plot(4,4) The output from this command is the faint blue dot in the center of the figure. The root locus procedure should produce a graph of where the poles of the system are for all values of gain K. Do the zeros of a system change with a change in gain? No. Usually the forward path gain factor K is considered as an independent variable and the roots of 1+G(s)H(S) = 0 as dependent variables, the roots are plotted in s plane with K as a variable parameter. Inverse Laplace Transform by Partial Fraction Expansion This technique uses Partial Fraction Expansion to split up a complicated fraction into forms that are in the Laplace Transform table. It will helpful for engineering students to learn Bisection method MATLAB program easily. Integrate and Differentiate Polynomials. This MATLAB exercise computes and plots the roots of either an LPC polynomial or the resulting set of LSP polynomials, for all frames of a specified speech file, and superimposes the resulting root plots over either a conventional wideband spectrogram of the speech, or an LPC spectrogram of the speech. MATLAB draws a smoother graph − Adding Title, Labels, Grid Lines and Scaling on the Graph MATLAB allows you to add title, labels along the x-axis and y-axis, grid lines and also to adjust the axes to spruce up the graph. The xlabel and ylabel commands generate labels along x-axis and y-axis. The sqrt function's domain includes negative and complex numbers, which can lead to unexpected results if used unintentionally. This example shows several different methods to calculate the roots of a polynomial. If the function is continuous, this is also a point where the function has a value near zero. A callback routine querying the PointerWindow can get the wrong window handle if you move the pointer to another window before the callback executes. As mentioned earlier, control tuning using root locus editor in Matlab is a manual method. Examples Plot the hyperbolic tangent function from -2 to 2:. The root locus method, developed by W. Bisection method is a popular root finding method of mathematics and numerical methods. Local feature frames; Covariant feature detectors; HOG features; SIFT detector and descriptor; Dense SIFT; LIOP local descriptor; MSER feature detector; Distance. Usually the forward path gain factor K is considered as an independent variable and the roots of 1+G(s)H(S) = 0 as dependent variables, the roots are plotted in s plane with K as a variable parameter. pdf), Text File (. The remaining part of the method is to repeat the following step: Divide A by the current guess g and then average the quotient with g. For the elements of X that are negative or complex, sqrt(X) produces complex results. If x is a matrix, each row of x represents a separate observation of the signal. Root Locus Design Using MATLAB - Free download as PDF File (. root(x^3 + 1, x, 1) represents the first root of p, while root(x^3 + 1, x, 2) represents the second root, and so on. "roots" command in MATLAB Hey everyone. …thanks in advance. Root=xm please use this code instead to find out roots for any expression. A coefficient of 0 indicates an intermediate power that is not present in the equation. Bisection method is a popular root finding method of mathematics and numerical methods. Matlab is a great tool for exploring how the root locus plot for a given system changes as poles and zeros of GH(s) are moved around. MCS320 IntroductiontoSymbolicComputation Spring2007 MATLAB Lecture 3. I just made them up for this example. I am currently trying to write a matlab code that will use the secant method to find a root of a function f(x) while only using the initial guess Xr = 1. The fzero command in MATLAB can be used to find the value of a single parameter of a multivariable function that will set the function equal to zero (if such a value exists). Your institution is not yet authorized to integrate MATLAB Grader with a Learning Management System. MATLAB draws a smoother graph − Adding Title, Labels, Grid Lines and Scaling on the Graph. The expression pi in MATLAB returns the floating point number closest in value to the fundamental constant pi, which is defined as the ratio of the circumference of the circle to its diameter. publish(root_obj, check_obj, location) specifies where the Model Advisor places the check in the Model Advisor tree. The root locus method, developed by W. Each element in X corresponds to an element in N. A horizontal line is perpendicular to a vertical line, whose points all share the same x-value. Roots of Polynomials. I've been using matlab to plot root loci for my control systems class but I ran into a problem with a recent assignment. You must have administrative privileges on the folder that you set the root to. The question gives the following information: Given z=1+3i , what is z^1/4 where arg(z) is in the range: pi/2 < arg(z) < pi I am looking how i would go about using the roots function to solve the problem and how i would find the other roots to generate a figure which shows that all the roots lie on a circle in the complex plane. Root loci are used to study the effects of varying feedback gains on closed-loop pole locations. Please visit the Roots Cambridge in Cambridge, ON for the latest styles for women, men, kids and baby. any idea on what i can use to see the root's behaviour if i have about 3 system. 4 Grid operators 2. The RMS is also known as the quadratic mean and is a particular case of the generalized mean with exponent 2. The formula used to calculate the roots is: Naturally, we have to deliver two x-values. Inverse Laplace Transform by Partial Fraction Expansion This technique uses Partial Fraction Expansion to split up a complicated fraction into forms that are in the Laplace Transform table. Matlab help facilities 1. Note also that, in Matlab, returned values are separated from arguments, so the variable root, which I will call approx_root to make a point, is written on the left of an equal sign. The equation must be in the following form: ax 2 + bx + c = 0 where a, b, and c are real coefficients. The file is called by Matlab, and it constructs a second derivative finite difference matrix with boundary conditions. /matlab" directly under my root directory which begins with my user name? Thanks a lot~ How to run matlab under my root directory. As a consequence, MATLAB programs are often much shorter and easier to read than programs written for instance in C or Fortran. The cube root is therefore an nth root with. RLocusGui is a graphical user interface written in the Matlab® programming language. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7626937627792358, "perplexity": 562.1046949813077}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144637.88/warc/CC-MAIN-20200220035657-20200220065657-00472.warc.gz"} |
https://www.physicsforums.com/threads/calculating-a-in-shm-from-x-v-a.229932/ | # Homework Help: Calculating A in SHM from x, v & a
1. Apr 19, 2008
### mudkip9001
how can you work out the amplitude knowing only displacement, velocity and acceleration?
I have been able to work out angular velocity, frequency and period, but I can't work out amplitude without knowing either the spring constant, the mass or the phase angle.
2. Apr 19, 2008
### Hootenanny
Staff Emeritus
Welcome to PF,
Why don't you post what you have thus far?
HINT: What is the velocity of the particle when it is at it's amplitude?
3. Apr 19, 2008
### mudkip9001
Thank you, it seems like a nice place :)
I have these equations
x=Acos($$\omega$$t+$$\phi$$)
v=-A$$\omega$$sin($$\omega$$t + $$\phi$$)
a=-$$\omega$$$$^{2}$$cos($$\omega$$t+$$\phi$$) =$$\omega$$x
I could work out $$\omega$$ by re arranging the equation for a.
It's 0, but I'm still left with two unknown variables, $$\phi$$ and A, am I not?
edit: why does omega keep showing up as superscript?
4. Apr 19, 2008
### Hootenanny
Staff Emeritus
Have you any initial conditions, such as whether it starts from x=A or x=0?
5. Apr 19, 2008
### mudkip9001
Sorry, I should have typed up the question from the start:
I struggled with this for hours and concluded that the question must be wrong, but I went to the homepage of the textbook and downloaded the errata and didn't find anything.
6. Apr 19, 2008
### Hootenanny
Staff Emeritus
It seems to me that you have a system of simultaneous equations.
Which values of $\left(\omega t + \phi\right)$ correspond to the particle being at x=A?
Last edited: Apr 19, 2008
7. Apr 20, 2008
### mudkip9001
when x=A, $\left(\omega t + \phi\right)$=0
I still can't solve it though, I just end up with division of 0, can you confirm that it really is solvable?
8. Apr 20, 2008
### alphysicist
Hi mudkip9001,
Try conservation of energy. Equate the energy at the given point to the energy at the amplitude. What do you get?
9. Apr 20, 2008
### mudkip9001
but I don't know neither k nor m
10. Apr 20, 2008
### alphysicist
You'll be able to get rid of them by using what you know about the acceleration.
11. Apr 20, 2008
### alphysicist
What I mean is that although you don't know either k or m, you can find the value of (k/m).
12. Apr 20, 2008
### mudkip9001
I just wrote all this, and then figured it out myself just as I finished. But I guess I might as well post t anyway. Thanks for all your help, I'm very relieved now (but I also feel a bit dumb, since I was so sure there was something wrong with the question:grumpy:).
where I went wrong was that the question is how much further it would go, not the amplitude.
13. Dec 3, 2009
### LawnNinja
What you were missing is squaring the quantity m/k (i.e., A = \sqrt((x^2+v^2)/(x/a)^2)
(Sorry I couldn't write this in pretty-print. I'm new here.) | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9432597756385803, "perplexity": 1354.1981598726318}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00491.warc.gz"} |
https://mathematica.stackexchange.com/tags/algebraic-manipulation/new | # Tag Info
1
Does this do what you want? polyIter[{a_, b_, c_}, x_] := Module[{q, n}, q = PolynomialQuotient[a, b, x]; n = Exponent[q, x]; {b, a - b #, #} &@If[n < 1, q, (Coefficient[q, x^n] x^n)] // Simplify ] myPolyContinuedFraction[p_, q_, x_] := Last /@ Rest@ NestWhileList[polyIter[#, x] &, {p, q, 0}, Length@CoefficientList[#[[2]], x] > 0 &...
0
The workflow provided in the OP seems to apply to ordinary differential equations up to order 4. The following workflow is more general, but it will require that parameters and independent variables are expressed as monomials. First, set up some test ODE's and PDE's: (*Test ODE's and PDE's*) odeeqn = ϵ y''[x] y[x] + x y'[x] + ϵ^2 y[x] == 0; pdeeqn = U/τ D[u[...
6
As I noted in a comment, you could perform the Thiele continued fraction expansion of a rational function, which is of a slightly different form from the one requested in the OP; this might nevertheless be useful in other contexts. One method for generating this is Viscovatov's algorithm, which can be implemented in Mathematica like so: viscovatov[cof_?...
2
The complete solution space to a system of ODEs can have a complicated structure, including singular components (e.g. Clairaut equations) and multiple branches. Let us call a solution $y_{\bf C}$ a locally general solution to an ODE system with smooth coefficients of dimension $n$ at $(x,{\bf C})=(x_0,{\bf C}_0)$ to a system of ODEs if the mapping that maps ...
2
Assuming you have in mind linear differential equation of n-th order, you have to check two things: That sol is indeed a solution. That you did already. That there are exactly n homogeneous solutions which are linearly independent. The key here is linear independence. In order to detect the linear dependence between functions you can calculate wronskian So,...
1
According to Encyclopedia of Mathematics, in order to prove that sol from eq = y''[x] + 4 y[x] == 7;sol = DSolveValue[{eq}, y[x], x] is a general solution of eq one should prove that sol is a solution of eq for any C[1] and C[2] (done in the question) and any Cauchy problem has a (unique) solution, more exactly, ForAll[{x0, d1, d2}, Exists[{C[1], C[2]}, ...
1
This should find the denominator (factors with a negative power) to factor out in an expression of the form A + B/C + D/E + .... The DeleteDuplicates would delete factors of the denominator with the same base but different exponents, but you would really want to select the correct one, which DeleteDuplicates is not guaranteed to do. It does not matter in ...
1
You cannot get your desired form by using Simplify. Indeed, these are your expressions: expr1 = a + (1 + b^2 + b (2 - (4 d^2 e)/(1 + d (-1 + e))))^(1 - n/2); expr2 = ((a)*(1 + d (-1 + e))^(1 - n/2) + (((1 + b^2)*(1 + d (-1 + e)) + b (2 (1 + d (-1 + e)) - 4 d^2 e))^(1 - n/2)))/(1 + d (-1 + e))^(1 - n/2); Let us count their leaves: ...
Top 50 recent answers are included | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.656702995300293, "perplexity": 1459.4922759284962}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365454.63/warc/CC-MAIN-20210303042832-20210303072832-00452.warc.gz"} |
https://link.springer.com/chapter/10.1007%2F978-3-642-45135-5_12 | Simulation
A Methodology to Evaluate Recommendation Systems in Software Engineering
• Robert J. Walker
• Reid Holmes
Chapter
Abstract
Scientists and engineers have long used simulation as a technique for exploring and evaluating complex systems. Direct interaction with a real, complex system requires that the system be already constructed and operational, that people be trained in its use, and that its dangers already be known and mitigated. Simulation can avoid these issues, reducing costs, reducing risks, and allowing an imagined system to be studied before it is created. The explorations supported by simulation serve two purposes in the realm of evaluation: to determine whether and where undesired behavior will arise and to predict the outcomes of interactions with the real system. This chapter examines the use of simulation to evaluate recommendation systems in software engineering (RSSEs). We provide a general model of simulation for evaluation and review a small set of examples to examine how the model has been applied in practice. From these examples, we extract some general strengths and weaknesses of the use of simulation to evaluate RSSEs. We also explore prospects for making more extensive use of simulation in the future.
Keywords
Recommendation System Application Programming Interface Confusion Matrix Evaluation Evaluation Usage Scenario
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
1. 1.
Avazpour, I., Pitakrat, T., Grunske, L., Grundy, J.: Dimensions and metrics for evaluating recommendation systems. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, Chap. 10. Springer, New York (2014)Google Scholar
2. 2.
Babbage, C.: Passages from the Life of a Philosopher. Longman, Green, Longman, Roberts, & Green, London (1864)Google Scholar
3. 3.
Bachmann, A., Bird, C., Rahman, F., Devanbu, P., Bernstein, A.: The missing links: bugs and bug-fix commits. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 97–106 (2010). doi:10.1145/1882291.1882308Google Scholar
4. 4.
Bavota, G., De Lucia, A., Marcus, A., Oliveto, R.: Automating Extract Class refactoring: an improved method and its evaluation. Empir. Software Eng. (2013). doi:10.1007/s10664-013-9256-x (in press)Google Scholar
5. 5.
Bird, C., Zimmermann, T.: Assessing the value of branches with what-if analysis. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 45:1–45:11 (2012). doi:10.1145/2393596.2393648Google Scholar
6. 6.
Collinson, M., Monahan, B., Pym, D.: Semantics for structured systems modelling and simulation. In: Proceedings of the ICST International Conference on Simulation Tools and Techniques, pp. 34:1–34:8 (2010). doi:10.4108/ICST.SIMUTOOLS2010.8631Google Scholar
7. 7.
Cossette, B.E., Walker, R.J.: Seeking the ground truth: a retroactive study on the evolution and migration of software libraries. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 55:1–55:11 (2012). doi:10.1145/2393596.2393661Google Scholar
8. 8.
Erzberger, C., Prein, G.: Triangulation: validity and empirically-based hypothesis construction. Qual. Quan. 31(2), 141–154 (1997). doi:10.1023/A:1004249313062
9. 9.
Feinstein, A.H., Cannon, H.M.: Constructs of simulation evaluation. Simulat. Gaming 33(4), 425–440 (2002). doi:10.1177/1046878102238606
10. 10.
Foss, T., Stensrud, E., Kitchenham, B., Myrtveit, I.: A simulation study of the model evaluation criterion MMRE. IEEE Trans. Software Eng. 29(11), 985–995 (2003). doi:10.1109/TSE.2003.1245300
11. 11.
Hlupic, V., Irani, Z., Paul, R.J.: Evaluation framework for simulation software. Int. J. Adv. Manuf. Technol. 15(5), 366–382 (1999). doi:10.1007/s001700050079
12. 12.
Holmes, R., Ratchford, T., Robillard, M., Walker, R.J.: Automatically recommending triage decisions for pragmatic reuse tasks. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 397–408 (2009). doi:10.1109/ASE.2009.65Google Scholar
13. 13.
Holmes, R., Walker, R.J.: Customized awareness: recommending relevant external change events. In: Proceedings of the ACM/IEEE International Conference on Software Engineering, pp. 465–474 (2010). doi:10.1145/1806799.1806867Google Scholar
14. 14.
Holmes, R., Walker, R.J.: Systematizing pragmatic software reuse. ACM Trans. Software Eng. Methodol. 21(4), 20:1–20:44 (2012). doi:10.1145/2377656.2377657Google Scholar
15. 15.
Holmes, R., Walker, R.J., Murphy, G.C.: Approximate structural context matching: an approach to recommend relevant examples. IEEE Trans. Software Eng. 32(12), 952–970 (2006). doi:10.1109/TSE.2006.117
16. 16.
Hughes, R.I.G.: The Ising model, computer simulation, and universal physics. In: Morgan, M.S., Morrison, M. (eds.) Models as Mediators: Perspectives on Natural and Social Science, No. 52 in Ideas in Context, Chap. 5. Cambridge University Press, Cambridge (1999). doi:10.1017/CBO9780511660108.006Google Scholar
17. 17.
Kelley, J.F.: An iterative design methodology for user-friendly natural language office information applications. ACM Trans. Inform. Syst. 2(1), 26–41 (1984). doi:10.1145/357417.357420
18. 18.
Kim, S., Zimmermann, T., Whitehead Jr., E.J., Zeller, A.: Predicting faults from cached history. In: Proceedings of the ACM/IEEE International Conference on Software Engineering, pp. 489–498 (2007). doi:10.1109/ICSE.2007.66Google Scholar
19. 19.
Kononenko, O., Dietrich, D., Sharma, R., Holmes, R.: Automatically locating relevant programming help online. In: Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 127–134 (2012). doi:10.1109/VLHCC.2012.6344497Google Scholar
20. 20.
Marcus, A., Poshyvanyk, D., Ferenc, R.: Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Trans. Software Eng. 34(2), 287–300 (2008). doi:10.1109/TSE.2007.70768
21. 21.
Matejka, J., Li, W., Grossman, T., Fitzmaurice, G.: CommunityCommands: command recommendations for software applications. In: Proceedings of the ACM Symposium on User Interface Software and Technology, pp. 193–202 (2009). doi:10.1145/1622176.1622214Google Scholar
22. 22.
Mosteller, F.: A k-sample slippage test for an extreme population. Ann. Math. Stat. 19(1), 58–65 (1948). doi:10.1214/aoms/1177730290
23. 23.
Murphy-Hill, E., Jiresal, R., Murphy, G.C.: Improving software developers’ fluency by recommending development environment commands. In: Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 42:1–42:11 (2012). doi:10.1145/2393596.2393645Google Scholar
24. 24.
Murphy-Hill, E., Murphy, G.C.: Recommendation delivery: getting the user interface just right. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, Chap. 9. Springer, New York (2014)Google Scholar
25. 25.
Robillard, M.P.: Topology analysis of software dependencies. ACM Trans. Software Eng. Methodol. 17(4), 18:1–18:36 (2008). doi:10.1145/13487689.13487691Google Scholar
26. 26.
Robillard, M., Walker, R.J.: An introduction to recommendation systems in software engineering. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, Chap. 1. Springer, New York (2014)Google Scholar
27. 27.
Robillard, M.P., Walker, R.J., Zimmermann, T.: Recommendation systems for software engineering. IEEE Software 27(4), 80–86 (2010). doi:10.1109/MS.2009.161
28. 28.
Said, A., Tikk, D., Cremonesi, P.: Benchmarking: a methodology for ensuring the relative quality of recommendation systems in software engineering. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, Chap. 11. Springer, New York (2014)Google Scholar
29. 29.
Sánchez, P.J.: Fundamentals of simulation modeling. In: Proceedings of the Winter Simulation Conference, pp. 54–62 (2007). doi:10.1109/WSC.2007.4419588Google Scholar
30. 30.
Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1–47 (2002). doi:10.1145/505282.505283
31. 31.
Shepperd, M., Kadoda, G.: Using simulation to evaluate prediction techniques. In: Proceedings of the IEEE International Symposium on Software Metrics, pp. 349–359 (2001). doi:10.1109/METRIC.2001.915542Google Scholar
32. 32.
Teorey, T.J., Merten, A.G.: Considerations on the level of detail in simulation. In: Proceedings of the Symposium on Simulation of Computer Systems, pp. 137–143 (1973)Google Scholar
33. 33.
Tosun Mısırlı, A., Bener, A., Çağlayan, B., Çalıklı, G., Turhan, B.: Field studies: a methodology for construction and evaluation of recommendation systems in software engineering. In: Robillard, M., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, Chap. 13. Springer, New York (2014)Google Scholar
34. 34.
van Rijsbergen, C.J.: Information Retrieval. 2nd edn. Butterworth–Heinemann, London (1979)Google Scholar
35. 35.
Winsberg, E.: Simulated experiments: methodology for a virtual world. Philos. Sci. 70(1), 105–125 (2003). doi:10.1086/367872
36. 36.
Ye, Y., Yamamoto, Y., Nakakoji, K., Nishinaka, Y., Asada, M.: Searching the library and asking the peers: learning to use Java APIs on demand. In: Proceedings of the International Symposium on Principles and Practice of Programming in Java, pp. 41–50 (2007). doi:10.1145/1294325.1294332Google Scholar
37. 37.
Zimmermann, T., Weißgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. IEEE Trans. Software Eng. 31(6), 429–445 (2005). doi:10.1109/TSE.2005.72 | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9226770401000977, "perplexity": 22495.627528860452}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828697.80/warc/CC-MAIN-20181217161704-20181217183704-00304.warc.gz"} |
http://www.ck12.org/arithmetic/Fractions-as-Decimals/enrichment/Converting-Fractions-into-Decimals-Example-3/r1/ | <meta http-equiv="refresh" content="1; url=/nojavascript/"> Fractions as Decimals ( Video ) | Arithmetic | CK-12 Foundation
# Fractions as Decimals
%
Progress
Practice Fractions as Decimals
Progress
%
Converting Fractions into Decimals - Example 3
Determining two equivalent values from a set of fractions and decimals | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.998429536819458, "perplexity": 26853.981790356283}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447547497.90/warc/CC-MAIN-20141224185907-00038-ip-10-231-17-201.ec2.internal.warc.gz"} |
https://k12.libretexts.org/Sandboxes/[email protected]/Jane_Good_-_Elementary-_Curation_4th_Grade-Reading-and-Writing-Trimester-1.zip/02%3A_Writing/24%3A_Spell_content_related_words_correctly_consulting_references_and_people_as_needed/01%3A_Or_Does_it | Skip to main content
# Or Does it?
$$\newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} }$$ $$\newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}}$$$$\newcommand{\id}{\mathrm{id}}$$ $$\newcommand{\Span}{\mathrm{span}}$$ $$\newcommand{\kernel}{\mathrm{null}\,}$$ $$\newcommand{\range}{\mathrm{range}\,}$$ $$\newcommand{\RealPart}{\mathrm{Re}}$$ $$\newcommand{\ImaginaryPart}{\mathrm{Im}}$$ $$\newcommand{\Argument}{\mathrm{Arg}}$$ $$\newcommand{\norm}[1]{\| #1 \|}$$ $$\newcommand{\inner}[2]{\langle #1, #2 \rangle}$$ $$\newcommand{\Span}{\mathrm{span}}$$ $$\newcommand{\id}{\mathrm{id}}$$ $$\newcommand{\Span}{\mathrm{span}}$$ $$\newcommand{\kernel}{\mathrm{null}\,}$$ $$\newcommand{\range}{\mathrm{range}\,}$$ $$\newcommand{\RealPart}{\mathrm{Re}}$$ $$\newcommand{\ImaginaryPart}{\mathrm{Im}}$$ $$\newcommand{\Argument}{\mathrm{Arg}}$$ $$\newcommand{\norm}[1]{\| #1 \|}$$ $$\newcommand{\inner}[2]{\langle #1, #2 \rangle}$$ $$\newcommand{\Span}{\mathrm{span}}$$$$\newcommand{\AA}{\unicode[.8,0]{x212B}}$$
A Reading Test for you: fi yuo cna raed tihs, yuo hvae a sgtrane mnid too. Cna yuo raed tihs? Olny 55 plepoe out of 100 can. i cdnuolt blveiee taht I cluod aulaclty uesdnatnrd waht I was rdanieg. The phaonmneal pweor of the hmuan mnid, aoccdrnig to a rscheearch at Cmabrigde Uinervtisy, it dseno’t mtaetr in waht oerdr the ltteres in a wrod are, the olny iproamtnt tihng is taht the frsit and lsat ltteer be in the rghi t pclae. The rset can be a taotl mses and you can sitll raed it whotuit a pboerlm. Tihs is bcuseae the huamn mnid deos not raed ervey lteter by istlef, but the wrod as a wlohe. Azanmig huh? yaeh and I awlyas tghuhot slpeling was ipmorantt! if you can raed tihs forwrad it. Check out the jibberish on the left. Can you read it? Supposedly only 55 out of 100 people can read it. I don't believe that's right. Try to read it. It's kind of a trick. But please don't "trick" your reader with hard to read poorly spelled words! Check your writing. Have someone else check it. A great use of technology is to type what you want to write. Spell check should help you with quite a few words. Another way to catch mistakes is to read your writing aloud. Many times you will find goofy mistakes you made that you can fix without any help. For example, while I was typing this page, I accidentally typed "wnat" instead of "want." I caught it when I looked over my writing before using spell check.
Or Does it? is shared under a not declared license and was authored, remixed, and/or curated by LibreTexts.
• Was this article helpful? | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5097919702529907, "perplexity": 10380.169558042326}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00365.warc.gz"} |
https://scholarworks.iu.edu/dspace/handle/2022/14128?show=full | # Indiana University
dc.contributor.author Park, Joon Y. dc.contributor.author Chang, Yonsoon dc.date.accessioned 2012-01-23T02:36:25Z dc.date.available 2012-01-23T02:36:25Z dc.date.issued 2010-12-22 dc.identifier.citation Chang, Yonsoon and Joon Y. Park. Endogeneity in Nonlinear Regressions with Integrated Time Series, Econometric Reviews 30, 51-87, 2011. en dc.identifier.uri http://www.tandfonline.com/doi/abs/10.1080/07474938.2011.520567 en dc.identifier.uri http://hdl.handle.net/2022/14128 dc.description JEL Classification: C13, C22. en dc.description.abstract This article considers the nonlinear regression with integrated regressors that are contemporaneously correlated with the regression error. We, in particular, establish the consistency and derive the limit distribution of the nonlinear least squares estimator under such endogeneity. For the regressions with various types of regression functions, it is shown that the estimator is consistent and has the same rate of convergence as for the case of the regressions with no endogeneity. Whether or not the limit distribution is affected by the presence of endogeneity, however, depends upon the functional type of the parameter derivative of regression function. If it is asymptotically homogeneous, the limit distribution of the nonlinear least squares estimator has an additional bias term reflecting the presence of endogeneity. On the other hand, the endogeneity does not have any effect on the nonlinear least squares limit theory, if the parameter derivative of regression function is integrable. Regardless of the presence of endogeneity, the en least squares estimator has the same limit distribution in this case. To illustrate our theory, we consider the nonlinear regressions with logistic and power regression functions with integrated regressors that have contemporaneous correlations with the regression error. dc.language.iso en_US en dc.publisher Taylor and Francis en dc.subject nonlinear regression, integrated time series, endogeneity, consistency, limit distributions. en dc.title Endogeneity in Nonlinear Regressions with Integrated Time Series en dc.type Article en
| {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9397717118263245, "perplexity": 2232.7986152197414}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988722459.85/warc/CC-MAIN-20161020183842-00037-ip-10-171-6-4.ec2.internal.warc.gz"} |
https://motls.blogspot.com/2009/10/tolasz-klaus-may-not-be-wrong.html | ## Wednesday, October 21, 2009 ... //
### Tolasz: Klaus may not be wrong
Today, the #1 Czech newspaper, MF DNES ("Youth Front TODAY"), published an interview of a top Czech journalist, Ms Barbora Tachecí, with climatologist Mr Radim Tolasz.
Because I consider him the ultimate role model of a mainstream Czech climatologist, the "guy in the middle" (who also holds, in some sense, the highest climatological job in Czechia), I decided to translate the whole interview so that the readers from the whole world may learn that the climate hysteria is pretty much absent in the Czech climatological circles - and in fact, also in the Czech media.
The printed version starts with a big headline, "Klaus may not be wrong" ("Třeba se Klaus nemýlí"). The electronic version has a more refined title:
Politicians are satisfied as soon as the fight against the climate change is being written about; economists should calculate how much it costs, Dr Radim Tolasz says. Picture: Mr Michal Šula, MF DNES
Klaus may not be wrong but he oversimplifies things, a climatologist says
(title)
Weather fluctuations in recent days have confused everyone. There is an exception: climatologists are not surprised and they will probably never be. This statement was also confirmed by Mr Radim Tolasz, a deputy director for meteorology and climatology of the Czech Hydrometeorological Institute, in an interview with Ms Barbora Tachecí.
Ms Tachecí has talked with him about the weather which will offer extreme fluctuations, and about the mankind's influence on the climate change.
Within a few days, we've seen Summer, Fall, and Winter - does it prove the climate change?
It is a part of the evidence for climate change. Climate change is a huge topic and we can't say that when the wind blows right now, it's a proof.
Will these fast changes be occuring ever more frequently?
I am convinced that they will. After all, we've been seeing this development for decades. During the most recent decades, the frequency of extreme phenomena has increased. But our awareness about them has increased, too.
How far will it go? What will we experience 10 years from now?
There won't be too much change but the extremes will continue. The weather is eventually guaranteed to reach a cliff and five years of silence will follow. Our models for the Czech Republic have been calculated up to the year 2030 and we don't expect changes towards a cooler weather or towards the reduction of the extremes.
But these models include some influence of the planned fight against the climate change, don't they?
No. Because all models, not only our models, but even the global models, imply that no intervention has any chance to manifest itself before 2030. The climate system has an enormous inertia.
If Václav Klaus invited you for a dinner and wanted to chat about the climate, would you accept the offer?
Sure. I would have no reason to reject it.
Personal data
Born in 1964. In 1987, he completed studies of physical geography at the Masaryk University in Brno. Besides climatology, he dedicated time to geology. He is the father of two adult kids, a son and a daughter.
Career
In the Czech Hydrometeorological Institute, RNDr Tolasz (doctor of natural sciences) has worked since 1986. He works primarily on climatological data and the management of meteorology.
Hobbies
Besides work, which he named as his #1 hobby, he likes recreational sport activities - skiing in particular - and reading books on history regardless of the epochs. On his blog, he claimed that he tries to speak the literary form of Czech and to avoid expletives, smoking, and alcohol. He also claims to be unusable in the practical life.
What would you like to tell him?
I am not too happy that he is trying to intervene into a discipline he doesn't understand too well. He said that non-economists shouldn't try to intervene into economics. So he inspired me to tell him that non-climatologists shouldn't try to intervene into climatology. Let's hope that I would get away with that.
After years of my experience with men, I would recommend you to praise him immediately afterwards.
That's certainly right. I just wanted to say the same thing: I would praise him for his huge progress since the year 2006 when he began to discuss this topic in the media more frequently. In those times, he was essentially saying that the climate change didn't exist and the men didn't harm Nature - as of today, he's gone well beyond these attitudes. He has learned quite a lot.
Have you read his books on the climate?
One of them.
But he has written two. How do you know that he has made such a huge jump in his climatological expertise?
From the newspapers, magazines, TV. The second book summarizes his previous speeches and presentations on this topic.
Were the president's viewpoints inspiring for you in some respects, or were you just rolling your eyes all the time?
In the Chapters dedicated to environmentalism, I nodded my head in approval. In the Chapter about the climate dynamics, I was turning my head disapprovingly.
We will probably agree that President Klaus is neither stupid nor uneducated - and he is not unable to reach a rational conclusion out of the information available to him. So what mistake is he doing concerning the climate?
He is not able to grasp the climate and climatology in the whole context. Let me simplify the situation a bit: for example, when he overflies the United States and after he returns back, he says that New York was 10 degrees cooler than Los Angeles, which makes it surprising why the climatologists are so excited about the temperature change by 1 degree per century.
Can't you laugh after a good joke? The president has prepared dozens of such provocations in his pocket and he is entertained how you seriously jump on each of them.
I love jokes but the president is not the exact person whom I would accuse of having an excess of jokes. So: if he speaks in this way after he returns from America, it reveals his complete misunderstanding of the climate system and what the very term "climate change" means.
Are his opinions dangerous in some way? Or are they irritating just because they disagree with the majority?
Opinions that don't agree with the majority usually do irritate the people: you're very right. But they can also be dangerous because of his special ability to influence the public - by his charisma etc. He is affecting the public in the direction that the climate change is no problem.
And what's wrong with that? After all, the public is not the decisive factor in the fight against the so-called climate change: it is a political issue. Are we on the same page?
No, we're not. The public will influence the issue exactly because it is a political issue.
Do you really think that when it comes to climatology, European and global leaders will be listening to the public? Please, allow me to smile a bit.
I am an idealist so I think that this should be the case in the context of all disciplines. But you're right: I don't believe it, either.
At that moment, it's completely irrelevant what Václav Klaus is telling the public about the climate: so where could the danger possibly come from? Are there people among the climatologists and meteorologists who are siding with him?
I am convinced that there are. I can't strictly say that they are siding with him because climatologists and meteorologists keep their doubts about the evolution of the climate. They always compute something, predict things, and continue to think whether they haven't forgotten something in the calculation. But the majority of climatologists are standing on the other side than Václav Klaus.
Both sides agree that the climate change exists. One side says that it's nothing to wrestle with because Nature will deal with it Herself. The second group - which you consider to be larger - says that we will stop it. Is it the main difference?
Yes, that's exactly right. One side wants to fight with it, the other side wants to forget about it. And there is also a third group that says that we should adapt to it.
Instead of the fight whose effects are almost unknown to us, shouldn't we really learn how to work, live, and exploit the climate change?
To learn how to live with the climate change, it's exactly the dictum that I subscribe to. But when you say that we should learn how to work with the changes and exploit them - it smells of a desire to take advantage of Nature.
What's wrong with that? People have been taking advantage of Nature from the beginning of time.
That much is right. There's nothing wrong with it. But it's probably not reasonable to twist or bend Nature. For example, people have been bending rivers and dry lakes are among the results. We should feel the difference between using Nature and abusing Nature.
Who can measure the human influence on the climate change and how he does it?
That's exactly one of the things in climatology that can't be computed unequivocally.
Intermezzo: By her eyes
It was the first climatologist whom I met in my life. I was imagining him to be a crazy scientist with an ambition to command the wind and rain. Instead, a likable man came here. He looked so normal that I had to treat him well despite his being a climatologist and despite the moderate hysteria which some of them are helping to grow. Whenever he was talking about Nature, he thawed - the noble word for this sentiment is humility. After the interview, he was unhappy that we didn't talk about the Czech Hydrometeorological Institute where he works and about its funding. He was apparently ready to fight for his company as a lion and that's nice. He asked me to guess how many people the institute employs. Three attempts were not enough for me: the right answer is eight hundred. But all the people only see Ms Taťána Míková on TV - but they don't see all the work we have to do, he complained. I love the people who love their job. Mr Radim Tolasz surely belongs to this group.
So may Václav Klaus, who is promoting doubts about the allegedly dominant influence of the mankind on these processes, be right, after all?
He may be right. On the other hand, the majority opinion of the climatologists and most of the outcomes of their models say that the mankind's effects dominate. However, our problem is that we don't have any labs that could verify such a proposition.
If you're really uncertain about the human contribution to the climate change, aren't the contemporary ambitions of the mostly European politicians to intervene into the climate an example of the efforts you criticized, i.e. efforts to bend Nature?
While we don't know what the contribution is exactly, we know that it is nonzero. And it's good to minimize any negative influence of Man on Nature.
At what costs?
I don't like to "fight against the climate change." But when we already use this term for the movement, one important thing has to be added: we must must calculate whether we will economically benefit from such a fight. And that's not happening today.
So all these international conferences, Kyoto protocols, plans to reduce the emissions of this and that now and then - all of them are swimming on water? Are they economically unjustified?
In this context, I think that the economists haven't reached an agreement yet. Not even a consensus of the majority.
So we're doing something and we're not sure whether we will benefit out of it. So why are we doing it?
Because we are in the state when the climatologists have already said something, politicians have adopted these words as their own, but we must still wait for the economists to calculate this thing.
So the politicians have grabbed this idea without having the relevant economic calculations. I guess that I know why: they love regulation, they love power, they love if they can intervene into anything. They don't need economic calculations if they have this excellent chance to regulate the world. What do you think?
Do you know what is enough for them? They're satisfied if it is a blockbuster in the media. And the fight against the climate change is one of them.
At the table of the European Union, there is a proposal to reduce the greenhouse gas emissions by twenty percent by 2020. Instead of having someone who will tell them: "Have you lost your mind? You don't have any economic calculations for these steps", Mr Martin Bursík, an ex-chairman of the Czech Green Party, is trying to make sure that Klaus won't participate at the Copenhagen climate conference. Are we in a mental asylum?
It's not normal. It really isn't. I think that the economists should accept this challenge and calculate the results.
What would really happen if the world didn't fight against the climate change?
One can't guess because we don't know how the world will behave in the future. I dare to say that if we're going to behave well and normally, Nature will deal with Her state within a few centuries.
So why do we see this hysteria? Can't it be that it's being encouraged not only by the politicians who want to be on TV but also by the business world? There must be many sectors that will be earning huge amounts of money if we jump on this train of hysteria. What do you think?
Business may play some role but in my opinion, it doesn't play a great role. Nevertheless, that's how the business works. Companies were even able to smell that even the Czech Republic might need the anti-malaria drugs, so they're developing them. But we should ask: is it good or bad?
It's good to develop anything, it's bad is to regulate the lives of people because of that. Besides the pharmaceutical companies, who is going to benefit from the fight against the climate change?
In individual sectors, one can find groups that will earn a lot: agriculture, especially the development of new species, engineering, transportation.
And who will be losing the money?
Everyone can lose his money if it will turn out that this whole activity will have been useless. And we can't rule this possibility out. But we should invest into new technologies even without the climate change, shouldn't we?
Václav Klaus may be unable to grasp the climate and climatology in the full context, as you said, but as a non-expert, he seems to end up with very similar conclusions. Where is the real disagreement between you and our president?
I disagree with the way how he oversimplifies things. But otherwise, I think that we agree about most things.
Bonus: Slovakia
By the way, on Saturday, a leading Slovak newspaper Pravda published an interview with Mr Pavel Šťastný, who is essentially the national climatologist of Slovakia.
They discussed the very same topics, including Klaus's viewpoints, and his opinions were pretty much identical to those of Mr Tolasz. Šťastný argued that the recent trends don't say enough to be extrapolated to the future and that Klaus may be right and surely should be debated with.
Hat tip: Alexander Ač
Here is the full translation of this Slovak interview.
The climate is changing, get used to extremes
The climate is still a big unknown, however, we already know something about it, Slovak climatologist Mr Pavel Šťastný (Paul Happy) admits. As the Slovak national expert, he participated at the report of the European Environmental Agency (EEA) about the impact of the climate change upon the old continent. For almost 2.5 years, he has worked in Copenhagen where the world conference about the fight against the climate change will be held in two months.
Slovak climate scientist Mr Pavel Šťastný says that although the recent years have been warmer, we can't deduce an unequivocal trend into the future.
Questions by Mr Vladimír Jancura. We're supposed to talk about global warming. However, in Slovakia, the weather dramatically cooled down a few days ago. The readers are interested whether there will be any gossamer, i.e. "babie/grandma summer".
If we can find some babes, even the babe summer will return (laughter). But seriously, much of it depends on the circulation conditions. Suddenly, a rearrangement of the pressure patterns may bring us the Arctic air, just like it did recently. Such a thing may be repeated in several waves and people may conclude - that's the end of global warming. However, that's not the case.
Your Czech colleagues have calculated that the average temperature in their country has increased by 1.1 °C during the last decade. The situation in Slovakia won't be too different. Does it prove climate change?
The recent years were warmer, indeed. But it is not possible to extrapolate the developments in the most recent decades into the future - it's not right. The climate system is much more complex.
Can the coming years be cooler?
That can't be ruled out, either. The temperature graphs are being affected by many factors. Fluctuations in the circulation of the atmosphere may have effects even in the long run, in the case of a sequence of several subsequent cooler years.
Is any climate change underway at all? Even this question is being disputed...
In the climate science community, we are talking about about the change as well as the variability of the climate at the same moment.
Why?
The variability is a natural process of the change. However, the present climate change is also caused by the human activity - especially the greenhouse gas emissions into the atmosphere. So far, discussions continue about the relative importance of the natural and artificial - i.e. anthropogenic - factors for the changes that are taking place.
Which of them is dominant?
It can't be answered accurately - because of many reasons, but especially because we don't quite know the functioning of the climate system in its entirety. A lot of stuff is waiting to be revealed by science. The issue is not only about the mutual effects of oceans and lands on each other, but also about the effects of the cryosphere i.e. the part of the Earth that is permanently covered by ice. And after all, we need to clarify the influence of extraterrestrial factors, e.g. with the variations of the solar output.
According to Václav Klaus, the number of scientists who doubt the global warming theory is increasing. Do you observe this process?
To some extent, I do. And all of it stems from the uncertainty. No one can unequivocally say how big a part of the change is caused by the human activity and which part is a natural process.
Does it mean that Klaus is right in some sense?
In science, you rarely encounter a straight path from a proposition or a scientific hypothesis to an established insight. The truth is usually being born in a contradiction and an inherent feature of Man is his tendency to have certain doubts. Recall the fate of Galileo's and Copernicus's theories.
So is Klaus's skepticism meaningful for something?
What is meaningful is the whole discussion of the warmers with the doubters, as we call each other. Because of this discussion, people have to focus on the accuracy of their data and weaknesses in arguments are being efficiently identified. At the same moment, it's clear that the mankind will have big problems with the climate change regardless of its origin and that it makes sense to get ready for the new conditions.
Are you personally leaned towards the doubters more than the warmers?
I am standing somewhere in between. I know that both groups are right in some respects but the unequivocal truth can only be achieved by continuing scientific research. This research also gives rise to the new generation of models which will be describing the climate system more faithfully.
Has your group been participating in the arguments about the cause of the climate change?
No, our group has primarily focused on the consequences, but even when we tried to formulate them, we had to struggle with many uncertainties. They have occurred mainly because of the limitations of the available temperature data that only cover the most recent 150 years. Older data can only be obtained indirectly, e.g. from the ice cores.
Let's stop here for a while because the data from the glaciers deserve a special comment.
Yes, they do because the glaciers serve us as a good chronicle of the climate change that goes hundreds of thousands of years into the past. You may compare them to tree rings. Even the layers of the glaciers tell us about the separate years. It means that they have recorded the inter-annual air temperature and precipitation variations, and we can also read the data about the volcano activity, composition of the atmosphere, and the fraction of the greenhouse gases out of them.
What surprises have already been found by this research?
A discovery made by this research is the insight that neither ice ages nor the interglacials have seen any longer "peaceful" period without changes - at least not in the last 800,000 years. Even the interannual variations were substantial. The Greenland data even point to 10-degree inter-annual variations of the air temperature.
How is it possible?
All these phenomena probably arise from the changes in the air circulation patterns above the ocean currents. That's suggested by the episodes of sudden warming or sudden cooling. The former are caused primarily by the inflow of warm ocean water into the Arctic region while the latter is associated with the outpouring of ice sheets into the sea which cooled them down - and therefore cooled the air, too. Within a few years, the weather abruptly warmed up or cooled down and the climate was often stabilizing for a few centuries that followed.
What role has been played by the Gulf Stream?
The ocean circulation has several fragile quasi-stationary states. A small perturbation is enough to switch to another regime - which is a process largely unknown to us. Models are trying to describe it but the findings so far do not indicate that the Gulf Stream should be currently undergoing any significant transformation or that this pattern should even collapse, as the famous U.S. Congress report wanted to claim. No mechanism of such a hypothetical deceleration is even known.
Can we use the language of the glaciers and ice sheets to deduce that the climate change is nothing new under the Sun because they get repeated after some time?
Yes. However, the information obtained by science brings several new question marks. For example: according to the global warming theory, the air temperature increases with the increasing concentration of the carbon dioxide (CO2). However, the ice core data imply the opposite sequence of events - first, the air temperature went up, and then the fraction of CO2 was increasing. A topic of the present research is where the CO2 had been stored before that.
Because so many questions seem to be unanswered so far, was it possible in your expert group to agree about the main consequences of the climate change at all?
We were able to concretely formulate these effects in the cases that can be accurately measured. That is primarily the case of the atmosphere and the hydrosphere. After all, all impacts of the increasing temperature - and, partially, of the fluctuating precipitation figures may be observed even on the Slovak territory.
However, can't the process of warming be spontaneously reverted if it were caused mostly by the natural factors?
The climate system contains lots of feedbacks. For example, in the case of the Arctic ice, it's true that the less ice there is, the more the air temperature increases, and consequently, the faster the loss of ice becomes. The countries near the Arctic circle have already established forums where they gather and, independently of other research activities, solve the consequences of the climate change.
What are they worried most of all?
A larger reduction of the Greenland ice and sea ice as well as the general warming of the Arctic region which may thaw the so-called permafrost, permanently frozen soil.
Some people might be happy about it...
Sure because new possibilities to obtain oil and to transport oil and gas through the Arctic region could emerge. Our Norwegian colleagues were praising the longer summers that allowed them to scythe the grass twice, not just once. However, the permafrost has also its indisputable advantages: it supports the airports and roads, the whole infrastructure. If it were thawing, the infrastructure would be getting damaged and new expenses would be needed to rebuild it. And we're not even speaking about the methane that could be released by the thawing permafrost: it's an even more aggressive greenhouse gas than the carbon dioxide.
And would the sea level rise?
It's rising even today, although the melting ice sheets are not essential in this process, at least not so far. However, the projections for the following century predict a rise by 40-60 centimeters. In combination with tidal waves and tropical storms, it may bring some places a genuine catastrophe.
Are the Dutchmen clever when they are looking for alternative housing in Slovakia right now?
Quite in general, the Dutchmen are a foresightful and resourceful nation. Since the Middle Ages, they have been extending their living space at the expense of the sea. And today, they have one of the most sophisticated systems of arrangements designed to adapt to the climate change.
Can we feel more secure here in Slovakia?
Even in Slovakia, we observe decreasing precipitation, especially in the South: the landscape is getting drier. We're lucky that we have the Danube whose flow rate is pretty constant and that is continuously refilling underground sources of water in Western Slovakia. However, the underground waters in the rest of the Southern Slovakia are vulnerable, and whatever viewpoint we choose, we will probably need to transfer some water from the North to the South, and from the West to the Center.
How? Hopefully not by bending the river basins?
Don't worry, no. Instead, the recipe are new dams although they are not popular. But look at Spain which leads Europe in the number of dams. In one word, there's sometimes no other solution.
Is Slovakia threatened by more frequent weather extremes?
As the temperature increases, we are likely to see more frequent droughts as well as more frequent intense thunderstorms with torrential rain. In the winters, the amount of snow may decrease which could harm the tourist industry.
Albert Einstein used to claim that he didn't know anything more complicated than the climate system. That may be the reason why it's so hard to forecast the weather. Doesn't a person who studies it for his whole life sometimes fall into depression or the feeling of futility?
I know some people in the forecasting industry who are more successful than their colleagues. Besides the models, they build on their experience and intuition. The forces in the atmosphere are sometimes in such a balance and they hover near the edge, and your "sixth sense" is therefore often deciding whether you correctly guess which side these forces choose.
RNDr Pavel Šťastný, CSc (57)
Slovak climatologist. After his studies at the Comenius University in Bratislava, he started to work at the Slovak Hydrometeorological Institute in Bratislava where he remained up to these days. He is a co-author of multiple national reports about the climate change in Slovakia. As the national expert, he represented Slovakia during the preparation of the second report of the European Environmental Agency (EEA) about the impacts of the climate change in Europe. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 1, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.36712467670440674, "perplexity": 1284.0191692107521}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987781397.63/warc/CC-MAIN-20191021171509-20191021195009-00394.warc.gz"} |
http://biomechanical.asmedigitalcollection.asme.org/article.aspx?articleid=1475777 | 0
Research Papers
# A Nonlinear Constituent Based Viscoelastic Model for Articular Cartilage and Analysis of Tissue Remodeling Due to Altered Glycosaminoglycan-Collagen Interactions
[+] Author and Article Information
Gregory C. Thomas
Department of Mechanical Engineering, California Polytechnic State University, San Luis Obispo, CA 93407
Anna Asanbaeva, Robert L. Sah
Department of Bioengineering, University of California-San Diego, La Jolla, CA 92093
Pasquale Vena
Department of Structural Engineering, Laboratory of Biological Structure Mechanics, Politecnico di Milano, 20133, Milan, Italy
Stephen M. Klisch1
Department of Mechanical Engineering, California Polytechnic State University, San Luis Obispo, CA [email protected]
These differences are discussed in more detail in Secs. 2,4.
These assumptions are discussed further in Sec. 4.
In Eq. 4, stresses are VE stresses; a superscript $e$ will be used to designate elastic stresses.
Equation numbers preceded by “A” and “B” refer to those in Appendices .
VE models usually include a term for strain rate (i.e., $dE/dt$) inside the convolution integral to account for the dependence on strain rate. As stress is proportional to strain, the dependence on strain rate can also be achieved with a stress rate term $dS/dt$(23).
Note that as $t→∞$, $S(t)$ is the equilibrium (elastic) stress $Se(0)+ΔSe$.
Note that relative to a zero stress-zero strain configuration, $R$ defined by Eq. 19 is strain independent, which is also a characteristic of quasilinear viscoelasticity.
The derivation is nearly identical to that in Ref. 23 and the reader is referred to that paper for full details.
This assumption is discussed further in Sec. 4.
Equation 25 defines a viscous material constant that is independent of strain, decoupling elastic and viscous properties and is preferable to Eq. 24, which couples elastic and viscous properties, for statistical analysis of COL viscous properties.
For GD-85 specimens, the COL VE parameters ($τ1COL$, $g1COL$) were independent of initial guesses.
Also, our own pilot simulations using a poroviscoelastic model (results of which are not presented) justified the assumption that fluid flow-dependent viscoelasticity can be neglected for out UT protocols.
It can be seen from Eq. 8 that when a COL fiber direction is not stretched in tension, it is “turned off” and does not contribute to $SeBIM$.
1
Corresponding author.
J Biomech Eng 131(10), 101002 (Sep 01, 2009) (11 pages) doi:10.1115/1.3192139 History: Received November 15, 2008; Revised June 03, 2009; Published September 01, 2009
## Abstract
A constituent based nonlinear viscoelastic (VE) model was modified from a previous study (Vena, , 2006, “A Constituent-Based Model for the Nonlinear Viscoelastic Behavior of Ligaments ,” J. Biomech. Eng., 128, pp. 449–457) to incorporate a glycosaminoglycan (GAG)-collagen (COL) stress balance using compressible elastic stress constitutive equations specific to articular cartilage (AC). For uniaxial loading of a mixture of quasilinear VE constituents, time constant and relaxation ratio equations are derived to highlight how a mixture of constituents with distinct quasilinear VE properties is one mechanism that produces a nonlinear VE tissue. Uniaxial tension experiments were performed with newborn bovine AC specimens before and after $∼55%$ and $∼85%$ GAG depletion treatment with guanidine. Experimental tissue VE parameters were calculated directly from stress relaxation data, while intrinsic COL VE parameters were calculated by curve fitting the data with the nonlinear VE model with intrinsic GAG viscoelasticity neglected. Select tissue and intrinsic COL VE parameters were significantly different from control and experimental groups and correlated with GAG content, suggesting that GAG-COL interactions exist to modulate tissue and COL mechanical properties. Comparison of the results from this and other studies that subjected more mature AC tissue to GAG depletion treatment suggests that the GAGs interact with the COL network in a manner that may be beneficial for rapid volumetric expansion during developmental growth while protecting cells from excessive matrix strains. Furthermore, the underlying GAG-COL interactions appear to diminish as the tissue matures, indicating a distinctive remodeling response during developmental growth.
<>
## Figures
Figure 1
The stress balance hypothesis. The GAG and COL constituents have their own reference configurations, κ0GAG and κ0COL. The GAG constituent has the same configuration in κ0P and κ0, which is equivalent to F0GAG=I and SeGAG(0)=−α1I. To balance this swelling stress, the COL network supports a tensile prestress produced by an initial COL deformation gradient tensor F0COL, which yields the initial collagen stress tensor SeCOL(0)=α1I. After a deformation F is applied, the constituent stresses are calculated relative to their respective reference configurations and using FGAG=FF0GAG and FCOL=FF0COL.
Figure 2
Stress response to a step increase in strain and, consequently, a step increase in elastic stress ΔSe at time tstep>0 with initial equilibrium elastic stress Se(0)
Figure 3
The effects of GAG depletion treatment on experimental tissue VE parameters (Eexp, τexp, and Rexp): mean+1 standard deviation values shown; GD-0 is the control group with no GAG depletion; GD-55 and GD-85 are experimental groups with ∼55% and 85% GAG depletion, respectively; ∗ is the significant difference between experimental and control group values and ∗∗ is the significant difference between experimental group values (ANOVA with posthoc Tukey testing p<0.05)
Figure 4
Experimental tissue VE parameters (Eexp, τexp, and Rexp) versus GAG and COL contents: GD-0 is the control group with no GAG depletion; GD-55 and GD-85 are experimental groups with ∼55% and 85% GAG depletion, respectively. The linear regression results were only shown for significant correlations (t-test analysis of regression slope, p<0.05).
Figure 5
Specimen-specific curve-fits of the constituent based VE model: GD-0 is the group with no GAG depletion; GD-55 and GD-85 are experimental groups with ∼55% and 85% GAG depletion, respectively.
Figure 6
The effects of GAG depletion treatment on COL VE parameters (γ1, τ1COL, g1COL, τ2COL, g2COL, τACOL, and RACOL); mean+1 standard deviation values were shown; GD-0 is the control group with no GAG depletion; GD-55 and GD-85 are experimental groups with ∼55% and 85% GAG depletion, respectively; τ2COL and g2COL values were not reported for GD-85 specimens because only one Prony series term was used in the COL relaxation function for that group. For γ1, τACOL, and RACOL: ∗ is the significant difference between experimental and control group values and ∗∗ is the significant difference between experimental group values (ANOVA with posthoc Tukey testing p<0.05). For τ1COL, g1COL, τ2COL, and g2COL: ∗ is the significant difference between GD-0 and GD-55 group values (paired t-test p<0.05).
Figure 7
COL VE parameters (γ1, τ1COL, g1COL, τ2COL, g2COL, τACOL, and RACOL) versus GAG and COL contents: GD-0 is the control group with no GAG depletion; GD-55 and GD-85 are experimental groups with ∼55% and 85% GAG depletion, respectively. The linear regression results were only shown for significant correlations (t-test analysis of regression slope p<0.05).
Figure 8
The parameter study results were shown to differentiate between the different mechanisms arising from GAG-COL interactions on the experimental tissue VE response: absolute (top) and normalized (bottom) stress results for UT simulations with progressive changes in untreated (GD-0) group parameters due to treatment (GD-55, GD-85); parameters used are listed in Table 1. The stress-time curves from the first three simulations for each treatment were indistinguishable in the normalized stress plots. GAG and COL elastic parameters modulate the peak and equilibrium stresses (top) but not the relaxation behavior (bottom). COL viscous parameters modulate peak and equilibrium stresses (top) and relaxation behavior (bottom).
## Discussions
Some tools below are only available to our subscribers or users with an online account.
### Related Content
Customize your page view by dragging and repositioning the boxes below.
Topic Collections | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 12, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5501934289932251, "perplexity": 7753.087868861697}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121752.57/warc/CC-MAIN-20170423031201-00291-ip-10-145-167-34.ec2.internal.warc.gz"} |
https://proceedings.mlr.press/v108/azizian20a.html | # Accelerating Smooth Games by Manipulating Spectral Shapes
Waïss Azizian, Damien Scieur, Ioannis Mitliagkas, Simon Lacoste-Julien, Gauthier Gidel
Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, PMLR 108:1705-1715, 2020.
#### Abstract
We use matrix iteration theory to characterize acceleration in smooth games. We define the spectral shape of a family of games as the set containing all eigenvalues of the Jacobians of standard gradient dynamics in the family. Shapes restricted to the real line represent well-understood classes of problems, like minimization. Shapes spanning the complex plane capture the added numerical challenges in solving smooth games. In this framework, we describe gradient-based methods, such as extragradient, as transformations on the spectral shape. Using this perspective, we propose an optimal algorithm for bilinear games. For smooth and strongly monotone operators, we identify a continuum between convex minimization, where acceleration is possible using Polyak’s momentum, and the worst case where gradient descent is optimal. Finally, going beyond first-order methods, we propose an accelerated version of consensus optimization. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8259731531143188, "perplexity": 727.2260055699852}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00124.warc.gz"} |
https://brilliant.org/problems/without-using-lhopitals-rule-1/ | # Without using l'hopital's rule 1
Calculus Level 1
$\large \lim_{x\to0} \dfrac{1-\cos x}x = \ ?$
Bonus: Solve this question without using L'Hôpital's rule.
× | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9993969202041626, "perplexity": 4697.390763057264}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00043.warc.gz"} |
http://mathhelpforum.com/calculus/98151-nth-derivative-function.html | # Math Help - nth derivative of a function
1. ## nth derivative of a function
I need to find that $n^{th}$ derivative of the function $f(x)=\frac{1}{(2-x)^2}$. I'm not really sure how to proceed. I wrote down a few derivatives, but I can't find a pattern. Is their a general method or formula for $n^{th}$ derivatives? Thanks.
I need to find that $n^{th}$ derivative of the function $f(x)=\frac{1}{(2-x)^2}$. I'm not really sure how to proceed. I wrote down a few derivatives, but I can't find a pattern. Is their a general method or formula for $n^{th}$ derivatives? Thanks.
$f^{\prime}(x)=\frac{2}{(2-x)^3}$
$f^{\prime\prime}(x)=\frac{6}{(2-x)^4}$
$f^{\prime\prime\prime}(x)=\frac{24}{(2-x)^5}$
...
So it follows that $f^{(n)}(x)=\frac{(n+1)!}{(2-x)^{n+2}}$.
3. Originally Posted by skeeter
Chris forgot a (-1) factor ... easy fix.
$f^{\prime}(x)=\frac{-2}{(2-x)^3}$
$f^{\prime\prime}(x)=\frac{6}{(2-x)^4}$
$f^{\prime\prime\prime}(x)=\frac{-24}{(2-x)^5}$
...
$f^{(n)}(x)=\frac{(-1)^n(n+1)!}{(2-x)^{n+2}}$.
Don't forget to chain the denominator! $\frac{\,d}{\,dx}(2-x)=-1$! Hence, all the negatives are cancelled!
So
$f^{\prime}(x)=\frac{-2}{(2-x)^3}(-1)=\frac{2}{(2-x)^3}$
$f^{\prime}(x)=\frac{-6}{(2-x)^{4}}(-1)=\frac{6}{(2-x)^4}$
etc...
4. my error ... sorry.
5. Originally Posted by skeeter
my error ... sorry.
However, I see your point since $(2-x)^2=(x-2)^2$...
If we rewrote the function as $f(x)=\frac{1}{(x-2)^2}$, then you would be correct....
6. Originally Posted by Chris L T521
However, I see your point since $(2-x)^2=(x-2)^2$...
If we rewrote the function as $f(x)=\frac{1}{(x-2)^2}$, then you would be correct....
Ok, that's why I was having difficulty find a pattern. I didn't notice $(2-x)^2=(x-2)^2$.
Ok, that's why I was having difficulty find a pattern. I didn't notice $(2-x)^2=(x-2)^2$.
It would also make this easier to recognize that $f(x)= \frac{1}{(2-x)^2}= \frac{1}{(x-2)^2}= (x- 2)^{-2}$.
$f'(x)= -2(x-2)^{-3}$
$f"(x)= 6(x-2)^{-4}= (-1)^2(2+1)!)(x-2)^{-(2+2)}$
$f"'(x)= -12(x-2)^{-5}= (-1)^3(3+1)!)(x-2)^{-(3+2)}$
$f""(x)= 60(x-2)^{-6}= (-1)^4(4+1)!(x-2)^{-(4+2)}$ | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 28, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9158022999763489, "perplexity": 399.5466451937401}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246644200.21/warc/CC-MAIN-20150417045724-00236-ip-10-235-10-82.ec2.internal.warc.gz"} |
https://arxiv.org/abs/hep-ph/0604120 | hep-ph
(what is this?)
(what is this?)
# Title: Les Houches Physics at TeV Colliders 2005, Standard Model and Higgs working group: Summary report
Authors: C.Buttar, S.Dittmaier, V.Drollinger, S.Frixione, A.Nikitenko, S.Willenbrock S.Abdullin, E.Accomando, D.Acosta, A.Arbuzov, R.D.Ball, A.Ballestrero, P.Bartalini, U.Baur, A.Belhouari, S.Belov, A.Belyaev, D.Benedetti, T.Binoth, S.Bolognesi, S.Bondarenko, E.E.Boos, F.Boudjema, A.Bredenstein, V.E.Bunichev, C.Buttar, J.M.Campbell, C.Carloni Calame, S.Catani, R.Cavanaugh, M.Ciccolini, J.Collins, A.M.Cooper-Sarkar, G.Corcella, S.Cucciarelli, G.Davatz, V.DelDuca, A.Denner, J.D'Hondt, S.Dittmaier, V.Drollinger, A.Drozdetskiy, L.V.Dudko, M.Duehrssen, R.Frazier, S.Frixione, J.Fujimoto, S.Gascon-Shotkin, T.Gehrmann, A.Gehrmann-De Ridder, A.Giammanco, A.-S.Giolo-Nicollerat, E.W.N.Glover, R.M.Godbole, A.Grau, M.Grazzini, J.-Ph.Guillet, A.Gusev, R.Harlander, R.Hegde, G.Heinrich, J.Heyninck, J.Huston, et al. (64 additional authors not shown)
Abstract: This Report summarises the activities of the "SM and Higgs" working group for the Workshop "Physics at TeV Colliders", Les Houches, France, 2-20 May, 2005. On the one hand, we performed a variety of experimental and theoretical studies on standard candles (such as W, Z, and ttbar production), treating them either as proper signals of known physics, or as backgrounds to unknown physics; we also addressed issues relevant to those non-perturbative or semi-perturbative ingredients, such as Parton Density Functions and Underlying Events, whose understanding will be crucial for a proper simulation of the actual events taking place in the detectors. On the other hand, several channels for the production of the Higgs, or involving the Higgs, have been considered in some detail. The report is structured into four main parts. The first one deals with Standard Model physics, except the Higgs. A variety of arguments are treated here, from full simulation of processes constituting a background to Higgs production, to studies of uncertainties due to PDFs and to extrapolations of models for underlying events, from small-$x$ issues to electroweak corrections which may play a role in vector boson physics. The second part of the report treats Higgs physics from the point of view of the signal. In the third part, reviews are presented on the current status of multi-leg, next-to-leading order and of next-to-next-to-leading order QCD computations. Finally, the fourth part deals with the use of Monte Carlos for simulation of LHC physics.
Comments: 234 pages, 173 figures. Web page of the workshop (with links to the talks): this http URL Subjects: High Energy Physics - Phenomenology (hep-ph) Cite as: arXiv:hep-ph/0604120 (or arXiv:hep-ph/0604120v1 for this version)
## Submission history
From: Fawzi Boudjema [view email]
[v1] Thu, 13 Apr 2006 14:53:53 GMT (2355kb) | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.760865330696106, "perplexity": 11928.364633172567}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589573.27/warc/CC-MAIN-20180717051134-20180717071134-00186.warc.gz"} |
http://alekskleyn.blogspot.com/2011_01_01_archive.html | Friday, January 21, 2011
Representation of Universal Algebra
I published my new book: Representation Theory: Representation of Universal Algebra. In this book I consider morphism of representation, consept of generating set and basis of representation. This allows me to consider basis manifold of representation, active and passive transformations, concept of geometrical object in representation of universal algebra. Similar way I consider tower of representations. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9946915507316589, "perplexity": 1279.8200575413734}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609837.56/warc/CC-MAIN-20170528141209-20170528161209-00070.warc.gz"} |
https://www.expii.com/t/inverse-powers-and-radical-functions-4938 | Expii
# Inverse Powers and Radical Functions - Expii
The inverse of a power function of exponent n is a nth root radical function. For example, the inverse of y = 10x^2 is y = √(x/10) (at least for positive values of x and y). | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9374158978462219, "perplexity": 656.0119366039182}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00374.warc.gz"} |
http://www.gradesaver.com/we/q-and-a/how-can-the-one-state-gazette-be-cured-115683 | # How can the One State Gazette be cured?
One State Gazette thought that machines were perfect and people weren't. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9154815077781677, "perplexity": 15124.110157939058}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822992.27/warc/CC-MAIN-20171018142658-20171018162658-00023.warc.gz"} |
https://adityam.github.io/context-blog/post/correct-math-escape-in-t-vim/ | # Correct math escape in t-vim
Posted on July 22, 2017
There is a feature in t-vim module that allows the use of TeX code in comments, which is useful when typeset math in comments. For example:
\definevimtyping[C][syntax=c, escape=on]
\startC
/* The following function computes the roots of \m{ax^2+bx+c=0}
* using the determinant \m{\Delta=\frac{-b\pm\sqrt{b^2-2ac}}{2a}}
*/
double root (double a, double b, double c) {....}
\stopC
The escape=on option activates this feature. Only \, {, and } have their usual meaning inside the Comment region, so I use \m{...} to enter math mode. The above code get typeset as:
Gerion Entrup reported on the context mailing list that the spacing inside the math mode is not always correct. The incorrect behavior is not visit in the above example, because there was no blank space inside the math mode. As soon as we add space in the math mode, the output is too spaced out. For example,
\definevimtyping[C][syntax=c, escape=on]
\startC
/* The following function computes the roots of \m{ax^2 + bx + c = 0}
* using the determinant \m{\Delta = \frac{-b \pm \sqrt{b^2 - 2ac}}{2a}}
*/
double root (double a, double b, double c) {....}
\stopC
Spacing inside math mode should not affect the output. What is happening here? After a bit of sleuthing, I found the culprit.
As I had ranted in an old blog post, I want syntax highlighting programs to generate clean TeX output. Therefore, I do not escape space and newline characters. After all, it is easy enough to tell ConTeXt to honor spaces and newlines by using \obeyspaces and \obeylines. By themselves, \obeyspaces and \obeylines are okay.
\bgroup
\obeylines\obeyspaces\tttf
The following function computes the roots of \m{ax^2 + bx + c = 0}
using the determinant \m{\Delta = \frac{-b \pm \sqrt{b^2 - 2ac}}{2a}}
\egroup
In t-vim, I wanted to control how to wrap long lines. The default option is not to do anything and let the user figure out how to wrap the source code. There is also an option to split a long line at a space. (For other options on splitting long lines, see the documentation).
To control whether a long line should be split at a space or not, I redefined \obeyedspace. For those who are not familiar with ConTeXt internals, whenever \obeyspaces is active, space is mapped to \obeyedspace. This makes it possible, for example, to visualize spaces. For example,
\bgroup
\obeylines\obeyspaces\tttf\def\obeyedspace{-}
The following function computes the roots
\egroup
So, to allow a line to break at a space, I use
\def\obeyedspace{\hskip\interwordspace\relax}
and to prevent lines from breaking at a space, I use
\def\obeyedspace{\kern\interwordspace\relax}
However, this definition creates a wreck inside math mode.
\bgroup
\obeylines\obeyspaces\tttf
\def\obeyedspace{\hskip\interwordspace\relax}
The following function computes the roots of \m{ax^2 + bx + c = 0}
using the determinant \m{\Delta = \frac{-b \pm \sqrt{b^2 - 2ac}}{2a}}
\egroup
Now, that we know what is going on, it is an easy fix (suggested by Henri Menke). Define \obeyedspace to
\def\obeyedspace{\mathortext\normalspace{\hskip\interwordspace\relax}}
Let’s test this.
\bgroup
\obeylines\obeyspaces\tttf
\def\obeyedspace{\mathortext\normalspace{\hskip\interwordspace\relax}}
The following function computes the roots of \m{ax^2 + bx + c = 0}
using the determinant \m{\Delta = \frac{-b \pm \sqrt{b^2 - 2ac}}{2a}}
\egroup
This bug has been fixed in t-vim version 2017.07.29
This entry was posted in Formatting and tagged t-vim, math, horizontal spacing, code formatting. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9370803833007812, "perplexity": 1899.934953978574}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159561.37/warc/CC-MAIN-20180923153915-20180923174315-00119.warc.gz"} |
https://www.physicsforums.com/threads/vectors-problem.50088/ | # Vectors problem
1. Oct 28, 2004
### Chen
It's given that vector c is perpendicular to both vectors a and b. Which of the following is true:
1) http://phstudy.technion.ac.il/~wn114071/physweb/question/1_4_01.gif [Broken]
(a x b) x c
2) http://phstudy.technion.ac.il/~wn114071/physweb/question/1_4_02.gif [Broken]
(a x c) dot b
3) http://phstudy.technion.ac.il/~wn114071/physweb/question/1_4_03.gif [Broken]
(a x c) x b
4) http://phstudy.technion.ac.il/~wn114071/physweb/question/1_4_04.gif [Broken]
(a x b) dot c
Can someone please just confirm the answer is (1) because I have only one attempt left at submitting an answer for this question.
Thanks
Last edited by a moderator: May 1, 2017
2. Oct 28, 2004
### Galileo
I can't open the files. You need authorization for that...
3. Oct 28, 2004
### Chen
I knew that might happen, so I wrote the expression in each link below. (1) is (a x b) x c, i.e (a cross b) cross c.
Thanks.
4. Oct 28, 2004
### Tom Mattson
Staff Emeritus
It's impossible to say which one is true, because those are all expressions, not equations.
5. Oct 28, 2004
### BobG
Answers 2 and 4 give you a scalar number. The absolute value is the same for both, but the sign changes.
Answer 1 gives you a null vector (all components equal to 0) since the cross product of A and B is either in the same direction as C or the exact opposite direction of C.
Answer 3 gives you a vector.
Similar Discussions: Vectors problem | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9034833312034607, "perplexity": 2358.2228107464803}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110792.29/warc/CC-MAIN-20170822143101-20170822163101-00086.warc.gz"} |
https://rupress.org/jcb/article-standard/68/2/304/18626/Immunoferritin-determination-of-the-distribution | The distribution of (Na+ + K+) ATPase over the plasma membranes of the proximal convoluted tubule from canine renal cortex has been determined. Ultrathin frozen sections of this tissue were stained with rabbit antibodies to this enzyme and ferritin-conjugated goat antirabbit gamma-globulin. It is demonstrated that high concentrations of this enzyme uniformly line the intercellular spaces of this epithelium. The consequences of this observation are discussed in terms of the low resistant tight junctions of these tubules and the isotonic fluid transport which they support. Furthermore, antibodies to (Na+ + K+) ATPase recognize an antigen on the luminal surfaces of the tubules within the brush border. It is proposed that the enzyme is present in this region of the plasma membrane as well, although at much lower concentration. To further substantiate this conclusion, a brush border fraction has been purified from rabbit kidney and been shown to contain significant (Na+ + K+) ATPase. These results contradict earlier conclusions about the location of (Na+ + K+) ATPase in this tissue.
This content is only available as a PDF. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9196408987045288, "perplexity": 6276.347063650488}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057119.85/warc/CC-MAIN-20210920221430-20210921011430-00589.warc.gz"} |
https://math.stackexchange.com/questions/3271095/convergence-speed-of-discrete-approximation | # Convergence speed of discrete approximation
Here I asked the question about approximating the function $$g(x) := \mathbb{E}(f(x,Y))$$, where $$x \in R$$ and $$Y$$ is a random variable. If you follow the link you will see that $$g(x)$$ can be approximated by finite sum $$\frac{1}{n}\sum_{i=1}^nf(x,\mu_i)$$ with any precision we desire.
My question: whats is the speed of the convergence? Can we deduce how large $$n$$ should be to make error $$\leq \epsilon$$
Feel free to impose any reasonable conditions on $$f$$ and distribution of $$Y$$
• Are you looking for something on the lines on concentration inequalities? – sudeep5221 Jul 6 at 13:38
• @sudeep5221, I am looking for anything that could tell me how good my discrete approximation is – Markoff Chainz Jul 6 at 14:31 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 9, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5975862741470337, "perplexity": 247.29767737449228}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540545146.75/warc/CC-MAIN-20191212181310-20191212205310-00370.warc.gz"} |
http://www.computer.org/csdl/trans/tc/1992/09/t1176-abs.html | Subscribe
Issue No.09 - September (1992 vol.41)
pp: 1176-1180
ABSTRACT
<p>An algorithm for exact parametric analysis of stochastic Petri nets is presented. The algorithm is derived from the theory of decomposition and aggregation of Markov chains. The transition rate of interest is confined into a diagonal submatrix of the associated Markov chain by row and column permutations. Every time a new value is assigned to the transition, a smaller Markov chain is analyzed. As a result, the computational cost is greatly reduced.</p>
INDEX TERMS
row permutations; stochastic Petri nets; exact parametric analysis; decomposition; aggregation; Markov chains; transition rate of interest; diagonal submatrix; column permutations; Markov processes; matrix algebra; Petri nets.
CITATION
M. Li, N.D. Georganas, "Exact Parametric Analysis of Stochastic Petri Nets", IEEE Transactions on Computers, vol.41, no. 9, pp. 1176-1180, September 1992, doi:10.1109/12.165403 | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9348911643028259, "perplexity": 2467.899357362971}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097204.8/warc/CC-MAIN-20150627031817-00009-ip-10-179-60-89.ec2.internal.warc.gz"} |
https://www.physicsforums.com/threads/chargedistribution-from-a-given-potential.329973/ | # Chargedistribution from a given potential
1. Aug 10, 2009
### eXorikos
The following potential is given
The question is what the charge distribution is. The middle part is a charged dielectric. The two discontinuous points are the result of a charge accumulated in one point. And after that point the potential doesn't vary. So my thoughts are that the physical situation is a charged dielectric between two charged plated, with the charges of the dielectric oposite to the charge on the plate it faces.
I think I'm right so far. But now I want to calculate the charge distribution. The hint was to use delta-function and I can see why, but I don't know how. Can any of you help me?
PS: My paint skills suck, but I hope it's clear that the middle parabolic and the left potential is higher than the right one.
2. Aug 10, 2009
### Bob_for_short
Use the equation ∆φ ~ ρ. In a 1D case the second derivative of your potential will give the charge density.
3. Aug 10, 2009
### eXorikos
But what is the equation for such a potential?
4. Aug 10, 2009
### Bob_for_short
Sorry, I should have written it as ρ ~ ∆φ (Gauss law) or ρ(x) ~ (d²/dx²)φ(x) in your case.
ρ is a charge density and φ is the electrostatic potential. Depending on units, the equation may contain 4π, etc.
5. Aug 10, 2009
### eXorikos
I know how to solve a laplacian, but I can't find the equation for the potential.
6. Aug 10, 2009
### Bob_for_short
The equation is the following: ρ(x) ~ (d²/dx²)φ(x) in your case. All you have to do is to differentiate twice your potential given in your figure.
7. Aug 10, 2009
### eXorikos
I know all that. I've studied my book (Introduction to Electrodynamics), but I need the equation for the potential. That's my problem...
8. Aug 10, 2009
### Bob_for_short
You mean an analytical formula for your curve in the figure? Approximate it with something differentiable and you will obtain an approximate charge density.
The differential equation for a potential is the Gauss law ∆φ ~ ρ.
If the charge density ρ is given, you have to integrate this differential equation to find the potential φ.
If the potential φ is given, you have to differentiate it to find the density ρ.
Similar Discussions: Chargedistribution from a given potential | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9577791094779968, "perplexity": 924.4879406167271}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825399.73/warc/CC-MAIN-20171022165927-20171022185927-00642.warc.gz"} |
https://baylor-ir.tdl.org/baylor-ir/browse?value=Dugas%2C+Manfred.&type=author | Now showing items 1-3 of 3
• #### Finitary incidence algebras.
(, 2014-06-11)
Let P be an arbitrary partially ordered set and I(P) its incidence space. Then F(P) is the finitary incidence algebra and I(P) is a bimodule over it. Consequently we can form D(P) = FI(P) ⊕ I(P) the idealization of I(P). ...
• #### On a ring associated to F[x].
(, 2013-09-24)
For a field F and the polynomial ring F [x] in a single indeterminate, we define Ḟ [x] = {α ∈ End_F(F [x]) : α(ƒ) ∈ ƒF [x] for all ƒ ∈ F [x]}. Then Ḟ [x] is naturally isomorphic to F [x] if and only if F is infinite. If F ...
• #### On rings with distinguished ideals and their modules.
(2007-05-23)
Let S be an integral domain, R an S algebra, and F a family of left ideals of R. Define End(R, F) = {φ ∈ End(R+) : φ(X ) ⊆ X for all X ∈ F }. In 1967, H. Zassenhaus proved that if R is a ring such that R+ is free of finite ... | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8294748067855835, "perplexity": 3498.848047146957}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719843.44/warc/CC-MAIN-20161020183839-00504-ip-10-171-6-4.ec2.internal.warc.gz"} |
https://pingpdf.com/pdf-nerve-impulse-research-omics-group-omics-international.html | # Nerve impulse - Research OMICS Group - OMICS International
Loading...
Search Search
Go Search
Log in
Journals Conferences Frequent Links Waste Management Top Open Access Journals on Malignant MelanomaOpen Access Nanomaterials ArticlesEnvironmental Impact AssessmentPeer-review Nutrition Value JournalsInflammatory markers Open Access JournalsBaby ScalesEndodonticsRheumatoid Arthritis Online JournalsEvolutionary Biology review journalFinancial Analysis Medical malpractice Scholarly Peer-review JournalLaw-review-journalsClinical toxicology reviewsTissue biomarker journals
Open Access Articles- Top Results for Nerve impulse
Action potential Unknown extension tag "indicator" In physiology, an action potential is a short-lasting event in which the electrical membrane potential of a cell rapidly rises and falls, following a consistent trajectory. Action potentials occur in several types of animal cells, called excitable cells, which include neurons, muscle cells, and endocrine cells, as well as in some plant cells. In neurons, they play a central role in cell-to-cell communication. In other types of cells, their main function is to activate intracellular processes. In muscle cells, for example, an action potential is the first step in the chain of events leading to contraction. In beta cells of the pancreas, they provoke release of insulin.[lower-alpha 1] Action potentials in neurons are also known as "nerve impulses" or "spikes", and the temporal sequence of action potentials generated by a neuron is called its "spike train". A neuron that emits an action potential is often said to "fire". Action potentials are generated by special types of voltage-gated ion channels embedded in a cell's plasma membrane.[lower-alpha 2] These channels are shut when the membrane potential is near the resting potential of the cell, but they rapidly begin to open if the membrane potential increases to a precisely defined threshold value. When the channels open (in response to depolarization in transmembrane voltage[lower-alpha 2]), they allow an inward flow of sodium ions, which changes the electrochemical gradient, which in turn produces a further rise in the membrane potential. This then causes more channels to open, producing a greater electric current across the cell membrane, and so on. The process proceeds explosively until all of the available ion channels are open, resulting in a large upswing in the membrane potential. The rapid influx of sodium ions causes the polarity of the plasma membrane to reverse, and the ion channels then rapidly inactivate. As the sodium channels close, sodium ions can no longer enter the neuron, and then they are actively transported back out of the plasma membrane. Potassium channels are then activated, and there is an outward current of potassium ions, returning the electrochemical gradient to the resting state. After an action potential has occurred, there is a transient negative shift, called the afterhyperpolarization or refractory period, due to additional potassium currents. This is the mechanism that prevents an action potential from traveling back the way it just came. In animal cells, there are two primary types of action potentials. One type is generated by voltage-gated sodium channels, the other by voltage-gated calcium channels. Sodium-based action potentials usually last for under one millisecond, whereas calcium-based action potentials may last for 100 milliseconds or longer. In some types of neurons, slow calcium spikes provide the driving force for a long burst of rapidly emitted sodium spikes. In cardiac muscle cells, on the other hand, an initial fast sodium spike provides a "primer" to provoke the rapid onset of a calcium spike, which then produces muscle contraction.
Contents
File:Action Potential.gif As an action potential travels down the axon, there is a change in polarity across the membrane. The Na+ and K+ gated ion channels open and close as the membrane reaches the threshold potential, in response to a signal from another neuron. At the beginning of the action potential, the Na+ channels open and Na+ moves into the axon, causing depolarization. Repolarization occurs when the K+ channels open and K+ moves out of the axon. This creates a change in polarity between the outside of the cell and the inside. The impulse travels down the axon in one direction only, to the axon terminal where it signals other neurons.
1 Overview 1.1 Function 1.2 Process in a typical neuron 2 Biophysical basis 3 Neurotransmission 3.1 Anatomy of a neuron 3.2 Initiation 3.3 Dynamics 3.4 "All-or-none" principle 3.5 Sensory neurons 3.6 Pacemaker potentials 4 Phases 4.1 Stimulation and rising phase 4.2 Peak and falling phase 4.3 Afterhyperpolarization 4.4 Refractory period 5 Propagation 5.1 Myelin and saltatory conduction 5.2 Cable theory 6 Termination 6.1 Chemical synapses 6.2 Electrical synapses 6.3 Neuromuscular junctions 7 Other cell types 7.1 Cardiac action potentials 7.2 Muscular action potentials 7.3 Plant action potentials 8 Taxonomic distribution and evolutionary advantages 9 Experimental methods 10 Neurotoxins 11 History 12 Quantitative models 13 See also 14 Notes 15 Footnotes 16 References 16.1 Books 16.2 Journal articles 16.3 Web pages 17 Further reading 18 External links
Overview Function Nearly all cell membranes in animals, plants and fungi maintain an electric potential difference (voltage)—the membrane potential. A typical voltage across an animal cell membrane is –65 mV —approximately one-fifteenth of a volt. Because the cell membrane is very thin, voltages of this magnitude give rise to very strong electric forces across the cell membrane. In the majority of cells, the voltage stays fairly constant over time. There are some types of cells, however, that are electrically active in the sense that their voltages fluctuate. In some of these, the voltages sometimes show very rapid up-and-down fluctuations that have a stereotyped form: these up-and-down cycles are known as action potentials. The durations of action potentials vary across a wide range, and consequently they are analog signals. In brain cells of animals, the entire up-and-down cycle may take place in roughly a few thousandths of a second. In other types of cells, the cycle may last for several seconds. The electrical properties of an animal cell are determined by the structure of the membrane that surrounds it. A cell membrane consists of a layer of lipid molecules with larger protein molecules embedded in it. The lipid layer is highly resistant to movement of electrically charged ions, so it functions mainly as an insulator. The large membrane-embedded molecules, in contrast, provide channels through which ions can pass across the membrane, and some of the large molecules are capable of actively moving specific types of ions from one side of the membrane to the other.
Process in a typical neuron All cells in animal body tissues are electrically polarized – in other words, they maintain a voltage difference across the cell's plasma membrane, known as the membrane potential. This electrical polarization results from a complex interplay between protein structures embedded in the membrane called ion pumps and ion channels. In neurons, the types of ion channels in the membrane usually vary across different parts of the cell, giving the dendrites, axon, and cell body different electrical properties. As a result, some parts of the membrane of a neuron may be excitable (capable of generating action potentials), whereas others are not. Recent studies have shown that the most excitable part of a neuron is the part after the axon hillock (the point where the axon leaves the cell body), which is called the initial segment, but the axon and cell body are also excitable in most cases. Each excitable patch of membrane has two important levels of membrane potential: the resting potential, which is the value the membrane potential maintains as long as nothing perturbs the cell, and a higher value called the threshold potential. At the axon hillock of a typical neuron, the resting potential is around –70 millivolts (mV) and the threshold potential is around –55 mV. Synaptic inputs to a neuron cause the membrane to depolarize or hyperpolarize; that is, they cause the membrane potential to rise or fall. Action potentials are triggered when enough depolarization accumulates to bring the membrane potential up to threshold. When an action potential is triggered, the membrane potential abruptly shoots upward, often reaching as high as +100 mV, then equally abruptly shoots back downward, often ending below the resting level, where it remains for some period of time. The shape of the action potential is stereotyped; that is, the rise and fall usually have approximately the same amplitude and time course for all action potentials in a given cell. (Exceptions are discussed later in the article.) In most neurons, the entire process takes place in about a thousandth of a second. Many types of neurons emit action potentials constantly at rates of up to 10–100 per second; some types, however, are much quieter, and may go for minutes or longer without emitting any action potentials.
Biophysical basis Action potentials result from the presence in a cell's membrane of special types of voltage-gated ion channels. A voltage-gated ion channel is a cluster of proteins embedded in the membrane that has three key properties:
File:Action potential.svg Approximate plot of a typical action potential shows its various phases as the action potential passes a point on a cell membrane. The membrane potential starts out at -70 mV at time zero. A stimulus is applied at time = 1 ms, which raises the membrane potential above -55 mV (the threshold potential). After the stimulus is applied, the membrane potential rapidly rises to a peak potential of +40 mV at time = 2 ms. Just as quickly, the potential then drops and overshoots to -90 mV at time = 3 ms, and finally the resting potential of -70 mV is reestablished at time = 5 ms.
1. It is capable of assuming more than one conformation. 2. At least one of the conformations creates a channel through the membrane that is permeable to specific types of ions. 3. The transition between conformations is influenced by the membrane potential.
File:Blausen 0011 ActionPotential Nerve.png
Thus, a voltage-gated ion channel tends to be open for some values of the membrane potential, and closed for others. In most cases, however, the relationship between membrane potential and channel state is probabilistic and involves a time delay. Ion channels switch between conformations at unpredictable times: The membrane potential determines the rate of transitions and the probability per unit time of each type of transition.
Action potential propagation along an axon
Voltage-gated ion channels are capable of producing action potentials because they can give rise to positive feedback loops: The membrane potential controls the state of the ion channels, but the state of the ion channels controls the membrane potential. Thus, in some situations, a rise in the membrane potential can cause ion channels to open, thereby causing a further rise in the membrane potential. An action potential occurs when this positive feedback cycle proceeds explosively. The time and amplitude trajectory of the action potential are determined by the biophysical properties of the voltage-gated ion channels that produce it. Several types of channels that are capable of producing the positive feedback necessary to generate an action potential exist. Voltage-gated sodium channels are responsible for the fast action potentials involved in nerve conduction. Slower action potentials in muscle cells and some types of neurons are generated by voltage-gated calcium channels. Each of these types comes in multiple variants, with different voltage sensitivity and different temporal dynamics.
The most intensively studied type of voltage-dependent ion channels comprises the sodium channels involved in fast nerve conduction. These are sometimes known as Hodgkin-Huxley sodium channels because they were first characterized by Alan Hodgkin and Andrew Huxley in their Nobel Prize-winning studies of the biophysics of the action potential, but can more conveniently be referred to as NaV channels. (The "V" stands for "voltage".) An NaV channel has three possible states, known as deactivated, activated, and inactivated. The channel is permeable only to sodium ions when it is in the activated state. When the membrane potential is low, the channel spends most of its time in the deactivated (closed) state. If the membrane potential is raised above a certain level, the channel shows increased probability of transitioning to the activated (open) state. The higher the membrane potential the greater the probability of activation. Once a channel has activated, it will eventually transition to the inactivated (closed) state. It tends then to stay inactivated for some time, but, if the membrane potential becomes low again, the channel will eventually transition back to the deactivated state. During an action potential, most channels of this type go through a cycle deactivatedÕactivatedÕinactivatedÕdeactivated. This is only the population average behavior, however — an individual channel can in principle make any transition at any time. However, the likelihood of a channel's transitioning from the inactivated state directly to the activated state is very low: A channel in the inactivated state is refractory until it has transitioned back to the deactivated state. The outcome of all this is that the kinetics of the NaV channels are governed by a transition matrix whose rates are voltage-dependent in a complicated way. Since these channels themselves play a major role in determining the voltage, the global dynamics of the system can be quite difficult to work out. Hodgkin and Huxley approached the problem by developing a set of differential equations for the parameters that govern the ion channel states, known as the Hodgkin-Huxley equations. These equations have been extensively modified by later research, but form the starting point for most theoretical studies of action potential biophysics. As the membrane potential is increased, sodium ion channels open, allowing the entry of sodium ions into the cell. This is followed by the opening of potassium ion channels that permit the exit of potassium ions from the cell. The inward flow of sodium ions increases the concentration of positively charged cations in the cell and causes depolarization, where the potential of the cell is higher than the cell's resting potential. The sodium channels close at the peak of the action potential, while potassium continues to leave the cell. The efflux of potassium ions decreases the membrane potential or hyperpolarizes the cell. For small voltage increases from rest, the potassium current exceeds the sodium current and the voltage returns to its normal resting value, typically −70 mV.[1][2][3] However, if the voltage increases past a critical threshold, typically 15 mV higher than the resting value, the sodium current dominates. This results in a runaway condition whereby the positive feedback from the sodium current activates even more sodium channels. Thus, the cell fires, producing an action potential.[1][4][5][note 1] The frequency at which cellular action potentials are produced is known as its firing rate. Currents produced by the opening of voltage-gated channels in the course of an action potential are typically significantly larger than the initial stimulating current. Thus, the amplitude, duration, and shape of the action potential are determined largely by the properties of the excitable membrane and not the amplitude or duration of the stimulus. This all-or-nothing property of the action potential sets it apart from graded potentials such as receptor potentials, electrotonic potentials, and synaptic potentials, which scale with the magnitude of the stimulus. A variety of action potential types exist in many cell types and cell compartments as determined by the types of voltage-gated channels, leak channels, channel distributions, ionic concentrations, membrane capacitance, temperature, and other factors. The principal ions involved in an action potential are sodium and potassium cations; sodium ions enter the cell, and potassium ions leave, restoring equilibrium. Relatively few ions need to cross the membrane for the membrane voltage to change drastically. The ions exchanged during an action potential, therefore, make a negligible change in the interior and exterior ionic concentrations. The few ions that do cross are pumped out again by the continuous action of the sodium–potassium pump, which, with other ion transporters, maintains the normal ratio of ion concentrations across the membrane. Calcium cations and chloride anions are involved in a few types of action potentials, such as the cardiac action potential and the action potential in the single-cell alga Acetabularia, respectively. Although action potentials are generated locally on patches of excitable membrane, the resulting currents can trigger action potentials on neighboring stretches of membrane, precipitating a domino-like propagation. In contrast to passive spread of electric potentials (electrotonic potential), action potentials are generated anew along excitable stretches of membrane and propagate without decay.[6] Myelinated sections of axons are not excitable and do not produce action potentials and the signal is propagated passively as electrotonic potential. Regularly spaced unmyelinated patches, called the nodes of Ranvier, generate action potentials to boost the signal. Known as saltatory conduction, this type of signal propagation provides a favorable tradeoff of signal velocity and axon diameter. Depolarization of axon terminals, in general, triggers the release of neurotransmitter into the synaptic cleft. In addition, backpropagating action potentials have been recorded in the dendrites of pyramidal neurons, which are ubiquitous in the neocortex.[lower-alpha 3] These are thought to have a role in spike-timing-dependent plasticity.
Neurotransmission Anatomy of a neuron Several types of cells support an action potential, such as plant cells, muscle cells, and the specialized cells of the heart (in which occurs the cardiac action potential). However, the main excitable cell is the neuron, which also has the simplest mechanism for the action potential. Neurons are electrically excitable cells composed, in general, of one or more dendrites, a single soma, a single axon and one or more axon terminals. Dendrites are cellular projections whose primary function is to receive synaptic signals. Their protrusions, or spines, are designed to capture the neurotransmitters released by the presynaptic neuron. They have a high concentration of ligand-gated ion channels. These spines have a thin neck connecting a bulbous protrusion to the dendrite. This ensures that changes occurring inside the spine are less likely to affect the neighboring spines. The dendritic spine can, with rare exception (see LTP), act as an independent unit. The dendrites extend from the soma, which houses the nucleus, and many of the "normal" eukaryotic organelles. Unlike the spines, the surface of the soma is populated by voltage activated ion channels. These channels help transmit the signals generated by the dendrites. Emerging out from the soma is the axon hillock. This region is characterized by having a very high
Structure of a typical neuron Neuron
400pxDend
concentration of voltage-activated sodium channels. In general, it is considered to be the spike initiation zone for action potentials.[7] Multiple signals generated at the spines, and transmitted by the soma all converge here. Immediately after the axon hillock is the axon. This is a thin tubular protrusion traveling away from the soma. The axon is insulated by a myelin sheath. Myelin is composed of either Schwann cells (in the peripheral nervous system) or oligodendrocytes (in the central nervous system), both of which are types of glial cells. Although glial cells are not involved with the transmission of electrical signals, they communicate and provide important biochemical support to neurons.[8] To be specific, myelin wraps multiple times around the axonal segment, forming a thick fatty layer that prevents ions from entering or escaping the axon. This insulation prevents significant signal decay as well as ensuring faster signal speed. This insulation, however, has the restriction that no channels can be present on the surface of the axon. There are, therefore, regularly spaced patches of membrane, which have no insulation. These nodes of Ranvier can be considered to be "mini axon hillocks", as their purpose is to boost the signal in order to prevent significant signal decay. At the furthest end, the axon loses its insulation and begins to branch into several axon terminals. These presynaptic terminals, or synaptic boutons, are a specialized area within the axon of the presynaptic cell that contains neurotransmitters Nucleus enclosed in small membrane-bound spheres called synaptic vesicles.
Initiation Before considering the propagation of action potentials along axons and their termination at the synaptic knobs, it is helpful to consider the methods by which action potentials can be initiated at the axon hillock. The basic requirement is that the membrane voltage at the hillock be raised above the threshold for firing.[1][2][9][10] There are several ways in which this depolarization can occur.
Dynamics
File:Synapse Illustration2 tweaked.svg
Action potentials are most commonly initiated by excitatory postsynaptic potentials from a presynaptic neuron.[11] Typically, neurotransmitter molecules are released by the presynaptic neuron. These neurotransmitters then bind to receptors on the postsynaptic cell. This binding opens various types of ion channels. This opening has the further effect of changing the local permeability of the cell membrane and, thus, the membrane potential. If the binding increases the voltage (depolarizes the membrane), the synapse is excitatory. If, however, the binding decreases the voltage (hyperpolarizes the membrane), it is inhibitory. Whether the voltage is increased or decreased, the change propagates passively to nearby regions of the membrane (as described by the cable equation and its refinements). Typically, the voltage stimulus decays exponentially with the distance from the synapse and with time from the binding of the neurotransmitter. Some fraction of an excitatory voltage may reach the axon hillock and may (in rare cases) depolarize the membrane enough to provoke a new action potential. More typically, the excitatory potentials from several synapses must work together at nearly the same time to provoke a new action potential. Their joint efforts can be thwarted, however, by the counteracting inhibitory postsynaptic potentials. Neurotransmission can also occur through electrical synapses.[12] Due to the direct connection between excitable cells in the form of gap junctions, an action potential can be transmitted directly from one cell to the next in either direction. The free flow of ions between cells enables rapid non-chemical-mediated transmission. Rectifying channels ensure that action potentials move only in one direction through an electrical synapse. Electrical synapses are found in all
When an action potential arrives at the end of the presynaptic axon (yellow), it causes the release of neurotransmitter molecules that open ion channels in the post-synaptic neuron (green). The combined excitatory and inhibitory postsynaptic potentials of such inputs can begin a new action potential in the post-synaptic neuron.
nervous systems, including the human brain, although they are a distinct minority.[13]
"All-or-none" principle The amplitude of an action potential is independent of the amount of current that produced it. In other words, larger currents do not create larger action potentials. Therefore, action potentials are said to be all-or-none signals, since either they occur fully or they do not occur at all.[lower-alpha 4][lower-alpha 5][lower-alpha 6] This is in contrast to receptor potentials, whose amplitudes are dependent on the intensity of a stimulus.[14] In both cases, the frequency of action potentials is correlated with the intensity of a stimulus.
Sensory neurons In sensory neurons, an external signal such as pressure, temperature, light, or sound is coupled with the opening and closing of ion channels, which in turn alter the ionic permeabilities of the membrane and its voltage.[15] These voltage changes can again be excitatory (depolarizing) or inhibitory (hyperpolarizing) and, in some sensory neurons, their combined effects can depolarize the axon hillock enough to provoke action potentials. Examples in humans include the olfactory receptor neuron and Meissner's corpuscle, which are critical for the sense of smell and touch, respectively. However, not all sensory neurons convert their external signals into action potentials; some do not even have an axon![16] Instead, they may convert the signal into the release of a neurotransmitter, or into continuous graded potentials, either of which may stimulate subsequent neuron(s) into firing an action potential. For illustration, in the human ear, hair cells convert the incoming sound into the opening and closing of mechanically gated ion channels, which may cause neurotransmitter molecules to be released. In similar manner, in the human retina, the initial photoreceptor cells and the next layer of cells (comprising bipolar cells and horizontal cells) do not produce action potentials; only some amacrine cells and the third layer, the ganglion cells, produce action potentials, which then travel up the optic nerve.
Pacemaker potentials In sensory neurons, action potentials result from an external stimulus. However, some excitable cells require no such stimulus to fire: They spontaneously depolarize their axon hillock and fire action potentials at a regular rate, like an internal clock.[17] The voltage traces of such cells are known as pacemaker potentials.[18] The cardiac pacemaker cells of the sinoatrial node in the heart provide a good example.[lower-alpha 7] Although such pacemaker potentials have a natural rhythm, it can be adjusted by external stimuli; for instance, heart rate can be altered by pharmaceuticals as well as signals from the sympathetic and parasympathetic nerves.[19] The external stimuli do not cause the cell's repetitive firing, but merely alter its timing.[18] In some cases, the regulation of frequency can be more complex, leading to patterns of action potentials, such as bursting.
File:Pacemaker potential.svg In pacemaker potentials, the cell spontaneously depolarizes (straight line with upward slope) until it fires an action potential.
Phases The course of the action potential can be divided into five parts: the rising phase, the peak phase, the falling phase, the undershoot phase, and the refractory period. During the rising phase the membrane potential depolarizes (becomes more positive). The point at which depolarization stops is called the peak phase. At this stage, the membrane potential reaches a maximum. Subsequent to this, there is a falling phase. During this stage the membrane potential becomes more negative, returning towards resting potential. The undershoot, or afterhyperpolarization, phase is the period during which the membrane potential temporarily becomes more negatively charged than when at rest (hyperpolarized). Finally, the time during which a subsequent action potential is impossible or difficult to fire is called the refractory period, which may overlap with the other phases.[20] The course of the action potential is determined by two coupled effects.[21] First, voltage-sensitive ion channels open and close in response to changes in the membrane voltage Vm. This
changes the membrane's permeability to those ions.[22] Second, according to the Goldman equation, this change in permeability changes in the equilibrium potential Em, and, thus, the membrane voltage Vm.[lower-alpha 8] Thus, the membrane potential affects the permeability, which then further affects the membrane potential. This sets up the possibility for positive feedback, which is a key part of the rising phase of the action potential.[1][4] A complicating factor is that a single ion channel may have multiple internal "gates" that respond to changes in Vm in opposite ways, or at different rates.[23][lower-alpha 9] For example, although raising Vm opens most gates in the voltage-sensitive sodium channel, it also closes the channel's "inactivation gate", albeit more slowly.[24] Hence, when Vm is raised suddenly, the sodium channels open initially, but then close due to the slower inactivation. The voltages and currents of the action potential in all of its phases were modeled accurately by Alan Lloyd Hodgkin and Andrew Huxley in 1952,[lower-alpha 9] for which they were awarded the Nobel Prize in Physiology or Medicine in 1963.[lower-greek 2] However, their model considers only two types of voltage-sensitive ion channels, and makes several assumptions about them, e.g., that their internal gates open and close independently of one another. In reality, there are many types of ion channels,[25] and they do not always open and close independently.[lower-alpha 10]
Stimulation and rising phase A typical action potential begins at the axon hillock[26] with a sufficiently strong depolarization, e.g., a stimulus that increases Vm. This depolarization is often caused by the injection of extra sodium cations into the cell; these cations can come from a wide variety of sources, such as chemical synapses, sensory neurons or pacemaker potentials. For a neuron at rest, there is a high concentration of sodium and chlorine ions in the extracellular fluid compared to the intracellular fluid while there is a high concentration of potassium ions in the intracellular fluid compared to the extracellular fluid. This concentration gradient along with potassium leak channels present on the membrane of the neuron causes an efflux of potassium ions making the resting potential close to EK» –75 mV.[27] The depolarization opens both the sodium and potassium channels in the membrane, allowing the ions to flow into and out of the axon, respectively. If the depolarization is small (say, increasing Vm from −70 mV to −60 mV), the outward potassium current overwhelms the inward sodium current and the membrane repolarizes back to its normal resting potential around −70 mV.[1][2][3]However, if the depolarization is large enough, the inward sodium current increases more than the outward potassium current and a runaway condition (positive feedback) results: the more inward current there is, the more Vm increases, which in turn further increases the inward current.[1][4] A sufficiently strong depolarization (increase in Vm) causes the voltage-sensitive sodium channels to open; the increasing permeability to sodium drives Vm closer to the sodium equilibrium voltage ENa» +55 mV. The increasing voltage in turn causes even more sodium channels to open, which pushes Vm still further towards ENa. This positive feedback continues until the sodium channels are fully open and Vm is close to ENa.[1][2][9][10] The sharp rise in Vm and sodium permeability correspond to the rising phase of the action potential.[1][2][9][10] The critical threshold voltage for this runaway condition is usually around −45 mV, but it depends on the recent activity of the axon. A membrane that has just fired an action potential cannot fire another one immediately, since the ion channels have not returned to the deactivated state. The period during which no new action potential can be fired is called the absolute refractory period.[28][29][30] At longer times, after some but not all of the ion channels have recovered, the axon can be stimulated to produce another action potential, but with a higher threshold, requiring a much stronger depolarization, e.g., to −30 mV. The period during which action potentials are unusually difficult to evoke is called the relative refractory period.[28][29][30]
Peak and falling phase The positive feedback of the rising phase slows and comes to a halt as the sodium ion channels become maximally open. At the peak of the action potential, the sodium permeability is maximized and the membrane voltage Vm is nearly equal to the sodium equilibrium voltage ENa. However, the same raised voltage that opened the sodium channels initially also slowly shuts them off, by closing their pores; the sodium channels become inactivated.[24] This lowers the membrane's permeability to sodium relative to potassium, driving the membrane voltage back towards the resting value. At the same time, the raised voltage opens voltage-sensitive potassium channels; the increase in the membrane's potassium permeability drives Vm towards EK.[24] Combined, these changes in sodium and potassium permeability cause Vm to drop quickly, repolarizing the membrane and producing the "falling phase" of the action potential.[28][31][10][32]
Afterhyperpolarization The raised voltage opened many more potassium channels than usual, and some of these do not close right away when the membrane returns to its normal resting voltage. In addition, further potassium channels open in response to the influx of calcium ions during the action potential. The potassium permeability of the membrane is transiently unusually high, driving the membrane voltage Vm even closer to the potassium equilibrium voltage EK. Hence, there is an undershoot or hyperpolarization, termed an afterhyperpolarization in technical language, that persists until the membrane potassium permeability returns to its usual value.[33][31]
Refractory period Each action potential is followed by a refractory period, which can be divided into an absolute refractory period, during which it is impossible to evoke another action potential, and then a relative refractory period, during which a stronger-than-usual stimulus is required.[28][29][30] These two refractory periods are caused by changes in the state of sodium and potassium channel molecules. When closing after an action potential, sodium channels enter an "inactivated" state, in which they cannot be made to open regardless of the membrane potential—this gives rise to the absolute refractory period. Even after a sufficient number of sodium channels have transitioned back to their resting state, it frequently happens that a fraction of potassium channels remains open, making it difficult for the membrane potential to depolarize, and thereby giving rise to the relative refractory period. Because the density and subtypes of potassium channels may differ greatly between different types of neurons, the duration of the relative refractory period is highly variable. The absolute refractory period is largely responsible for the unidirectional propagation of action potentials along axons.[34] At any given moment, the patch of axon behind the actively spiking part is refractory, but the patch in front, not having been activated recently, is capable of being stimulated by the depolarization from the action potential.
Propagation The action potential generated at the axon hillock propagates as a wave along the axon.[35] The currents flowing inwards at a point on the axon during an action potential spread out along the axon, and depolarize the adjacent sections of its membrane. If sufficiently strong, this depolarization provokes a similar action potential at the neighboring membrane patches. This basic mechanism was demonstrated by Alan Lloyd Hodgkin in 1937. After crushing or cooling nerve segments and thus blocking the action potentials, he showed that an action potential arriving on one side of the block could provoke another action potential on the other, provided that the blocked segment was sufficiently short.[lower-alpha 11] Once an action potential has occurred at a patch of membrane, the membrane patch needs time to recover before it can fire again. At the molecular level, this absolute refractory period corresponds to the time required for the voltage-activated sodium channels to recover from inactivation, i.e., to return to their closed state.[29] There are many types of voltage-activated potassium channels in neurons, some of them inactivate fast (A-type currents) and some of them inactivate slowly or not inactivate at all; this variability guarantees that there will be always an available source of current for repolarization, even if some of the potassium channels are inactivated because of preceding depolarization. On the other hand, all neuronal voltage-activated sodium channels inactivate within several millisecond during strong depolarization, thus making following depolarization impossible until a substantial fraction of sodium channels have returned to their closed state. Although it limits the frequency of firing,[36] the absolute refractory period ensures that the action potential moves in only one direction along an axon.[34] The currents
flowing in due to an action potential spread out in both directions along the axon.[37] However, only the unfired part of the axon can respond with an action potential; the part that has just fired is unresponsive until the action potential is safely out of range and cannot restimulate that part. In the usual orthodromic conduction, the action potential propagates from the axon hillock towards the synaptic knobs (the axonal termini); propagation in the opposite direction—known as antidromic conduction—is very rare.[38] However, if a laboratory axon is stimulated in its middle, both halves of the axon are "fresh", i.e., unfired; then two action potentials will be generated, one traveling towards the axon hillock and the other traveling towards the synaptic knobs.
Myelin and saltatory conduction
File:Neuron1.jpg In saltatory conduction, an action potential at one node of Ranvier causes inwards currents that depolarize the membrane at the next node, provoking a new action potential there; the action potential appears to "hop" from node to node.
In order to enable fast and efficient transduction of electrical signals in the nervous system, certain neuronal axons are covered with myelin sheaths. Myelin is a multilamellar membrane that enwraps the axon in segments separated by intervals known as nodes of Ranvier. It is produced by specialized cells: Schwann cells exclusively in the peripheral nervous system, and oligodendrocytes exclusively in the central nervous system. Myelin sheath reduces membrane capacitance and increases membrane resistance in the inter-node intervals, thus allowing a fast, saltatory movement of action potentials from node to node.[lower-alpha 12][lower-alpha 13][lower-alpha 14] Myelination is found mainly in vertebrates, but an analogous system has been discovered in a few invertebrates, such as some species of shrimp.[lower-alpha 15] Not all neurons in vertebrates are myelinated; for example, axons of the neurons comprising the autonomous nervous system are not, in general, myelinated.
Myelin prevents ions from entering or leaving the axon along myelinated segments. As a general rule, myelination increases the conduction velocity of action potentials and makes them more energy-efficient. Whether saltatory or not, the mean conduction velocity of an action potential ranges from 1 meter per second (m/s) to over 100 m/s, and, in general, increases with axonal diameter.[lower-alpha 16] Action potentials cannot propagate through the membrane in myelinated segments of the axon. However, the current is carried by the cytoplasm, which is sufficient to depolarize the first or second subsequent node of Ranvier. Instead, the ionic current from an action potential at one node of Ranvier provokes another action potential at the next node; this apparent "hopping" of the
action potential from node to node is known as saltatory conduction. Although the mechanism of saltatory conduction was suggested in 1925 by Ralph Lillie,[lower-alpha 17] the first experimental evidence for saltatory conduction came from Ichiji Tasaki[lower-alpha 18] and Taiji Takeuchi[lower-alpha 19][39] and from Andrew Huxley and Robert Stämpfli.[lower-alpha 20] By contrast, in unmyelinated axons, the action potential provokes another in the membrane immediately adjacent, and moves continuously down the axon like a wave. Myelin has two important advantages: fast conduction speed and energy efficiency. For axons larger than a minimum diameter (roughly 1 micrometre), myelination increases the conduction velocity of an action potential, typically tenfold.[lower-alpha 22] Conversely, for a given conduction velocity, myelinated fibers are smaller than their unmyelinated counterparts. For example, action potentials move at roughly the same speed (25 m/s) in a myelinated frog axon and an unmyelinated squid giant axon, but the frog axon has a roughly 30-fold smaller diameter and 1000-fold smaller cross-sectional area. Also, since the ionic currents are confined to the nodes of Ranvier, far fewer ions "leak" across the membrane, saving metabolic energy. This saving is a significant selective advantage, since the human nervous system uses approximately 20% of the body's metabolic energy.[lower-alpha 22] The length of axons' myelinated segments is important to the success of saltatory conduction. They should be as long as possible to maximize the speed of conduction, but not so long that the arriving signal is too weak to provoke an action potential at the next node of Ranvier. In nature, myelinated segments are generally long enough for the passively propagated signal to travel for at least two nodes while retaining enough amplitude to fire an action potential at the second or third node. Thus, the safety factor of saltatory conduction is high, allowing transmission to bypass nodes in case of injury. However, action potentials may end prematurely in certain places where the safety factor is low, even in unmyelinated neurons; a common example is the branch point of an axon, where it divides into two axons.[41]
File:Conduction velocity and myelination.png Comparison of the conduction velocities of myelinated and unmyelinated axons in the cat. [40] The conduction velocity v of myelinated neurons varies roughly linearly with axon diameter d (that is, v ∝ d), [lower-alpha 16] whereas the speed of unmyelinated neurons varies roughly as the square root (v ∝√
Cable theory
d). [lower-alpha 21] The red and blue curves are fits of experimental data, whereas the dotted lines are their theoretical extrapolations.
The flow of currents within an axon can be described quantitatively by cable theory[43] and its elaborations, such as the compartmental model.[44] Cable theory
File:NeuronResistanceCapacit
Some diseases degrade myelin and impair saltatory conduction, reducing the conduction velocity of action potentials.[lower-alpha 23] The most well-known of these is multiple sclerosis, in which the breakdown of myelin impairs coordinated movement.[42]
was developed in 1855 by Lord Kelvin to model the transatlantic telegraph cable[lower-alpha 24] and was shown to be relevant to neurons by Hodgkin and Rushton in 1946.[lower-alpha 25] In simple cable theory, the neuron is treated as an electrically passive, perfectly cylindrical transmission cable, which can be described by a partial differential equation[43] \tau \frac{\partial V}{\partial t} = \lambda^{2} \frac{\partial^{2} V}{\partial x^{2}} - V where V(x, t) is the voltage across the membrane at a time t and a position x along the length of the neuron, and where and are the characteristic length and time scales on which those voltages decay in response to a stimulus. Referring to the circuit diagram on the right, these scales can be determined from the resistances and capacitances per unit length.[45]
Figure.1: Cable theory's simplified view of a neuronal fiber. The connected RC circuits correspond to adjacent segments of a passive neurite. The extracellular resistances re (the counterparts of the intracellular resistances ri) are not shown, since they are usually negligibly small; the extracellular medium may be assumed to have the same voltage everywhere.
\tau =\ r_{m} c_{m} \, \lambda = \sqrt \frac{r_m}{r_l} These time and length-scales can be used to understand the dependence of the conduction velocity on the diameter of the neuron in unmyelinated fibers. For example, the time-scale increases with both the membrane resistance rm and capacitance cm. As the capacitance increases, more charge must be transferred to produce a given transmembrane voltage (by the equation Q=CV); as the resistance increases, less charge is transferred per unit time, making the equilibration slower. In similar manner, if the internal resistance per unit length ri is lower in one axon than in another (e.g., because the radius of the former is larger), the spatial decay length becomes longer and the conduction velocity of an action potential should increase. If the transmembrane resistance rm is increased, that lowers the average "leakage" current across the membrane, likewise causing to become longer, increasing the conduction velocity.
Termination Chemical synapses In general, action potentials that reach the synaptic knobs cause a neurotransmitter to be released into the synaptic cleft.[lower-alpha 26] Neurotransmitters are small molecules that may open ion channels in the postsynaptic cell; most axons have the same neurotransmitter at all of their termini. The arrival of the action potential opens voltage-sensitive calcium channels in the presynaptic membrane; the influx of calcium causes vesicles filled with neurotransmitter to migrate to the cell's surface and release their contents into the synaptic cleft.[lower-alpha 27] This complex process is inhibited by the neurotoxins tetanospasmin and botulinum toxin, which are responsible for tetanus and botulism, respectively.[lower-alpha 28]
Electrical synapses
File:Gap cell junction-en.svg
Some synapses dispense with the "middleman" of the neurotransmitter, and connect the presynaptic and postsynaptic cells together.[lower-alpha 29] When an action potential reaches such a synapse, the ionic currents flowing into the presynaptic cell can cross the barrier of the two cell membranes and enter the
postsynaptic cell through pores known as connexons.[lower-alpha 30] Thus, the ionic currents of the presynaptic action potential can directly stimulate the postsynaptic cell. Electrical synapses allow for faster transmission because they do not require the slow diffusion of neurotransmitters across the synaptic cleft. Hence, electrical synapses are used whenever fast response and coordination of timing are crucial, as in escape reflexes, the retina of vertebrates, and the heart.
Electrical synapses between excitable cells allow ions to pass directly from one cell to another, and are much faster than chemical synapses.
Neuromuscular junctions A special case of a chemical synapse is the neuromuscular junction, in which the axon of a motor neuron terminates on a muscle fiber.[lower-alpha 31] In such cases, the released neurotransmitter is acetylcholine, which binds to the acetylcholine receptor, an integral membrane protein in the membrane (the sarcolemma) of the muscle fiber.[lower-alpha 32] However, the acetylcholine does not remain bound; rather, it dissociates and is hydrolyzed by the enzyme, acetylcholinesterase, located in the synapse. This enzyme quickly reduces the stimulus to the muscle, which allows the degree and timing of muscular contraction to be regulated delicately. Some poisons inactivate acetylcholinesterase to prevent this control, such as the nerve agents sarin and tabun,[lower-alpha 33] and the insecticides diazinon and malathion.[lower-alpha 34]
Other cell types Cardiac action potentials The cardiac action potential differs from the neuronal action potential by having an extended plateau, in which the membrane is held at a high voltage for a few hundred milliseconds prior to being repolarized by the potassium current as usual.[lower-alpha 35] This plateau is due to the action of slower calcium channels opening and holding the membrane voltage near their equilibrium potential even after the sodium channels have inactivated. The cardiac action potential plays an important role in coordinating the contraction of the heart.[lower-alpha 35] The cardiac cells of the sinoatrial node provide the pacemaker potential that synchronizes the heart. The action potentials of those cells propagate to and through the atrioventricular node (AV node), which is normally the only conduction pathway between the atria and the ventricles. Action potentials from the AV node travel through the bundle of His and thence to the Purkinje fibers.[note 2] Conversely, anomalies in the cardiac action potential—whether due to a congenital mutation or injury—can lead to human pathologies, especially arrhythmias.[lower-alpha 35] Several anti-arrhythmia drugs act on the cardiac action potential, such as quinidine, lidocaine, beta blockers, and verapamil.[lower-alpha 36]
Muscular action potentials
File:Ventricular myocyte action potential.svg Phases of a cardiac action potential. The sharp rise in voltage ("0") corresponds to the influx of sodium ions, whereas the two decays ("1" and "3", respectively) correspond to the sodiumchannel inactivation and the repolarizing eflux of potassium ions. The characteristic plateau ("2") results from the opening of voltage-sensitive calcium channels.
The action potential in a normal skeletal muscle cell is similar to the action potential in neurons.[46] Action potentials result from the depolarization of the cell membrane (the sarcolemma), which opens voltage-sensitive sodium channels; these become inactivated and the membrane is repolarized through the outward current of potassium ions. The resting potential prior to the action potential is typically −90mV, somewhat more negative than typical neurons. The muscle action potential lasts roughly 2–4 ms, the absolute refractory period is roughly 1–3 ms, and the conduction velocity along the muscle is roughly 5 m/s. The action potential releases calcium ions that free up the tropomyosin and allow the muscle to contract. Muscle action potentials are provoked by the arrival of a pre-synaptic neuronal action potential at the neuromuscular junction, which is a common target for neurotoxins.[lower-alpha 33]
Plant action potentials
Plant and fungal cells [lower-alpha 37] are also electrically excitable. The fundamental difference to animal action potentials is that the depolarization in plant cells is not accomplished by an uptake of positive sodium ions, but by release of negative chloride ions.[lower-alpha 38][lower-alpha 39][lower-alpha 40] Together with the following release of positive potassium ions, which is common to plant and animal action potentials, the action potential in plants infers, therefore, an osmotic loss of salt (KCl), whereas the animal action potential is osmotically neutral, when equal amounts of entering sodium and leaving potassium cancel each other osmotically. The interaction of electrical and osmotic relations in plant cells [lower-alpha 41] indicates an osmotic function of electrical excitability in the common, unicellular ancestors of plants and animals under changing salinity conditions, whereas the present function of rapid signal transmission is seen as a younger accomplishment of metazoan cells in a more stable osmotic environment.[47] It must be assumed that the familiar signalling function of action potentials in some vascular plants (e.g. Mimosa pudica), arose independently from that in metazoan excitable cells.
Taxonomic distribution and evolutionary advantages Action potentials are found throughout multicellular organisms, including plants, invertebrates such as insects, and vertebrates such as reptiles and mammals.[lower-alpha 42] Sponges seem to be the main phylum of multicellular eukaryotes that does not transmit action potentials, although some studies have suggested that these organisms have a form of electrical signaling, too.[lower-alpha 43] The resting potential, as well as the size and duration of the action potential, have not varied much with evolution, although the conduction velocity does vary dramatically with axonal diameter and myelination. Comparison of action potentials (APs) from a representative cross-section of animals[48] Animal Squid (Loligo)
Cell type Giant axon
Resting potential (mV) AP increase (mV) AP duration (ms) Conduction speed (m/s) −60
120
0.75
35
Earthworm (Lumbricus) Median giant fiber
−70
100
1.0
30
Cockroach (Periplaneta) Giant fiber
−70
80–104
0.4
10
Frog (Rana)
Sciatic nerve axon
−60 to −80
110–130
1.0
7–30
Cat (Felis)
Spinal motor neuron −55 to −80
80–110
1–1.5
30–120
Given its conservation throughout evolution, the action potential seems to confer evolutionary advantages. One function of action potentials is rapid, long-range signaling within the organism; the conduction velocity can exceed 110 m/s, which is one-third the speed of sound. For comparison, a hormone molecule carried in the bloodstream moves at roughly 8 m/s in large arteries. Part of this function is the tight coordination of mechanical events, such as the contraction of the heart. A second function is the computation associated with its generation. Being an all-or-none signal that does not decay with transmission distance, the action potential has similar advantages to digital electronics. The integration of various dendritic signals at the axon hillock and its thresholding to form a complex train of action potentials is another form of computation, one that has been exploited biologically to form central pattern generators and mimicked in artificial neural networks.
Experimental methods The study of action potentials has required the development of new experimental methods. The initial work, prior to 1955, focused on three goals: isolating signals from single neurons or axons, developing fast, sensitive electronics, and shrinking electrodes enough that the voltage inside a single cell could be recorded. The first problem was solved by studying the giant axons found in the neurons of the squid genus Loligo.[lower-alpha 44] These axons are so large in diameter (roughly 1 mm, or 100-fold larger than a typical neuron) that they can be seen with the naked eye, making them easy to extract and manipulate.[lower-alpha 9][lower-alpha 45] However, the Loligo axons are not representative of all excitable cells, and numerous other systems with action potentials have been studied.
File:Loligo vulgaris.jpg The giant axons of the European squid (Loligo vulgaris) were crucial for scientists to understand the action potential.
The second problem was addressed with the crucial development of the voltage clamp,[lower-alpha 46] which permitted experimenters to study the ionic currents underlying an action potential in isolation, and eliminated a key source of electronic noise, the current IC associated with the capacitance C of the membrane.[49] Since the current equals C times the rate of change of the transmembrane voltage Vm, the solution was to design a circuit that kept Vm fixed (zero rate of change) regardless of the currents flowing across the membrane. Thus, the current required to keep Vm at a fixed value is a direct reflection of the current flowing through the membrane. Other electronic advances included the use of Faraday cages and electronics with high input impedance, so that the measurement itself did not affect the voltage being measured.[50] The third problem, that of obtaining electrodes small enough to record voltages within a single axon without perturbing it, was solved in 1949 with the invention of the glass micropipette electrode,[lower-alpha 47] which was quickly adopted by other researchers.[lower-alpha 48][lower-alpha 49] Refinements of this method are able to produce electrode tips that are as fine as 100 Å (10 nm), which also confers high input impedance.[51] Action potentials may also be recorded with small metal electrodes placed just next to a neuron, with neurochips containing EOSFETs, or optically with dyes that are sensitive to Ca2+ or to voltage.[lower-alpha 50] File:Single channel.png As revealed by a patch clamp electrode, an ion channel has two states: open (high conductance) and closed (low conductance).
While glass micropipette electrodes measure the sum of the currents passing through many ion channels, studying the electrical properties of a single ion channel became possible in the 1970s with the development of the patch clamp by Erwin Neher and Bert Sakmann. For this they were awarded the Nobel Prize in Physiology or Medicine in 1991.[lower-greek 3] Patch-clamping verified that ionic channels have discrete states of conductance, such as open, closed and inactivated. Optical imaging technologies have been developed in recent years to measure action potentials, either via simultaneous multisite recordings or with ultra-spatial resolution. Using voltage-sensitive dyes, action potentials have been optically recorded from a tiny patch of cardiomyocyte membrane.[lower-alpha 51]
Neurotoxins Several neurotoxins, both natural and synthetic, are designed to block the action potential. Tetrodotoxin from the pufferfish and saxitoxin from the Gonyaulax (the dinoflagellate genus responsible for "red tides") block action potentials by inhibiting the voltage-sensitive sodium channel;[lower-alpha 52] similarly, dendrotoxin from the black mamba snake inhibits the voltage-sensitive potassium channel. Such inhibitors of ion channels serve an important research purpose, by allowing scientists to "turn off" specific channels at will, thus isolating the other channels' contributions; they can also be useful in purifying ion channels by affinity chromatography or in assaying their concentration. However, such inhibitors also make effective neurotoxins, and have been considered for use as chemical weapons. Neurotoxins aimed at the ion channels of insects have been effective insecticides; one example is the synthetic permethrin, which prolongs the activation of the sodium channels involved in action potentials. The ion channels of insects are sufficiently different from their human counterparts that there are few side effects in humans. Many other neurotoxins interfere with the transmission of the action potential's effects at the synapses, especially at the neuromuscular junction.
File:Puffer Fish DSC01257.JPG Tetrodotoxin is a lethal toxin found in pufferfish that inhibits the voltage-sensitive sodium channel, halting action potentials.
History File:PurkinjeCell.jpg Image of two Purkinje cells (labeled as A) drawn by Santiago Ramón y Cajal in 1899. Large trees of dendrites feed into the soma, from which a single axon emerges and moves generally downwards with a few branch points. The smaller cells labeled B are granule cells.
The role of electricity in the nervous systems of animals was first observed in dissected frogs by Luigi Galvani, who studied it from 1791 to 1797.[lower-alpha 53] Galvani's results stimulated Alessandro Volta to develop the Voltaic pile—the earliest-known electric battery—with which he studied animal electricity (such as electric eels) and the physiological responses to applied direct-current voltages.[lower-alpha 54] Scientists of the 19th century studied the propagation of electrical signals in whole nerves (i.e., bundles of neurons) and demonstrated that nervous tissue was made up of cells, instead of an interconnected network of tubes (a reticulum).[52] Carlo Matteucci followed up Galvani's studies and demonstrated that cell membranes had a voltage across them and could produce direct current. Matteucci's work inspired the German physiologist, Emil du Bois-Reymond, who discovered the action potential in 1848. The conduction velocity of action potentials was first measured in 1850 by du Bois-Reymond's friend, Hermann von Helmholtz. To establish that nervous tissue is made up of discrete cells, the Spanish physician Santiago Ramón y Cajal and his students used a stain developed by Camillo Golgi to reveal the myriad shapes of neurons, which they rendered painstakingly. For their discoveries, Golgi and Ramón y Cajal were awarded the 1906 Nobel Prize in Physiology.[lower-greek 4] Their work resolved a long-standing controversy in the neuroanatomy of the 19th century; Golgi himself had argued for the network model of the nervous system.
The 20th century was a golden era for electrophysiology. In 1902 and again in 1912, Julius Bernstein advanced the hypothesis that the action potential resulted from a change in the permeability of the axonal membrane to ions.[lower-alpha 55][53] Bernstein's hypothesis was confirmed by Ken Cole and Howard Curtis, who showed that membrane conductance increases during an action potential.[lower-alpha 56] In 1907, Louis Lapicque suggested that the action potential was generated as a threshold was crossed,[lower-alpha 57] what would be later shown as a product of the dynamical systems of ionic conductances. In 1949, Alan Hodgkin and Bernard Katz refined Bernstein's hypothesis by considering that the axonal membrane might have different permeabilities to different ions; in particular, they demonstrated the crucial role of the sodium permeability for the action potential.[lower-alpha 58] They made the first actual recording of the electrical changes across the neuronal membrane that mediate the action potential.[lower-greek 5] This line of research culminated in the five 1952 papers of Hodgkin, Katz and Andrew Huxley, in which they applied the voltage clamp technique to determine the dependence of the axonal membrane's permeabilities
File:3b8e.png Ribbon diagram of the sodium–potassium pump in its E2-Pi state. The estimated boundaries of the lipid bilayer are shown as blue (intracellular) and red (extracellular) planes.
to sodium and potassium ions on voltage and time, from which they were able to reconstruct the action potential quantitatively.[lower-alpha 9] Hodgkin and Huxley correlated the properties of their mathematical model with discrete ion channels that could exist in several different states, including "open", "closed", and "inactivated". Their hypotheses were confirmed in the mid-1970s and 1980s by Erwin Neher and Bert Sakmann, who developed the technique of patch clamping to examine the conductance states of individual ion channels.[lower-alpha 59] In the 21st century, researchers are beginning to understand the structural basis for these conductance states and for the selectivity of channels for their species of ion,[lower-alpha 60] through the atomic-resolution crystal structures,[lower-alpha 61] fluorescence distance measurements[lower-alpha 62] and cryo-electron microscopy studies.[lower-alpha 63] Julius Bernstein was also the first to introduce the Nernst equation for resting potential across the membrane; this was generalized by David E. Goldman to the eponymous Goldman equation in 1943.[lower-alpha 8] The sodium–potassium pump was identified in 1957[lower-alpha 64][lower-greek 6] and its properties gradually elucidated,[lower-alpha 65][lower-alpha 66][lower-alpha 67] culminating in the determination of its atomic-resolution structure by X-ray crystallography.[lower-alpha 68] The crystal structures of related ionic pumps have also been solved, giving a broader view of how these molecular machines work.[lower-alpha 69]
Quantitative models Mathematical and computational models are essential for understanding the action potential, and offer predictions that may be tested against experimental data, providing a stringent test of a theory. The most important and accurate of the early neural models is the Hodgkin–Huxley model, which describes the action potential by a coupled set of four ordinary differential equations (ODEs).[lower-alpha 9] Although the Hodgkin–Huxley model may be a simplification with few limitations[54] compared to the realistic nervous membrane as it exists in nature, its complexity has inspired several even-more-simplified models,[55][lower-alpha 70] such as the Morris–Lecar model[lower-alpha 71] and the FitzHugh–Nagumo model,[lower-alpha 72] both of which have only two coupled ODEs. The properties of the Hodgkin–Huxley and FitzHugh–Nagumo models and their relatives, such as the Bonhoeffer–van der Pol model,[lower-alpha 73] have been well-studied within mathematics,[56][lower-alpha 74] computation[57] and electronics.[lower-alpha 75] However the simple models of generator potential and action potential fail to accurately reproduce the near threshold neural spike rate and spike shape, specifically for the mechanoreceptors like the Pacinian corpuscle.[58] More modern research has focused on larger and more integrated systems; by joining action-potential models with models of other parts of the nervous system (such as dendrites and synapses), researchers can study neural computation[59] and simple reflexes, such as escape reflexes and others controlled by central pattern generators.[60][lower-alpha 76]
File:MembraneCircuit.svg Equivalent electrical circuit for the Hodgkin–Huxley model of the action potential. Im and V m represent the current through, and the voltage across, a small patch of membrane, respectively. The Cm represents the capacitance of the membrane patch, whereas the four g's represent the conductances of four types of ions. The two conductances on the left, for potassium (K) and sodium (Na), are shown with arrows to indicate that they can vary with the applied voltage, corresponding to the voltagesensitive ion channels. The two conductances on the right help determine the resting membrane potential.
See also Anode break excitation Bursting Central pattern generator Chronaxie Neural accommodation Single-unit recording Soliton model in neuroscience
Notes 1. In general, while this simple description of action potential initiation is accurate, it does not explain phenomena such as excitation block (the ability to prevent neurons from eliciting action potentials by stimulating them with large current steps) and the ability to elicit action potentials by briefly hyperpolarizing the membrane. By analyzing the dynamics of a system of sodium and potassium channels in a membrane patch using computational models, however, these phenomena are readily explained. [lower-greek 1] 2. Note that these Purkinje fibers are muscle fibers and not related to the Purkinje cells, which are neurons found in the cerebellum.
Footnotes 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60.
1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Bullock, Orkand & Grinnell 1977, pp. 150-151. 2.0 2.1 2.2 2.3 2.4 Junge 1981, pp. 89-90. 3.0 3.1 Schmidt-Nielsen 1997, p. 484. 4.0 4.1 4.2 Purves et al. 2008, pp. 48-49; Bullock, Orkand & Grinnell 1977, p. 141; Schmidt-Nielsen 1997, p. 483; Junge 1981, p. 89. Stevens 1966, p. 127. Schmidt-Nielsen, p. 484. Bullock, Orkand & Grinnell 1977, p. 11. Silverthorn 2010, p. 253. 9.0 9.1 9.2 Purves et al. 2008, pp. 49-50; Bullock, Orkand & Grinnell 1977, pp. 140-141; Schmidt-Nielsen 1997, pp. 480-481. 10.0 10.1 10.2 10.3 Schmidt-Nielsen 1997, pp. 483-484. Bullock, Orkand & Grinnell 1977, pp. 177-240; Schmidt-Nielsen 1997, pp. 490-499; Stevens 1966, p. 47-68. Bullock, Orkand & Grinnell 1977, pp. 178-180; Schmidt-Nielsen 1997, pp. 490-491. Purves et al. 2001. Purves et al. 2008, pp. 26-28. Schmidt-Nielsen 1997, pp. 535-580; Bullock, Orkand & Grinnell 1977, pp. 49-56, 76-93, 247-255; Stevens 1966, pp. 69-79. Bullock, Orkand & Grinnell 1977, pp. 53; Bullock, Orkand & Grinnell 1977, pp. 122-124. Junge 1981, pp. 115-132. 18.0 18.1 Bullock, Orkand & Grinnell 1977, pp. 152-153. Bullock, Orkand & Grinnell 1977, pp. 444-445. Purves et al. 2008, p. 38. Stevens 1966, pp. 127-128. Purves et al. 2008, p. 61-65. Purves et al. 2008, pp. 64-74; Bullock, Orkand & Grinnell 1977, pp. 149-150; Junge 1981, pp. 84-85; Stevens 1966, pp. 152-158. 24.0 24.1 24.2 Purves et al. 2008, p. 47; Purves et al. 2008, p. 65; Bullock, Orkand & Grinnell 1977, pp. 147-148; Stevens 1966, p. 128. Goldin, AL in Waxman 2007, Neuronal Channels and Receptors, pp. 43-58. Stevens 1966, p. 49. Purves et al. 2008, p. 34; Bullock, Orkand & Grinnell 1977, p. 134; Schmidt-Nielsen 1997, pp. 478-480. 28.0 28.1 28.2 28.3 Purves et al. 2008, p. 49. 29.0 29.1 29.2 29.3 Stevens 1966, pp. 19-20. 30.0 30.1 30.2 Bullock, Orkand & Grinnell 1977, p. 151; Junge 1981, pp. 4-5. 31.0 31.1 Bullock, Orkand & Grinnell 1977, p. 152. Bullock, Orkand & Grinnell 1977, pp. 147-149; Stevens 1966, pp. 126-127. Purves et al. 2008, p. 37. 34.0 34.1 Purves et al. 2008, p. 56. Bullock, Orkland & Grinnell 1977, pp. 160-164. Stevens 1966, pp. 21-23. Bullock, Orkland & Grinnell 1977, pp. 161-164. Bullock, Orkland & Grinnell 1977, p. 509. Tasaki, I in Field 1959, pp. 75–121 Schmidt-Nielsen 1997, Figure 12.13. Bullock, Orkland & Grinnell 1977, p. 163. Waxman, SG in Waxman 2007, Multiple Sclerosis as a Neurodegenerative Disease, pp. 333-346. 43.0 43.1 Rall, W in Koch & Segev 1989, Cable Theory for Dendritic Neurons, p. 9-62. Segev, I; Fleshman, JW; Burke, RE in Koch & Segev 1989, Compartmental Models of Complex Neurons, pp. 63-96. Purves et al. 2008, pp. 52-53. Ganong 1991, pp. 59-60. Gradmann, D; Mummert, H in Spanswick, Lucas & Dainty 1980, Plant action potentials, pp. 333-344. Bullock 1965. Junge 1981, pp. 63-82. Kettenmann & Grantyn 1992. Snell, FM in Lavallee, Schanne & Hebert 1969, Some Electrical Properties of Fine-Tipped Pipette Microelectrodes. Brazier 1961; McHenry & Garrison 1969; Worden, Swazey & Adelman 1975. Bernstein 1912. Baranauskas, G.; Martina, M. (2006). "Sodium Currents Activate without a Hodgkin and Huxley-Type Delay in Central Mammalian Neurons". J. Neurosci. 26 (2): 671–684. doi:10.1523/jneurosci.228305.2006 (//dx.doi.org/10.1523%2Fjneurosci.2283-05.2006). Hoppensteadt 1986. Sato, S; Fukai, H; Nomura, T; Doi, S in Reeke et al. 2005, Bifurcation Analysis of the Hodgkin-Huxley Equations, pp. 459-478. * FitzHugh, R in Schwann 1969, Mathematical models of axcitation and propagation in nerve, pp. 12-16. * Guckenheimer & Holmes 1986, pp. 12–16 Nelson, ME; Rinzel, J in Bower & Beeman 1995, The Hodgkin-Huxley Model, pp. 29-49. * Rinzel, J & Ermentrout, GB; in Koch & Segev 1989, Analysis of Neural Excitability and Oscillations, pp. 135-169. Biswas, Abhijit; Manivannan, M.; Srinivasan, Mandyam A. (2015). "Vibrotactile Sensitivity Threshold: Nonlinear Stochastic Mechanotransduction Model of the Pacinian Corpuscle". IEEE Transactions on Haptics 8 (1): 102–113. PMID 25398183 (//www.ncbi.nlm.nih.gov/pubmed/25398183). doi:10.1109/TOH.2014.2369422 (//dx.doi.org/10.1109%2FTOH.2014.2369422). McCulloch 1988, pp. 19–39, 46–66, 72–141; Anderson & Rosenfeld 1988, pp. 15-41. Getting, PA in Koch & Segev 1989, Reconstruction of Small Neural Networks, pp. 171-194.
References Books Anderson, JA; Rosenfeld, E, eds. (1988). Neurocomputing: Foundations of Research. Cambridge, Mass.: The MIT Press. ISBN 978-0-262-01097-9. LCCN 87003022 (http://lccn.loc.gov/87003022). OCLC 15860311 (//www.worldcat.org/oclc/15860311). Bernstein, J (1912). Elektrobiologie, die Lehre von den elektrischen Vorgängen im Organismus auf moderner Grundlage dargestellt [Electric Biology, the study of the electrical processes in the organism represented on a modern basis]. Braunschweig: Vieweg und Sohn. LCCN 12027986 (http://lccn.loc.gov/12027986). OCLC 11358569 (//www.worldcat.org/oclc/11358569). Bower, JM; Beeman, D (1995). The Book of GENESIS: Exploring Realistic Neural Models with the GEneral NEural SImulation System. Santa Clara, Calif.: TELOS. ISBN 978-0-387-94019-9. LCCN 94017624 (http://lccn.loc.gov/94017624). OCLC 30518469 (//www.worldcat.org/oclc/30518469). Brazier, MAB (1961). A History of the Electrical Activity of the Brain. London: Pitman. LCCN 62001407 (http://lccn.loc.gov/62001407). OCLC 556863 (//www.worldcat.org/oclc/556863). Bullock, TH; Horridge, GA (1965). Structure and Function in the Nervous Systems of Invertebrates. A series of books in biology. San Francisco: W. H. Freeman. LCCN 65007965 (http://lccn.loc.gov/65007965). OCLC 558128 (//www.worldcat.org/oclc/558128). Bullock, TH; Orkand, R; Grinnell, A (1977). Introduction to Nervous Systems. A series of books in biology. San Francisco: W. H. Freeman. ISBN 978-0-7167-0030-2. LCCN 76003735 (http://lccn.loc.gov/76003735). OCLC 2048177 (//www.worldcat.org/oclc/2048177). Field, J (ed.). Handbook of Physiology: a Critical, Comprehensive Presentation of Physiological Knowledge and Concepts: Section 1: Neurophysiology 1. Washington, DC: American Physiological Society. LCCN 60004587 (http://lccn.loc.gov/60004587). OCLC 830755894 (//www.worldcat.org/oclc/830755894). Ganong, WF (1991). Review of Medical Physiology (15th ed.). Norwalk, Conn.: Appleton and Lange. ISBN 978-0-8385-8418-7. ISSN 0892-1253 (//www.worldcat.org/issn/0892-1253). LCCN 87642343 (http://lccn.loc.gov/87642343). OCLC 23761261 (//www.worldcat.org/oclc/23761261). Guckenheimer, J; Holmes, P (1986). Nonlinear Oscillations, Dynamical Systems and Bifurcations of Vector Fields. Applied Mathematical Sciences 42 (2nd ed.). New York: Springer Verlag. ISBN 978-0387-90819-9. OCLC 751129941 (//www.worldcat.org/oclc/751129941). Hoppensteadt, FC (1986). An Introduction to the Mathematics of Neurons. Cambridge studies in mathematical biology 6. Cambridge: Cambridge University Press. ISBN 978-0-521-31574-6. LCCN 85011013 (http://lccn.loc.gov/85011013). OCLC 12052275 (//www.worldcat.org/oclc/12052275). Junge, D (1981). Nerve and Muscle Excitation (2nd ed.). Sunderland, Mass.: Sinauer Associates. ISBN 978-0-87893-410-2. LCCN 80018158 (http://lccn.loc.gov/80018158). OCLC 6486925 (//www.worldcat.org/oclc/6486925). Kettenmann, H; Grantyn, R, eds. (1992). Practical Electrophysiological Methods: A Guide for In Vitro Studies in Vertebrate Neurobiology. New York: Wiley. ISBN 978-0-471-56200-9. LCCN 92000179 (http://lccn.loc.gov/92000179). OCLC 25204689 (//www.worldcat.org/oclc/25204689). Keynes, RD; Aidley, DJ (1991). Nerve and Muscle (2nd ed.). Cambridge: Cambridge University Press. ISBN 978-0-521-41042-7. LCCN 90015167 (http://lccn.loc.gov/90015167). OCLC 25204483 (//www.worldcat.org/oclc/25204483). Koch, C; Segev, I, eds. (1989). Methods in Neuronal Modeling: From Synapses to Networks. Cambridge, Mass.: The MIT Press. ISBN 978-0-262-11133-1. LCCN 88008279 (http://lccn.loc.gov/88008279). OCLC 18384545 (//www.worldcat.org/oclc/18384545). Lavallée, M; Schanne, OF; Hébert, NC, eds. (1969). Glass Microelectrodes. New York: Wiley. ISBN 978-0-471-51885-3. LCCN 68009252 (http://lccn.loc.gov/68009252). OCLC 686 (//www.worldcat.org/oclc/686). McCulloch, WS (1988). Embodiments of Mind. Cambridge, Mass.: The MIT Press. ISBN 978-0-262-63114-3. LCCN 88002987 (http://lccn.loc.gov/88002987). OCLC 237280 (//www.worldcat.org/oclc/237280). McHenry, LC; Garrison, FH (1969). Garrison's History of Neurology. Springfield, Ill.: Charles C. Thomas. OCLC 429733931 (//www.worldcat.org/oclc/429733931). Silverthorn, DU (2010). Human Physiology: An Integrated Approach (5th ed.). San Francisco: Pearson. ISBN 978-0-321-55980-7. LCCN 2008050369 (http://lccn.loc.gov/2008050369). OCLC 268788623 (//www.worldcat.org/oclc/268788623). Spanswick, RM; Lucas, WJ; Dainty, J, eds. (1980). Plant Membrane Transport: Current Conceptual Issues. Developments in Plant Biology 4. Amsterdam: Elsevier Biomedical Press. ISBN 978-0-44480192-0. LCCN 79025719 (http://lccn.loc.gov/79025719). OCLC 5799924 (//www.worldcat.org/oclc/5799924). Purves, D; Augustine, GJ; Fitzpatrick, D; Hall, WC; Lamantia, A-S; McNamara, JO; Williams, SM (2001). "Release of Transmitters from Synaptic Vesicles" (http://www.ncbi.nlm.nih.gov/books/bv.fcgi? rid=neurosci.section.326). Neuroscience (2nd ed.). Sunderland, MA: Sinauer Associates. ISBN 978-0-87893-742-4. LCCN 00059496 (http://lccn.loc.gov/00059496). OCLC 806472664 (//www.worldcat.org/oclc/806472664). Purves, D; Augustine, GJ; Fitzpatrick, D; Hall, WC; Lamantia, A-S; McNamara, JO; White, LE (2008). Neuroscience (4th ed.). Sunderland, MA: Sinauer Associates. ISBN 978-0-87893-697-7. LCCN 2007024950 (http://lccn.loc.gov/2007024950). OCLC 144771764 (//www.worldcat.org/oclc/144771764). Reeke, GN; Poznanski, RR; Sporns, O; Rosenberg, KA; Lindsay, eds. (2005). Modeling in the Neurosciences: from Biological Systems to Neuromimetic Robotics. Boca Raton, Fla.: Taylor & Francis. ISBN 978-0-415-32868-5. LCCN 2005298022 (http://lccn.loc.gov/2005298022). OCLC 489024131 (//www.worldcat.org/oclc/489024131). Schmidt-Nielsen, K (1997). Animal Physiology: Adaptation and Environment (5th ed.). Cambridge: Cambridge University Press. ISBN 978-0-521-57098-5. LCCN 96039295 (http://lccn.loc.gov/96039295). OCLC 35744403 (//www.worldcat.org/oclc/35744403). Schwann, HP, ed. (1969). Biological Engineering. Inter-University Electronics Series 9. New York: McGraw-Hill. ISBN 978-0-07-055734-5. LCCN 68027513 (http://lccn.loc.gov/68027513). OCLC 51993 (//www.worldcat.org/oclc/51993). Stevens, CF (1966). Neurophysiology: A Primer. New York: John Wiley and Sons. LCCN 66015872 (http://lccn.loc.gov/66015872). OCLC 1175605 (//www.worldcat.org/oclc/1175605). Waxman, SG, ed. (2007). Molecular Neurology. Burlington, Mass.: Elsevier Academic Press. ISBN 978-0-12-369509-3. LCCN 2008357317 (http://lccn.loc.gov/2008357317). OCLC 154760295 (//www.worldcat.org/oclc/154760295). Worden, FG; Swazey, JP; Adelman, G, eds. (1975). The Neurosciences, Paths of Discovery. Cambridge, Mass.: The MIT Press. ISBN 978-0-262-23072-8. LCCN 75016379 (http://lccn.loc.gov/75016379). OCLC 1500233 (//www.worldcat.org/oclc/1500233).
Journal articles a. MacDonald PE, Rorsman P (February 2006). "Oscillations, intercellular coupling, and insulin secretion in pancreatic beta cells" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1363709). PLoS Biol. 4 (2): e49. PMC 1363709 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1363709). PMID 16464129 (//www.ncbi.nlm.nih.gov/pubmed/16464129). doi:10.1371/journal.pbio.0040049 (//dx.doi.org/10.1371%2Fjournal.pbio.0040049). b. 2.0 2.1 Barnett MW, Larkman PM (June 2007). "The action potential" (http://pn.bmj.com/content/7/3/192.short). Pract Neurol 7 (3): 192–7. PMID 17515599 (//www.ncbi.nlm.nih.gov/pubmed/17515599). c. Golding NL, Kath WL, Spruston N (December 2001). "Dichotomy of action-potential backpropagation in CA1 pyramidal neuron dendrites" (http://jn.physiology.org/cgi/content/abstract/86/6/2998). J. Neurophysiol. 86 (6): 2998–3010. PMID 11731556 (//www.ncbi.nlm.nih.gov/pubmed/11731556). d. Sasaki, T., Matsuki, N., Ikegaya, Y. 2011 Action-potential modulation during axonal conduction Science 331 (6017), pp. 599-601 e. Aur, D.; Connolly, C.I.; Jog, M.S. (2005). "Computing spike directivity with tetrodes". Journal of Neuroscience Methods 149 (1): 57–63. doi:10.1016/j.jneumeth.2005.05.006 (//dx.doi.org/10.1016%2Fj.jneumeth.2005.05.006). f. Aur D., Jog, MS., 2010 Neuroelectrodynamics: Understanding the brain language, IOS Press, 2010. doi:10.3233/978-1-60750-473-3-i (//dx.doi.org/10.3233%2F978-1-60750-473-3-i) g. Noble D (1960). "Cardiac action and pacemaker potentials based on the Hodgkin-Huxley equations". Nature 188 (4749): 495–497. Bibcode:1960Natur.188..495N (http://adsabs.harvard.edu/abs/1960Natur.188..495N). PMID 13729365 (//www.ncbi.nlm.nih.gov/pubmed/13729365). doi:10.1038/188495b0 (//dx.doi.org/10.1038%2F188495b0). h. 8.0 8.1 Goldman DE (1943). "Potential, impedance and rectification in membranes" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2142582). J. Gen. Physiol. 27 (1): 37–60. PMC 2142582 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2142582). PMID 19873371 (//www.ncbi.nlm.nih.gov/pubmed/19873371). doi:10.1085/jgp.27.1.37 (//dx.doi.org/10.1085%2Fjgp.27.1.37). i. 9.0 9.1 9.2 9.3 9.4 Hodgkin AL, Huxley AF, Katz B (1952). "Measurements of current-voltage relations in the membrane of the giant axon of Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392213). Journal of Physiology 116 (4): 424–448. PMC 1392213 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392213). PMID 14946713 (//www.ncbi.nlm.nih.gov/pubmed/14946713). * Hodgkin AL, Huxley AF (1952). "Currents carried by sodium and potassium ions through the membrane of the giant axon of Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392213). Journal of Physiology 116 (4): 449–472. PMC 1392213 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392213). PMID 14946713 (//www.ncbi.nlm.nih.gov/pubmed/14946713). * Hodgkin AL, Huxley AF (1952). "The components of membrane conductance in the giant axon of Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392209). J Physiol 116 (4): 473–496. PMC 1392209 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392209). PMID 14946714 (//www.ncbi.nlm.nih.gov/pubmed/14946714). doi:10.1113/jphysiol.1952.sp004718 (//dx.doi.org/10.1113%2Fjphysiol.1952.sp004718). * Hodgkin AL, Huxley AF (1952). "The dual effect of membrane potential on sodium conductance in the giant axon of Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392212). J Physiol 116 (4): 497– 506. PMC 1392212 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392212). PMID 14946715 (//www.ncbi.nlm.nih.gov/pubmed/14946715). doi:10.1113/jphysiol.1952.sp004719 (//dx.doi.org/10.1113%2Fjphysiol.1952.sp004719). * Hodgkin AL, Huxley AF (1952). "A quantitative description of membrane current and its application to conduction and excitation in nerve" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392413). J Physiol 117 (4): 500–544. PMC 1392413 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392413). PMID 12991237 (//www.ncbi.nlm.nih.gov/pubmed/12991237). doi:10.1113/jphysiol.1952.sp004764 (//dx.doi.org/10.1113%2Fjphysiol.1952.sp004764). j. Naundorf B, Wolf F, Volgushev M (April 2006). "Unique features of action potential initiation in cortical neurons" (http://www.nature.com/nature/journal/v440/n7087/abs/nature04610.html) (LETTER). Nature 440 (7087): 1060–1063. Bibcode:2006Natur.440.1060N (http://adsabs.harvard.edu/abs/2006Natur.440.1060N). PMID 16625198 (//www.ncbi.nlm.nih.gov/pubmed/16625198). doi:10.1038/nature04610 (//dx.doi.org/10.1038%2Fnature04610). Retrieved 2008-03-27. k. Hodgkin AL (1937). "Evidence for electrical transmission in nerve, Part I" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1395060). Journal of Physiology 90 (2): 183–210. PMC 1395060 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1395060). PMID 16994885 (//www.ncbi.nlm.nih.gov/pubmed/16994885). * Hodgkin AL (1937). "Evidence for electrical transmission in nerve, Part II" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1395062). Journal of Physiology 90 (2): 211–32. PMC 1395062 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1395062). PMID 16994886 (//www.ncbi.nlm.nih.gov/pubmed/16994886). l. Zalc B (2006). "The acquisition of myelin: a success story". Novartis Found. Symp. Novartis Foundation Symposia 276: 15–21; discussion 21–5, 54–7, 275–81. ISBN 978-0-470-03224-4. PMID 16805421 (//www.ncbi.nlm.nih.gov/pubmed/16805421). doi:10.1002/9780470032244.ch3 (//dx.doi.org/10.1002%2F9780470032244.ch3). m. S. Poliak & E. Peles (2006). "The local differentiation of myelinated axons at nodes of Ranvier". Nature Reviews Neuroscience 12 (4): 968–80. PMID 14682359 (//www.ncbi.nlm.nih.gov/pubmed/14682359). doi:10.1038/nrn1253 (//dx.doi.org/10.1038%2Fnrn1253). n. Simons M, Trotter J (October 2007). "Wrapping it up: the cell biology of myelination". Curr. Opin. Neurobiol. 17 (5): 533–40. PMID 17923405 (//www.ncbi.nlm.nih.gov/pubmed/17923405). doi:10.1016/j.conb.2007.08.003 (//dx.doi.org/10.1016%2Fj.conb.2007.08.003). o. Xu K, Terakawa S (1 August 1999). "Fenestration nodes and the wide submyelinic space form the basis for the unusually fast impulse conduction of shrimp myelinated axons" (http://jeb.biologists.org/cgi/pmidlookup?view=long&pmid=10395528). J. Exp. Biol. 202 (Pt 15): 1979–89. PMID 10395528 (//www.ncbi.nlm.nih.gov/pubmed/10395528). p. 16.0 16.1 Hursh JB (1939). "Conduction velocity and diameter of nerve fibers". American Journal of Physiology 127: 131–39. q. Lillie RS (1925). "Factors affecting transmission and recovery in passive iron nerve model" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2140733). J. Gen. Physiol. 7 (4): 473–507. PMC 2140733 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2140733). PMID 19872151 (//www.ncbi.nlm.nih.gov/pubmed/19872151). doi:10.1085/jgp.7.4.473 (//dx.doi.org/10.1085%2Fjgp.7.4.473). See also Keynes and Aidley, p. 78. r. Tasaki I (1939). "Electro-saltatory transmission of nerve impulse and effect of narcosis upon nerve fiber". Amer. J. Physiol. 127: 211–27. s. Tasaki I, Takeuchi T (1941). "Der am Ranvierschen Knoten entstehende Aktionsstrom und seine Bedeutung für die Erregungsleitung". Pflüger's Arch. Ges. Physiol. 244 (6): 696–711. doi:10.1007/BF01755414 (//dx.doi.org/10.1007%2FBF01755414). * Tasaki I, Takeuchi T (1942). "Weitere Studien über den Aktionsstrom der markhaltigen Nervenfaser und über die elektrosaltatorische Übertragung des nervenimpulses". Pflüger's Arch. Ges. Physiol. 245 (5): 764–82. doi:10.1007/BF01755237 (//dx.doi.org/10.1007%2FBF01755237). t. Huxley A, Stämpfli R (1949). "Evidence for saltatory conduction in peripheral myelinated nerve-fibers". Journal of Physiology 108: 315–39. doi:10.1113/jphysiol.1949.sp004335 (//dx.doi.org/10.1113%2Fjphysiol.1949.sp004335). * Huxley A, Stämpfli R (1949). "Direct determination of membrane resting potential and action potential in single myelinated nerve fibers" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1393015). Journal of Physiology 112 (3–4): 476–95. PMC 1393015 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1393015). PMID 14825228 (//www.ncbi.nlm.nih.gov/pubmed/14825228). u. Rushton WAH (1951). "A theory of the effects of fibre size in the medullated nerve" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392008). Journal of Physiology 115 (1): 101–22. PMC 1392008 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1392008). PMID 14889433 (//www.ncbi.nlm.nih.gov/pubmed/14889433). v. 22.0 22.1 Hartline DK, Colman DR (2007). "Rapid conduction and the evolution of giant axons and myelinated fibers". Curr. Biol. 17 (1): R29–R35. PMID 17208176 (//www.ncbi.nlm.nih.gov/pubmed/17208176). doi:10.1016/j.cub.2006.11.042 (//dx.doi.org/10.1016%2Fj.cub.2006.11.042). w. Miller RH, Mi S (2007). "Dissecting demyelination". Nat. Neurosci. 10 (11): 1351–54. PMID 17965654 (//www.ncbi.nlm.nih.gov/pubmed/17965654). doi:10.1038/nn1995 (//dx.doi.org/10.1038%2Fnn1995). x. Kelvin WT (1855). "On the theory of the electric telegraph". Proceedings of the Royal Society 7: 382–99. doi:10.1098/rspl.1854.0093 (//dx.doi.org/10.1098%2Frspl.1854.0093). y. Hodgkin AL, Rushton WAH (1946). "The electrical constants of a crustacean nerve fibre". Proceedings of the Royal Society B 133 (873): 444–79. Bibcode:1946RSPSB.133..444H (http://adsabs.harvard.edu/abs/1946RSPSB.133..444H). PMID 20281590 (//www.ncbi.nlm.nih.gov/pubmed/20281590). doi:10.1098/rspb.1946.0024 (//dx.doi.org/10.1098%2Frspb.1946.0024). z. Süudhof TC (2008). "Neurotransmitter release". Handb Exp Pharmacol. Handbook of Experimental Pharmacology 184 (184): 1–21. ISBN 978-3-540-74804-5. PMID 18064409 (//www.ncbi.nlm.nih.gov/pubmed/18064409). doi:10.1007/978-3-540-74805-2_1 (//dx.doi.org/10.1007%2F978-3-540-74805-2_1). aa. Rusakov DA (August 2006). "Ca2+-dependent mechanisms of presynaptic control at central synapses" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2684670). Neuroscientist 12 (4): 317–26. PMC 2684670 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2684670). PMID 16840708 (//www.ncbi.nlm.nih.gov/pubmed/16840708). doi:10.1177/1073858405284672 (//dx.doi.org/10.1177%2F1073858405284672). ab. Humeau Y, Doussau F, Grant NJ, Poulain B (May 2000). "How botulinum and tetanus neurotoxins block neurotransmitter release". Biochimie 82 (5): 427–46. PMID 10865130 (//www.ncbi.nlm.nih.gov/pubmed/10865130). doi:10.1016/S0300-9084(00)00216-9 (//dx.doi.org/10.1016%2FS0300-9084%2800%2900216-9). ac. Zoidl G, Dermietzel R (2002). "On the search for the electrical synapse: a glimpse at the future". Cell Tissue Res. 310 (2): 137–42. PMID 12397368 (//www.ncbi.nlm.nih.gov/pubmed/12397368). doi:10.1007/s00441-002-0632-x (//dx.doi.org/10.1007%2Fs00441-002-0632-x). ad. Brink PR, Cronin K, Ramanan SV (1996). "Gap junctions in excitable cells". J. Bioenerg. Biomembr. 28 (4): 351–8. PMID 8844332 (//www.ncbi.nlm.nih.gov/pubmed/8844332). doi:10.1007/BF02110111 (//dx.doi.org/10.1007%2FBF02110111). ae. Hirsch NP (July 2007). "Neuromuscular junction in health and disease" (http://bja.oxfordjournals.org/cgi/pmidlookup?view=long&pmid=17573397). Br J Anaesth 99 (1): 132–8. PMID 17573397 (//www.ncbi.nlm.nih.gov/pubmed/17573397). doi:10.1093/bja/aem144 (//dx.doi.org/10.1093%2Fbja%2Faem144). af. Hughes BW, Kusner LL, Kaminski HJ (April 2006). "Molecular architecture of the neuromuscular junction". Muscle Nerve 33 (4): 445–61. PMID 16228970 (//www.ncbi.nlm.nih.gov/pubmed/16228970). doi:10.1002/mus.20440 (//dx.doi.org/10.1002%2Fmus.20440). ag. 33.0 33.1 Newmark J (2007). "Nerve agents". Neurologist 13 (1): 20–32. PMID 17215724 (//www.ncbi.nlm.nih.gov/pubmed/17215724). doi:10.1097/01.nrl.0000252923.04894.53 (//dx.doi.org/10.1097%2F01.nrl.0000252923.04894.53). ah. Costa LG (2006). "Current issues in organophosphate toxicology". Clin. Chim. Acta 366 (1–2): 1–13. PMID 16337171 (//www.ncbi.nlm.nih.gov/pubmed/16337171). doi:10.1016/j.cca.2005.10.008 (//dx.doi.org/10.1016%2Fj.cca.2005.10.008). ai. 35.0 35.1 35.2 Kléber AG, Rudy Y (April 2004). "Basic mechanisms of cardiac impulse propagation and associated arrhythmias" (http://physrev.physiology.org/cgi/pmidlookup? view=long&pmid=15044680). Physiol. Rev. 84 (2): 431–88. PMID 15044680 (//www.ncbi.nlm.nih.gov/pubmed/15044680). doi:10.1152/physrev.00025.2003 (//dx.doi.org/10.1152%2Fphysrev.00025.2003). aj. Tamargo J, Caballero R, Delpón E (January 2004). "Pharmacological approaches in the treatment of atrial fibrillation". Curr. Med. Chem. 11 (1): 13–28. PMID 14754423 (//www.ncbi.nlm.nih.gov/pubmed/14754423). doi:10.2174/0929867043456241 (//dx.doi.org/10.2174%2F0929867043456241). ak. Slayman CL, Long WS, Gradmann D (1976). "Action potentials in Neurospora crassa , a mycelial fungus". Biochimica et Biophysica Acta 426 (4): 737–744. PMID 130926 (//www.ncbi.nlm.nih.gov/pubmed/130926). doi:10.1016/0005-2736(76)90138-3 (//dx.doi.org/10.1016%2F0005-2736%2876%2990138-3). al. Mummert H, Gradmann D (1991). "Action potentials in Acetabularia: measurement and simulation of voltage-gated fluxes". Journal of Membrane Biology 124 (3): 265–273. PMID 1664861 (//www.ncbi.nlm.nih.gov/pubmed/1664861). doi:10.1007/BF01994359 (//dx.doi.org/10.1007%2FBF01994359). am. Gradmann D (2001). "Models for oscillations in plants". Austr. J. Plant Physiol. 28: 577–590. an. Beilby MJ (2007). "Action potentials in charophytes". Int. Rev. Cytol. International Review of Cytology 257: 43–82. ISBN 978-0-12-373701-4. PMID 17280895 (//www.ncbi.nlm.nih.gov/pubmed/17280895). doi:10.1016/S0074-7696(07)57002-6 (//dx.doi.org/10.1016%2FS0074-7696%2807%2957002-6). ao. Gradmann D, Hoffstadt J (1998). "Electrocoupling of ion transporters in plants: Interaction with internal ion concentrations". Journal of Membrane Biology 166 (1): 51–59. PMID 9784585 (//www.ncbi.nlm.nih.gov/pubmed/9784585). doi:10.1007/s002329900446 (//dx.doi.org/10.1007%2Fs002329900446). ap. Fromm J, Lautner S (2007). "Electrical signals and their physiological significance in plants". Plant Cell Environ. 30 (3): 249–257. PMID 17263772 (//www.ncbi.nlm.nih.gov/pubmed/17263772). doi:10.1111/j.1365-3040.2006.01614.x (//dx.doi.org/10.1111%2Fj.1365-3040.2006.01614.x). aq. Leys SP, Mackie GO, Meech RW (1 May 1999). "Impulse conduction in a sponge" (http://jeb.biologists.org/cgi/pmidlookup?view=long&pmid=10101111). J. Exp. Biol. 202 (9): 1139–50. PMID 10101111 (//www.ncbi.nlm.nih.gov/pubmed/10101111). ar. Keynes RD (1989). "The role of giant axons in studies of the nerve impulse". BioEssays 10 (2–3): 90–93. PMID 2541698 (//www.ncbi.nlm.nih.gov/pubmed/2541698). doi:10.1002/bies.950100213 (//dx.doi.org/10.1002%2Fbies.950100213). as. Meunier C, Segev I (2002). "Playing the devil's advocate: is the Hodgkin-Huxley model useful?". Trends Neurosci. 25 (11): 558–63. PMID 12392930 (//www.ncbi.nlm.nih.gov/pubmed/12392930). doi:10.1016/S0166-2236(02)02278-6 (//dx.doi.org/10.1016%2FS0166-2236%2802%2902278-6). at. Cole KS (1949). "Dynamic electrical characteristics of the squid axon membrane". Arch. Sci. Physiol. 3: 253–8. au. Ling G, Gerard RW (1949). "The normal membrane potential of frog sartorius fibers". J. Cell. Comp. Physiol. 34 (3): 383–396. PMID 15410483 (//www.ncbi.nlm.nih.gov/pubmed/15410483). doi:10.1002/jcp.1030340304 (//dx.doi.org/10.1002%2Fjcp.1030340304). av. Nastuk WL, Hodgkin AL (1950). "The electrical activity of single muscle fibers". J. Cell. Comp. Physiol. 35: 39–73. doi:10.1002/jcp.1030350105 (//dx.doi.org/10.1002%2Fjcp.1030350105). aw. Brock LG, Coombs JS, Eccles JC (1952). "The recording of potentials from motoneurones with an intracellular electrode". J. Physiol. (London) 117: 431–460. ax. Ross WN, Salzberg BM, Cohen LB, Davila HV (1974). "A large change in dye absorption during the action potential" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1334592). Biophysical Journal 14 (12): 983–986. Bibcode:1974BpJ....14..983R (http://adsabs.harvard.edu/abs/1974BpJ....14..983R). PMC 1334592 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1334592). PMID 4429774 (//www.ncbi.nlm.nih.gov/pubmed/4429774). doi:10.1016/S0006-3495(74)85963-1 (//dx.doi.org/10.1016%2FS0006-3495%2874%2985963-1). * Grynkiewicz G, Poenie M, Tsien RY (1985). "A new generation of Ca2+ indicators with greatly improved fluorescence properties". J. Biol. Chem. 260 (6): 3440–3450. PMID 3838314 (//www.ncbi.nlm.nih.gov/pubmed/3838314). ay. Bu G, Adams H, Berbari EJ, Rubart M (March 2009). "Uniform action potential repolarization within the sarcolemma of in situ ventricular cardiomyocytes" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2907679). Biophys. J. 96 (6): 2532–46. Bibcode:2009BpJ....96.2532B (http://adsabs.harvard.edu/abs/2009BpJ....96.2532B). PMC 2907679 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2907679). PMID 19289075 (//www.ncbi.nlm.nih.gov/pubmed/19289075). doi:10.1016/j.bpj.2008.12.3896 (//dx.doi.org/10.1016%2Fj.bpj.2008.12.3896). az. Nakamura Y, Nakajima S, Grundfest H (1965). "The effect of tetrodotoxin on electrogenic components of squid giant axons". J. Gen. Physiol. 48 (6): 985–996. doi:10.1085/jgp.48.6.975 (//dx.doi.org/10.1085%2Fjgp.48.6.975). * Ritchie JM, Rogart RB (1977). "The binding of saxitoxin and tetrodotoxin to excitable tissue". Rev. Physiol. Biochem. Pharmacol. Reviews of Physiology, Biochemistry and Pharmacology 79: 1–50. ISBN 0-387-08326-X. PMID 335473 (//www.ncbi.nlm.nih.gov/pubmed/335473). doi:10.1007/BFb0037088 (//dx.doi.org/10.1007%2FBFb0037088). * Keynes RD, Ritchie JM (1984). "On the binding of labelled saxitoxin to the squid giant axon". Proc. R. Soc. Lond. 239: 393–434. ba. Piccolino M (1997). "Luigi Galvani and animal electricity: two centuries after the foundation of electrophysiology". Trends in Neuroscience 20 (10): 443–448. doi:10.1016/S0166-2236(97)01101-6 (//dx.doi.org/10.1016%2FS0166-2236%2897%2901101-6). bb. Piccolino M (2000). "The bicentennial of the Voltaic battery (1800–2000): the artificial electric organ". Trends in Neuroscience 23 (4): 147–151. doi:10.1016/S0166-2236(99)01544-1 (//dx.doi.org/10.1016%2FS0166-2236%2899%2901544-1). bc. Bernstein J (1902). "Untersuchungen zur Thermodynamik der bioelektrischen Ströme". Pflüger's Arch. Ges. Physiol. 92 (10–12): 521–562. doi:10.1007/BF01790181 (//dx.doi.org/10.1007%2FBF01790181). bd. Cole KS, Curtis HJ (1939). "Electrical impedance of the squid giant axon during activity" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2142006). J. Gen. Physiol. 22 (5): 649–670. PMC 2142006 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2142006). PMID 19873125 (//www.ncbi.nlm.nih.gov/pubmed/19873125). doi:10.1085/jgp.22.5.649 (//dx.doi.org/10.1085%2Fjgp.22.5.649). be. Lapicque L (1907). "Recherches quantitatives sur l'excitationelectrique des nerfs traitee comme une polarisation". J. Physiol. Pathol. Gen 9: 620– 635. bf. Hodgkin AL, Katz B (1949). "The effect of sodium ions on the electrical activity of the giant axon of the squid". J. Physiology 108: 37–77. bg. Neher E, Sakmann B (1976). "Single-channel currents recorded from membrane of denervated frog muscle fibres". Nature 260 (5554): 779–802. Bibcode:1976Natur.260..799N (http://adsabs.harvard.edu/abs/1976Natur.260..799N). PMID 1083489 (//www.ncbi.nlm.nih.gov/pubmed/1083489). doi:10.1038/260799a0 (//dx.doi.org/10.1038%2F260799a0). * Hamill OP, Marty A, Neher E, Sakmann B, Sigworth FJ (1981). "Improved patch-clamp techniques for high-resolution current recording from cells and cell-free membrane patches". Pflugers Arch. 391 (2): 85–100. PMID 6270629 (//www.ncbi.nlm.nih.gov/pubmed/6270629). doi:10.1007/BF00656997 (//dx.doi.org/10.1007%2FBF00656997). * Neher E, Sakmann B (1992). "The patch clamp technique". Scientific American 266 (3): 44–51. PMID 1374932 (//www.ncbi.nlm.nih.gov/pubmed/1374932). doi:10.1038/scientificamerican0392-44 (//dx.doi.org/10.1038%2Fscientificamerican0392-44). bh. Yellen G (2002). "The voltage-gated potassium channels and their relatives". Nature 419 (6902): 35–42. PMID 12214225 (//www.ncbi.nlm.nih.gov/pubmed/12214225). doi:10.1038/nature00978 (//dx.doi.org/10.1038%2Fnature00978). bi. Doyle DA; Morais Cabral J; Pfuetzner RA; Kuo A; Gulbis JM; Cohen SL et al. (1998). "The structure of the potassium channel, molecular basis of K+ conduction and selectivity". Science 280 (5360): 69– 77. Bibcode:1998Sci...280...69D (http://adsabs.harvard.edu/abs/1998Sci...280...69D). PMID 9525859 (//www.ncbi.nlm.nih.gov/pubmed/9525859). doi:10.1126/science.280.5360.69 (//dx.doi.org/10.1126%2Fscience.280.5360.69). * Zhou Y, Morias-Cabrak JH, Kaufman A, MacKinnon R (2001). "Chemistry of ion coordination and hydration revealed by a K+-Fab complex at 2.0 A resolution". Nature 414 (6859): 43–48. PMID 11689936 (//www.ncbi.nlm.nih.gov/pubmed/11689936). doi:10.1038/35102009 (//dx.doi.org/10.1038%2F35102009). * Jiang Y, Lee A, Chen J, Ruta V, Cadene M, Chait BT, MacKinnon R (2003). "X-ray structure of a voltage-dependent K+ channel". Nature 423 (6935): 33–41. Bibcode:2003Natur.423...33J (http://adsabs.harvard.edu/abs/2003Natur.423...33J). PMID 12721618 (//www.ncbi.nlm.nih.gov/pubmed/12721618). doi:10.1038/nature01580 (//dx.doi.org/10.1038%2Fnature01580). bj. Cha A, Snyder GE, Selvin PR, Bezanilla F (1999). "Atomic-scale movement of the voltage-sensing region in a potassium channel measured via spectroscopy". Nature 402 (6763): 809–813. PMID 10617201 (//www.ncbi.nlm.nih.gov/pubmed/10617201). doi:10.1038/45552 (//dx.doi.org/10.1038%2F45552). * Glauner KS, Mannuzzu LM, Gandhi CS, Isacoff E (1999). "Spectroscopic mapping of voltage sensor movement in the Shaker potassium channel". Nature 402 (6763): 813–817. Bibcode:1999Natur.402..813G (http://adsabs.harvard.edu/abs/1999Natur.402..813G). PMID 10617202 (//www.ncbi.nlm.nih.gov/pubmed/10617202). doi:10.1038/45561 (//dx.doi.org/10.1038%2F45561). * Bezanilla F (2000). "The voltage sensor in voltage-dependent ion channels". Physiol. Rev. 80 (2): 555–592. PMID 10747201 (//www.ncbi.nlm.nih.gov/pubmed/10747201). bk. Catterall WA (2001). "A 3D view of sodium channels". Nature 409 (6823): 988–999. PMID 11234048 (//www.ncbi.nlm.nih.gov/pubmed/11234048). doi:10.1038/35059188 (//dx.doi.org/10.1038%2F35059188). * Sato C; Ueno Y; Asai K; Takahashi K; Sato M; Engel A et al. (2001). "The voltage-sensitive sodium channel is a bell-shaped molecule with several cavities". Nature 409 (6823): 1047–1051. PMID 11234014 (//www.ncbi.nlm.nih.gov/pubmed/11234014). doi:10.1038/35059098 (//dx.doi.org/10.1038%2F35059098). bl. Skou J (1957). "The influence of some cations on an adenosine triphosphatase from peripheral nerves". Biochim Biophys Acta 23 (2): 394–401. PMID 13412736 (//www.ncbi.nlm.nih.gov/pubmed/13412736). doi:10.1016/0006-3002(57)90343-8 (//dx.doi.org/10.1016%2F0006-3002%2857%2990343-8). bm. Hodgkin AL, Keynes RD (1955). "Active transport of cations in giant axons from Sepia and Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1365754). J. Physiol. 128 (1): 28–60. PMC 1365754 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1365754). PMID 14368574 (//www.ncbi.nlm.nih.gov/pubmed/14368574). bn. Caldwell PC, Hodgkin AL, Keynes RD, Shaw TI (1960). "The effects of injecting energy-rich phosphate compounds on the active transport of ions in the giant axons of Loligo" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1363339). J. Physiol. 152 (3): 561–90. PMC 1363339 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1363339). PMID 13806926 (//www.ncbi.nlm.nih.gov/pubmed/13806926). bo. Caldwell PC, Keynes RD (1957). "The utilization of phosphate bond energy for sodium extrusion from giant axons". J. Physiol. (London) 137 (1): 12–13P. PMID 13439598 (//www.ncbi.nlm.nih.gov/pubmed/13439598). bp. Morth JP, Pedersen PB, Toustrup-Jensen MS, Soerensen TLM, Petersen J, Andersen JP, Vilsen B, Nissen P (2007). "Crystal structure of the sodium–potassium pump". Nature 450 (7172): 1043–1049. Bibcode:2007Natur.450.1043M (http://adsabs.harvard.edu/abs/2007Natur.450.1043M). PMID 18075585 (//www.ncbi.nlm.nih.gov/pubmed/18075585). doi:10.1038/nature06419 (//dx.doi.org/10.1038%2Fnature06419). bq. Lee AG, East JM (2001). "What the structure of a calcium pump tells us about its mechanism" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1221895). Biochemical Journal 356 (Pt 3): 665–683. PMC 1221895 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1221895). PMID 11389676 (//www.ncbi.nlm.nih.gov/pubmed/11389676). doi:10.1042/0264-6021:3560665 (//dx.doi.org/10.1042%2F02646021%3A3560665). br. * FitzHugh R (1960). "Thresholds and plateaus in the Hodgkin-Huxley nerve equations" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2195039). J. Gen. Physiol. 43 (5): 867–896. PMC 2195039 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2195039). PMID 13823315 (//www.ncbi.nlm.nih.gov/pubmed/13823315). doi:10.1085/jgp.43.5.867 (//dx.doi.org/10.1085%2Fjgp.43.5.867). * Kepler TB, Abbott LF, Marder E (1992). "Reduction of conductance-based neuron models". Biological Cybernetics 66 (5): 381–387. PMID 1562643 (//www.ncbi.nlm.nih.gov/pubmed/1562643). doi:10.1007/BF00197717 (//dx.doi.org/10.1007%2FBF00197717). bs. Morris C, Lecar H (1981). "Voltage oscillations in the barnacle giant muscle fiber" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1327511). Biophysical Journal 35 (1): 193–213. Bibcode:1981BpJ....35..193M (http://adsabs.harvard.edu/abs/1981BpJ....35..193M). PMC 1327511 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1327511). PMID 7260316 (//www.ncbi.nlm.nih.gov/pubmed/7260316). doi:10.1016/S0006-3495(81)84782-0 (//dx.doi.org/10.1016%2FS0006-3495%2881%2984782-0). bt. FitzHugh R (1961). "Impulses and physiological states in theoretical models of nerve membrane" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1366333). Biophysical Journal 1 (6): 445–466. Bibcode:1961BpJ.....1..445F (http://adsabs.harvard.edu/abs/1961BpJ.....1..445F). PMC 1366333 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC1366333). PMID 19431309 (//www.ncbi.nlm.nih.gov/pubmed/19431309). doi:10.1016/S0006-3495(61)86902-6 (//dx.doi.org/10.1016%2FS0006-3495%2861%2986902-6). * Nagumo J, Arimoto S, Yoshizawa S (1962). "An active pulse transmission line simulating nerve axon". Proceedings of the IRE 50 (10): 2061–2070. doi:10.1109/JRPROC.1962.288235 (//dx.doi.org/10.1109%2FJRPROC.1962.288235). bu. Bonhoeffer KF (1948). "Activation of Passive Iron as a Model for the Excitation of Nerve" (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2213747). J. Gen. Physiol. 32 (1): 69–91. PMC 2213747 (//www.ncbi.nlm.nih.gov/pmc/articles/PMC2213747). PMID 18885679 (//www.ncbi.nlm.nih.gov/pubmed/18885679). doi:10.1085/jgp.32.1.69 (//dx.doi.org/10.1085%2Fjgp.32.1.69). * Bonhoeffer KF (1953). "Modelle der Nervenerregung". Naturwissenschaften 40 (11): 301–311. Bibcode:1953NW.....40..301B (http://adsabs.harvard.edu/abs/1953NW.....40..301B). doi:10.1007/BF00632438 (//dx.doi.org/10.1007%2FBF00632438). * van der Pol B (1926). "On relaxation-oscillations". Philosophical Magazine 2: 977–992. * van der Pol B, van der Mark J (1928). "The heartbeat considered as a relaxation oscillation, and an electrical model of the heart". Philosophical Magazine 6: 763–775. * van der Pol B, van der Mark J (1929). "The heartbeat considered as a relaxation oscillation, and an electrical model of the heart". Arch. Neerl. Physiol. 14: 418–443. bv. Evans JW (1972). "Nerve axon equations. I. Linear approximations". Indiana U. Math. Journal 21 (9): 877–885. doi:10.1512/iumj.1972.21.21071 (//dx.doi.org/10.1512%2Fiumj.1972.21.21071). * Evans JW, Feroe J (1977). "Local stability theory of the nerve impulse". Math. Biosci. 37: 23–50. doi:10.1016/0025-5564(77)90076-1 (//dx.doi.org/10.1016%2F0025-5564%2877%2990076-1). bw. Keener JP (1983). "Analogue circuitry for the van der Pol and FitzHugh-Nagumo equations". IEEE Trans. on Systems, Man and Cybernetics 13 (5): 1010–1014. doi:10.1109/TSMC.1983.6313098 (//dx.doi.org/10.1109%2FTSMC.1983.6313098). bx. Hooper SL (March 2000). "Central pattern generators". Curr. Biol. 10 (5): R176. PMID 10713861 (//www.ncbi.nlm.nih.gov/pubmed/10713861). doi:10.1016/S0960-9822(00)00367-5 (//dx.doi.org/10.1016%2FS0960-9822%2800%2900367-5). CiteSeerX: 10.1.1.133.3378 (http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.3378).
Web pages . "FitzHugh-Nagumo model" (http://www.scholarpedia.org/article/FitzHugh-Nagumo_model). Retrieved 24 May 2014. . "The Nobel Prize in Physiology or Medicine 1963" (http://nobelprize.org/nobel_prizes/medicine/laureates/1963/index.html) (Press release). The Royal Swedish Academy of Science. 1963. Retrieved 2010-02-21. . "The Nobel Prize in Physiology or Medicine 1991" (http://nobelprize.org/nobel_prizes/medicine/laureates/1991/press.html) (Press release). The Royal Swedish Academy of Science. 1991. Retrieved 2010-02-21. . "The Nobel Prize in Physiology or Medicine 1906" (http://nobelprize.org/medicine/laureates/1906/index.html) (Press release). The Royal Swedish Academy of Science. 1906. Retrieved 2010-02-21. . Warlow, Charles. "The Recent Evolution of a Symbiotic Ion Channel in the Legume Family Altered Ion Conductance and Improved Functionality in Calcium Signaling" (http://pn.bmj.com.myaccess.library.utoronto.ca/content/7/3/192.full#cited-by). BMJ Publishing Group. Retrieved 23 March 2013. . "The Nobel Prize in Chemistry 1997" (http://nobelprize.org/nobel_prizes/medicine/laureates/1997/press.html) (Press release). The Royal Swedish Academy of Science. 1997. Retrieved 2010-02-21.
Further reading Aidley DJ, Stanfield PR (1996). Ion Channels: Molecules in Action. Cambridge: Cambridge University Press. ISBN 978-0-521-49882-1. Bear MF, Connors BW, Paradiso MA (2001). Neuroscience: Exploring the Brain. Baltimore: Lippincott. ISBN 0-7817-3944-6. Clay JR (May 2005). "Axonal excitability revisited". Prog Biophys Mol Biol 88 (1): 59–90. PMID 15561301 (//www.ncbi.nlm.nih.gov/pubmed/15561301). doi:10.1016/j.pbiomolbio.2003.12.004 (//dx.doi.org/10.1016%2Fj.pbiomolbio.2003.12.004). Deutsch S, Micheli-Tzanakou E (1987). Neuroelectric Systems. New York: New York University Press. ISBN 0-8147-1782-9. Hille B (2001). Ion Channels of Excitable Membranes (3rd ed.). Sunderland, MA: Sinauer Associates. ISBN 978-0-87893-321-1. Johnston D, Wu SM-S (1995). Foundations of Cellular Neurophysiology. Cambridge, MA: Bradford Book, The MIT Press. ISBN 0-262-10053-3. Kandel ER, Schwartz JH, Jessell TM (2000). Principles of Neural Science (4th ed.). New York: McGraw-Hill. ISBN 0-8385-7701-6. Miller C (1987). "How ion channel proteins work". In LK Kaczmarek, IB Levitan. Neuromodulation: The Biochemical Control of Neuronal Excitability. New York: Oxford University Press. pp. 39–63. ISBN 978-0-19-504097-5. Nelson DL, Cox MM (2008). Lehninger Principles of Biochemistry (5th ed.). New York: W. H. Freeman. ISBN 978-0-7167-7108-1.
External links Unknown extension tag "indicator" Animations Ionic flow in action potentials (http://www.blackwellpublishing.com/matthews/channel.html) at Blackwell Publishing Action potential propagation in myelinated and unmyelinated axons (http://www.blackwellpublishing.com/matthews/actionp.html) at Blackwell Publishing Generation of AP in cardiac cells (http://thevirtualheart.org/CAPindex.html) and generation of AP in neuron cells (http://thevirtualheart.org/java/neuron/apneuron.html) Resting membrane potential (http://bcs.whfreeman.com/thelifewire/content/chp44/4402001.html) from Life: The Science of Biology, by WK Purves, D Sadava, GH Orians, and HC Heller, 8th edition, New York: WH Freeman, ISBN 978-0-7167-7671-0. Ionic motion and the Goldman voltage for arbitrary ionic concentrations (http://www.nernstgoldman.physiology.arizona.edu/) at The University of Arizona A cartoon illustrating the action potential (http://www.brainu.org/files/movies/action_potential_cartoon.swf) Action potential propagation (http://www.1lecture.com/Biochemistry/Action%20Potential/index.html) Production of the action potential: voltage and current clamping simulations (http://people.virginia.edu/~hvg2s/) Open-source software to simulate neuronal and cardiac action potentials (http://cese.sourceforge.net/) at SourceForge.net Introduction to the Action Potential (http://nba.uth.tmc.edu/neuroscience/s1/chapter01.html), Neuroscience Online (electronic neuroscience textbook by UT Houston Medical School) Khan Academy: Electrotonic and action potential (https://www.khanacademy.org/science/biology/human-biology/neuron-nervous-system/v/electrotonic-action%20potential) Open Access | Journals | Conferences OMICS Publishing Group Copyright © 2014 OMICS International, All Rights Reserved. This page is based on the copyrighted Wikipedia article Action potential; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA
Loading...
## Nerve impulse - Research OMICS Group - OMICS International
Search Search Go Search Log in Journals Conferences Frequent Links Waste Management Top Open Access Journals on Malignant MelanomaOpen Access Nano...
#### Recommend Documents
About OMICS Group
Oct 8, 2014 - Diagnostic yield and characteristic features in a series. ⢠of decomposed bodies subject to coronial aut
Cancer Cachexia - OMICS International
Apr 8, 2015 - Cancer anorexia-cachexia (CACS) is defined as a multifactorial syndrome characterized by ongoing loss of s
View PDF - OMICS International
Jan 15, 2016 - Hepatitis B infection is a public health problem in this country, so much so that the vaccination has bee
Posters - OMICS International
DOI: 10.4172/2155-9880-C1-072. Echocardiographic correlates of pulmonary hypertension in adult patients with atrial sept
A Change - OMICS International
Lokman et al. (2008), Secondary School Principals Leadership Analysis In The State Of Johor. Universiti. Teknologi Malay
Amusium pleuronectes - OMICS International
available in HTML, XML, PDF and audio formats. Also, all the published articles are archived in repositories and indexin
Corruption - OMICS International
In this context, the paper will test the relation between Corruption and distortion resource allocation in ... overcome
Epilepsy Journal - OMICS International
Jun 2, 2016 - In the year 2011, I published an article related with the. Multidisciplinary Epilepsy Units (MEU) [1]. How
Bioanalysis & Biomedicine - OMICS International
Mar 29, 2012 - Volume 4(2): 026-029 (2012) - 026. J Bioanal Biomed. ISSN:1948-593X JBABM, an open access journal. Open A
Obesity & Weight Management - OMICS International
Taking Action Together (TAT) was a controlled community-based intervention protocol developed to reduce risk of T2DM amo | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8065966963768005, "perplexity": 8105.952720824059}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254253.31/warc/CC-MAIN-20190519061520-20190519083520-00541.warc.gz"} |
https://brilliant.org/problems/bang-bang-you-shot-me-down/ | # Bang bang, you shot me down...
A man sitting in a hot air balloon floating $$h$$ meters above the ground drops an object towards the ground, and at the same time fires a gunshot.
An observer on the ground, standing on the ground right next to the place of the impact of the object, measures a time difference $$\Delta t = 3s$$ between the arrival of the sound of the shot and the impact of the object.
What is the sum of the two possible heights $$h_{1}$$ and $$h_{2}$$, if both heights are rounded down to the nearest lower integer?
$$\textbf{Details and assumptions}$$
• The temperature of the air is $$T = 14.5°C$$
• The ideal gas constant is $$R = 8.31 \frac {J}{mol \cdot K}$$
• The molecular mass of air is $$MM = 28.96 \frac {g}{mol}$$
• The adiabatic index of air is $$1.4$$
• The gravitational acceleration is $$g = 9.8 \frac {m}{s^2}$$
• For simplicity, round off the speed of sound $$v_{s}$$ to the nearest integer
• Both heights $$h_{1}$$ and $$h_{2}$$ are rounded down to the nearest lower integer before being added together
• Assume no air drag acts upon the object
× | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7945928573608398, "perplexity": 350.02018624831163}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686043.16/warc/CC-MAIN-20170919221032-20170920001032-00452.warc.gz"} |
https://proceedings.neurips.cc/paper/2019/hash/a34bacf839b923770b2c360eefa26748-Abstract.html | #### Authors
Kamil Ciosek, Quan Vuong, Robert Loftin, Katja Hofmann
#### Abstract
<p>Actor-critic methods, a type of model-free Reinforcement Learning, have been successfully applied to challenging tasks in continuous control, often achieving state-of-the art performance. However, wide-scale adoption of these methods in real-world domains is made difficult by their poor sample efficiency. We address this problem both theoretically and empirically. On the theoretical side, we identify two phenomena preventing efficient exploration in existing state-of-the-art algorithms such as Soft Actor Critic. First, combining a greedy actor update with a pessimistic estimate of the critic leads to the avoidance of actions that the agent does not know about, a phenomenon we call pessimistic underexploration. Second, current algorithms are directionally uninformed, sampling actions with equal probability in opposite directions from the current mean. This is wasteful, since we typically need actions taken along certain directions much more than others. To address both of these phenomena, we introduce a new algorithm, Optimistic Actor Critic, which approximates a lower and upper confidence bound on the state-action value function. This allows us to apply the principle of optimism in the face of uncertainty to perform directed exploration using the upper bound while still using the lower bound to avoid overestimation. We evaluate OAC in several challenging continuous control tasks, achieving state-of the art sample efficiency.</p> | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8284317851066589, "perplexity": 1220.5282939438148}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364027.59/warc/CC-MAIN-20210302160319-20210302190319-00291.warc.gz"} |
http://codeforces.com/blog/entry/73184 | Codeforces celebrates 10 years! We are pleased to announce the crowdfunding-campaign. Congratulate us by the link https://codeforces.com/10years. ×
### ajraj27's blog
By ajraj27, history, 4 weeks ago, ,
Hari is a Food Delivery guy and he has to pick food from restaurant R and deliver it to home H. Distance of H from R is D.When Hari reached at the restaurant R , he checked and found that his motorbike has P units of petrol left. Now, there are N fuel stations on the path from R to H and he may use these fuel stations to get petrol for his motorbike if any need arises. These N fuel stations are at distance D1, D2, D3,…, DN units from the restaurant R and these N fuel stations have P1, P2, P3,…, P N units of petrol. Hari’s motorbike tank is large enough to store any quantity of petrol. if Hari stops at any fuel station to get petrol, it takes K minutes. If at any point of time, there is no petrol in Hari’s motorbike, he will have to drag his motorbike on foot to nearest fuel station or his delivery location. If Hari drags his motorbike on foot, he takes 5 minutes to cover 1 unit distance and if he drives the motorbike, he takes 1 minute to cover 1 unit distance. Hari may drag his motorbike on foot even if there is petrol in motorbike to minimise the delivery time. Now, Hari has to deliver this order in minimum amount of time. Find the minimum possible time required to deliver the order.
Input: First line will contain 4 integers denoting N, D, P and K. Next line will contain integers denoting D1 , D2, D 3 ,…, DN . Next line will contain N integers denoting P1, P 2, P3,…, PN.
Testcase : 3 10 1 3
3 5 9
6 1 2
Ans — 24
Please someone explain the logic.
• +6
» 4 weeks ago, # | 0 Auto comment: topic has been updated by ajraj27 (previous revision, new revision, compare).
» 4 weeks ago, # | 0 Dp
• » » 4 weeks ago, # ^ | 0 Why you removed the code?
• » » » 4 weeks ago, # ^ | ← Rev. 2 → 0 You asked for the approach and i thought pasting code wasn't a good idea so i removed it. Spoiler#include "bits/stdc++.h" using namespace std; const int N = 5000 + 5; #define ll long long int ll pet[N]; ll val[N]; ll n, d, p, k; ll dp[N][N]; ll go(int pos, ll petrol){ if(pos == d) return 0; ll &ans = dp[pos][petrol]; if(ans != -1) return ans; ans = numeric_limits::max(); ans = min(ans, go(pos + 1, max(0LL, petrol - 1)) + ((petrol == 0) ? 5 : 1)); if(pet[pos]){ ans = min(ans, go(pos + 1, max(0LL, petrol) + pet[pos] - 1) + 1 + k); } return ans; } int main(){ cin >> n >> d >> p >> k; for(int i = 0; i < n; i++){ int x; cin >> x; pet[x] = 1; } for(int i = 0; i < n; i++){ int x; cin >> x; val[i] = x; } int pt = 0; for(int i = 0; i < 5001; i++){ if(pet[i]){ pet[i] = val[pt++]; } } memset(dp, -1, sizeof dp); cout << go(0, p); } | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.19464610517024994, "perplexity": 4160.701818423306}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144167.31/warc/CC-MAIN-20200219184416-20200219214416-00253.warc.gz"} |
http://www.mathematicalfoodforthought.com/2007/02/return-of-triangle-topic_11.html | Sunday, February 11, 2007
Return Of The Triangle. Topic: Geometry/Inequalities/Trigonometry. Level: AIME.
Problem: (1961 IMO - #2) Let $a, b, c$ be the sides of a triangle, and $T$ its area. Prove:
$a^2+b^2+c^2 \ge 4T\sqrt{3}$.
In what case does equality hold?
Solution: We begin with the trivial inequality, $(a-b)^2 \ge 0$, which has equality at $a = b$. Rearrange to get
$a^2+b^2 \ge 2ab$.
Let $\theta$ be the angle between the sides with lengths $a, b$. Since $2 \ge \cos{\theta}+\sqrt{3}\sin{\theta}$ (can be proved by combining RHS) with equality at $\theta = \frac{\pi}{3}$, we know
$a^2+b^2 \ge ab(\cos{\theta}+\sqrt{3}\sin{\theta})$
$2(a^2+b^2) \ge 2ab(\cos{\theta}+\sqrt{3}\sin{\theta})$
$a^2+b^2+(a^2+b^2-2ab\cos{\theta}) \ge 2\sqrt{3} \cdot ab\sin{\theta}$.
Recalling the Law of Cosines, we know $c^2 = a^2+b^2-2ab\cos{\theta}$. Also, $T = \frac{1}{2}ab\sin{\theta}$, so substituting we obtain
$a^2+b^2+c^2 \ge 4T\sqrt{3}$
as desired. Equality holds when $a = b$ and $\theta = \frac{\pi}{3}$, which means the triangle must be equilateral. QED.
--------------------
Comment: There are lots of ways to prove this, but this is one of the more elementary ones, requiring only basic knowledge of inequalities and trigonometry. Which is always good because I don't know any geometry. We see that this inequality is in general pretty weak, with equality only when the triangle is equilateral - there is a stronger version that states
$a^2+b^2+c^2 \ge 4T\sqrt{3}+(a-b)^2+(b-c)^2+(c-a)^2$.
See if you can prove that...
--------------------
Practice Problem: Let $a, b, c$ be the sides of a triangle, and $T$ its area. Prove:
$a^2+b^2+c^2 \ge 4T\sqrt{3}+(a-b)^2+(b-c)^2+(c-a)^2$. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9637899994850159, "perplexity": 306.86866823420837}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00334.warc.gz"} |
http://www.science.gov/topicpages/l/leper+colonies.html | Note: This page contains sample records for the topic leper colonies from Science.gov.
While these samples are representative of the content of Science.gov,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of Science.gov
to obtain the most current and comprehensive results.
Last update: November 12, 2013.
1
Wastewater from infected leprosy patients is expected to contain considerably higher concentrations of pathogens than standard domestic wastewater and, therefore, is more infectious. Isolation of lepers' is thought to prevent the spread of a wide range of infectious diseases that could potentially be contacted through direct or indirect exposure from an infected person's wastewater in the surrounding environment. However, inappropriate
Akinwale O. Coker; Johnson R. Oluremi; Rebecca A. Adeshiyan; Mynepalli K. Sridhar; Morenike E. Coker; Colin A. Booth; Jennifer A. Millington; Jamal M. Khatib
2011-01-01
2
Quantities and types of solid wastes generated at Ogbomosho leprosarium (Oyo State, Nigeria) have been investigated. Data collection, through waste sampling and analysis, interviews, questionnaire surveys and field observations, was conducted between August and November 2006. Results indicate a notably low mean waste generation rate of 241.5 g\\/h\\/d, which included bandages, paper, food waste, animal waste, wood ash, yard trimmings,
A. O. Coker; R. A. Adeshiyan; J. R. Oluremi; M. K. Sridhar; M. E. Coker; C. A. Booth; J. M. Khatib
2008-01-01
3
PubMed
This paper provides insight into interdependent processes by which leprosy and foreignness were constructed in early modern Germany. The results are based on a case study and further source-samples from Imperial towns of the Swabian and Franconian district. As it seems the early modern period was characterized by an ambivalent attitude towards lepers resulting in a variety of ways of inclusion and of exclusion for these persons: The separation from certain forms of social life in the towns (and in the villages belonging to the respective territory) followed the "suspicion" by other inhabitants caused by physical "signs" and the confirmed diagnoses of leprosy by medical experts. Such alienation from one community was juxtaposed by a right to enter the towns in rather specific circumstances as group of alms-beggars or part of a festive community and to join the community of leprosaria. The admission to such houses on the other hand was associated with the status of a burgher, a status, however, which could not be gained by everybody and was not fixed for life but was flexible. We found evidence that the status of leprosarium-"burgher" could be negotiated, interchanged, abandoned by lepers or be granted, refused, denied, suspended by the authorities--temporarily and permanently. By such means affiliation and foreignness were constructed. Preliminary analysis of numbers at ceremonies suggest that a large number of lepers was mobile--whether voluntarily or forced has still to be found out. And they represented the double fold estranged who, albeit, were temporarily included into the celebrating or commemorating community. Such forms of inclusion of the excluded, on the other hand, caused suspicion of simulation which became increasingly the preoccupation of the authorities. PMID:21863698
Dross, Fritz; Kinzelbach, Annemarie
2011-01-01
4
NSDL National Science Digital Library
In 1926, at the urging of the Revered Dr. D.A.R. Goodwin, John D. Rockefeller Jr. began a complex and elaborate restoration project in the quiet town of Williamsburg that sought to preserve a few of the more important Revolutionary War-era buildings around the town. The project became increasingly ambitious, and eventually grew to encompass around 85 percent of the town's area from the 18th century. Today, Colonial Williamsburg is the world's largest living history museum, and is noted for its ability to incorporate and interpret diverse perspectives on America's colonial period. Those persons unable to visit Colonial Williamsburg in person may want to first peruse the "Explore & Learn" section of the site, where they can learn about the different social and ethnic groups that inhabited the town (such as African-American slaves and colonial children), and see the various buildings within the community. The archaeology section of the site is particularly compelling, as visitors can learn about the many ongoing projects underway, and younger users can learn about the practice of archaeology through various games, quizzes, and puzzles. Additionally, users can read selected articles from the organization's popular history magazine, "Colonial Williamsburg," dating back to 1992. [KMG
5
The CEO of Carter Myers Automotive must consider his promotional plan for the coming summer. His company owned and operated three Virginia automotive dealerships: Colonial Auto Center in Charlottesville, Colonial Honda in Petersburg, and Heritage Chevrolet-Geo in Chester. Colonial was a multifranchise dealership featuring vehicles manugactured by Lincoln, Mercury, Cadillac, Buick, Pontiac, Nissan, Mitsubishi, suzuki cars, and GMC trucks. Several
Mark Parry
6
PubMed Central
Wolf, N. S.; Trentin, J. J.
1968-01-01
7
NSDL National Science Digital Library
Students are introduced to the futuristic concept of the moon as a place people can inhabit. They brainstorm what people would need to live on the moon and then design a fantastic Moon colony and decide how to power it. Student use the engineering design process, which includes researching various types of energy sources and evaluating which would be best for their moon colonies.
Integrated Teaching And Learning Program
8
While a foundation of German scientific methods enabled the rapid growth of North American Astronomy in the nineteenth century, during the seventeenth and most of the eighteenth centuries, the colonial men of science looked only to the English mother country for scientific patronage and guidance. An essay on fundamental astronomy appeared in one of the annual colonial almanacs as early
Donald K. Yeomans
2007-01-01
9
Originally, learning automata (LAs) were introduced to describe human behavior from both a biological and psychological point of view. In this paper, we show that a set of interconnected LAs is also able to describe the behavior of an ant colony, capable of finding the shortest path from their nest to food sources and back. The field of ant colony
Katja Verbeeck; Ann Now
2002-01-01
10
NSDL National Science Digital Library
Explore the town of Boston and its natural and human-made features in colonial times in this interactive activity produced by WGBH and featuring materials from the Norman B. Leventhal Map Center at the Boston Public Library.
Foundation, Wgbh E.
2012-06-30
11
The emergent spatial patterns generated by growing bacterial colonies have been the focus of intense study in physics during\\u000a the last twenty years. Both experimental and theoretical investigations have made possible a clear qualitative picture of\\u000a the different structures that such colonies can exhibit, depending on the medium on which they are growing. However, there\\u000a are relatively few quantitative descriptions
Juan A. Bonachela; Carey D. Nadell; Joo B. Xavier; Simon A. Levin
2011-01-01
12
NSDL National Science Digital Library
The Ant Colony Optimization project uses the behavior of ants as a model to solve optimization problems, such as how to minimize Internet traffic congestion. Several downloadable research papers are included on the project's homepage, as well as links to news stories, radio broadcasts, and conference proceedings about ant algorithms.
Dorigo, Marco
2008-01-04
13
While a foundation of German scientific methods enabled the rapid growth of North American Astronomy in the nineteenth century, during the seventeenth and most of the eighteenth centuries, the colonial men of science looked only to the English mother country for scientific patronage and guidance. An essay on fundamental astronomy appeared in one of the annual colonial almanacs as early as 1656, telescopic observations were made about 1660 and the first original colonial astronomical work was published by Thomas Danforth on the comet of 1664. By 1671 the Copernican ideas were so espoused at Harvard College that a physics class refused to read a Ptolemaic textbook when it was assigned to them by a senior instructor. At least in the Cambridge-Boston area, contemporary colonialist had access to the most recent scientific publications from the mother country. Observations of the great comet of 1680 by the Almanac maker, John Foster, reached Isaac Newton and were used and gratefully acknowledged in his Principia. During the seventeenth century the colonial interest in astronomy was more intense than it was for other sciences but colonists still occupied a position in the scientific backwater when compared with contemporary European scientists. Nevertheless, the science of astronomy was successfully transplanted from England to North America in the seventeenth century.
Yeomans, Donald K.
2007-12-01
14
A central element of the narrative circulated by the Tibet Movement has been that China has carried out genocide and practised colonialism in Tibet. These notions are, for the most part, uncritically accepted by politicians and the media, especially in the West. This essay challenges such characterizations as inept and as obstacles to resolving the Tibet Question. It looks at
Barry Sautman
2006-01-01
15
ERIC Educational Resources Information Center
As the American nation developed through periods of rapid change and great cultural diversity, the American public school system served as a primary souce of national unity. The roots of comprehensive public education in America can be traced to the educational system developed by 17th century Puritan colonials. Although one of the central
Allen, Jack
16
The emergent spatial patterns generated by growing bacterial colonies have been the focus of intense study in physics during the last twenty years. Both experimental and theoretical investigations have made possible a clear qualitative picture of the different structures that such colonies can exhibit, depending on the medium on which they are growing. However, there are relatively few quantitative descriptions of these patterns. In this paper, we use a mechanistically detailed simulation framework to measure the scaling exponents associated with the advancing fronts of bacterial colonies on hard agar substrata, aiming to discern the universality class to which the system belongs. We show that the universal behavior exhibited by the colonies can be much richer than previously reported, and we propose the possibility of up to four different sub-phases within the medium-to-high nutrient concentration regime. We hypothesize that the quenched disorder that characterizes one of these sub-phases is an emergent property of the growth and division of bacteria competing for limited space and nutrients.
Bonachela, Juan A.; Nadell, Carey D.; Xavier, Joo B.; Levin, Simon A.
2011-07-01
17
National Technical Information Service (NTIS)
An examination of colonies of 51 strains of Actinobacillus mallei grown on a complex agar medium containing heart infusion broth, yeast extract, glucose, and glycerol indicated a high degree of heterogeneity in respect of colonial morphology both within a...
D. H. Evans
1965-01-01
18
National Technical Information Service (NTIS)
This report examines the recent sharp decline in U.S. honey bee colonies, which scientists are now calling the Colony Collapse Disorder (CCD). This phenomenon first became apparent among commercial migratory beekeepers along the East Coast during the last...
R. Johnson
2007-01-01
19
National Technical Information Service (NTIS)
Starting in late 2006, commercial migratory beekeepers along the East Coast of the United States began reporting sharp declines in their honey bee colonies. Because of the severity and unusual circumstances of these colony declines, scientists named this ...
R. Johnson
2010-01-01
20
NSDL National Science Digital Library
The history of colonialism is a compelling one, and it can be narrated through first-hand documents such as journals, drawings, or photographs. This particular digital collection from the Harvard College Library contains more than 700 images which offer insight into European perspectives on how popular perceptions of Asia and Africa were created and disseminated. The collection is primarily made up of late-19th and early-20th century trade cards and illustrated European newspapers. Visitors can use the collection to draw contrasts between colonial powers, such as the French, the British and the Dutch. First-time visitors will want to dive right into the collection, and the image viewer offered here allows visitors to zoom in for a closer look. While all of the items here are quite worthy, users shouldn't miss the cards created for the Liebig's Extract of Meat Company or the views of Bangkok.
21
PubMed
Leprosy elimination (<1/100 000) is almost reached all around the world, although, but disabled people are still a lot, and they need rehabilitation as soon as possible. The different lesions (neurological, dermatologic and joint) must be treated in order to protect from handicap. Physical rehabilitation medicine can help with a global and polyvalent coverage. Therapeutic education and reinsertion are an important part. PMID:22393618
De Brier, G; Jouvion, A; Mercier, J; Trappier, T; Urseau, I; Thefenne, L
2011-12-01
22
PubMed Central
OBJECTIVE Hepatitis C virus is the most prevalent chronic blood-borne infection in the United States, typically acquired through contaminated blood products or needle sharing. We hypothesized that patients with chronic hepatitis C infection experience stigmatization independent of mode of acquisition and that it negatively affects quality of life. DESIGN Cross-sectional observation study. SETTING Specialty clinic in a tertiary referral hospital. PATIENTS Two hundred and ninety outpatients diagnosed with chronic hepatitis C infection and seen in a hepatology clinic. Thirty participants were excluded because of missing data. MEASUREMENTS AND MAIN RESULTS Patients were asked to complete a demographic profile, a semistructured interview, the Sickness Impact Profile, and the Hospital Anxiety Depression Scale. A team of two blinded coders analyzed the interviews. A total of 147 of the 257 study patients experienced stigmatization that they attributed to the disease. Women were more likely to report perceived stigmatization than men (P < .05). Age, education, professional status, and mode of infection did not influence the likelihood of stigmatization. Stigmatization was associated with higher anxiety (P < .01) and depression (P < .01), worsened quality of life (P < .01), loss of control (P < .01), and difficulty coping (P < .01). Individuals who experienced stigmatization also mentioned problems in their health care (P < .01) and work environment (P < .01) as well as with family members (P < .01). CONCLUSION Stigmatization is a very common emotionally burdensome experience for patients with hepatitis C, which can erode social support. As it penetrates even into the health care environment, physicians and other care providers should be aware of the existence and impact of such negative stereotyping.
Zickmund, Susan; Ho, Evelyn Y; Masuda, Masahiro; Ippolito, Laura; LaBrecque, Douglas R
2003-01-01
23
Honeybees, Apis spp., maintain elevated temperatures inside their nests to accelerate brood development and to facilitate defense against predators. We present an additional defensive function of elevating nest temperature: honeybees generate a brood-comb fever in response to colonial infection by the heat-sensitive pathogen Ascosphaera apis. This response occurs before larvae are killed, suggesting that either honeybee workers detect the infection before symptoms are visible, or that larvae communicate the ingestion of the pathogen. This response is a striking example of convergent evolution between this "superorganism" and other fever-producing animals.
Starks, P. T.; Blackie, Caroline A.; Seeley, Thomas D.
24
NSDL National Science Digital Library
Learn who came over to Jamestown and why they came in the first place! First watch a video about why people came to the Americas: A video that explains why people came to the Americas in the first place Then once they got there, lets find out who was in Jamestown (click on Jamestown on the left hand side): Early American colonization Make sure you read up about the history of Jamestown: History of Jamestown and if thats confusion for you, here's another video: Video about the colony of Jamestown Once ...
Shaul, Ms.
2009-06-10
25
SciTech Connect
For many years, the oil shale boom in W. Colorado has been just around the corner. The Colony Shale Oil Project is a joint development of the Oil Shale Corp. and Exxon Corp. The Colony operation is located in Garfield County in NW Colorado. To support the plant, it will be necessary to produce 66,000 tons/day of oil shale from a conventional room-and-pillar mine. The shale will be hauled from the mine and crushed to -9 in. (229mm). The coarse ore then will be transported to the secondary crushing station where it will be further reduced to -1/2 in. (13 mm). The finely crushed shale will enter 6 Tosco II retorts, each capable of processing 11,000 tons/day. When heated to 900 F (482 C) in the pyrolysis drum, the kerogen vaporizes and is separated from the spent shale. The oil shale vapors then are condensed, fractionated, and upgraded by hydrotreating before entering a pipeline to be transported to a conventional refinery.
Hayes, L.D.
1982-05-01
26
For counting of both colonies and plaques, there is a large number of applications including food, dairy, beverages, hygiene, environmental monitoring, water, toxicology, sterility testing, AMES testing, pharmaceuticals, paints, sterile fluids and fungal contamination. Recently, many researchers and developers have made efforts for this kind of systems. By investigation, some existing systems have some problems. The main problems are image acquisition and image segmentation. In order to acquire colony images with good quality, an illumination box was constructed as: the box includes front lightning and back lightning, which can be selected by users based on properties of colony dishes. With the illumination box, lightning can be uniform; colony dish can be put in the same place every time, which make image processing easy. The developed colony image segmentation algorithm consists of the sub-algorithms: (1) image classification; (2) image processing; and (3) colony delineation. The colony delineation algorithm main contain: the procedures based on grey level similarity, on boundary tracing, on shape information and colony excluding. In addition, a number of algorithms are developed for colony analysis. The system has been tested and satisfactory.
Wang, W. X.
2007-12-01
27
NSDL National Science Digital Library
The College of William & Mary is one of the oldest institutions of higher learning in the United States, and they have a rich history interwoven with the history of the U.S. and the state of Virginia. Recently, they have begun adding a wide range of institutional documents to their digital archive. This section of the site features The Colonial Echo, which has served as the student yearbook of the College since 1899. The yearbook includes information about student groups and activities, campus events, scenes of campus, and materials on university administrators. The digitization project was made possible via funds from Professor Emeriti Richard Sherman and Armand Galfo. These unique documents capture moments of college frivolity, seriousness of purpose, and gravitas.
2012-01-13
28
NSDL National Science Digital Library
Today we are going to research about the 13 colonies. Here are the things you will be learning about: What were the first 13 colonies? What year was each colony discovered? Who discovered each colony? Compare and contrast life in colonial days with life in ancient Hawaii.
Mr.Haiola, Mr. Asahara, Mrs Abiva, Ms. Hamada
2011-02-09
29
ERIC Educational Resources Information Center
The basis for the severe discipline imposed on school children in colonial America, especially in the Puritan colonies, was the belief in original sin. The child was regarded as being born in sin and thus depraved and prone to sin. The purpose of education was to enable children to read the Bible and thus change the behavior which otherwise would
Petry, John R.
30
PubMed
Colony collapse disorder (CCD) is a condition of honey bees, which has contributed in part to the recent major losses of honey bee colonies in the USA. Here we report the first CCD case from outside of the USA. We suggest that more standardization is needed for the case definition to diagnose CCD and to compare data on a global scale. PMID:23757238
Dainat, Benjamin; Vanengelsdorp, Dennis; Neumann, Peter
2011-12-29
31
Ammonia emissions were measured from two entire seabird colonies with contrasting species assemblages, to ascertain the ammonia volatilisation potentials among seabird species in relation to their nesting behaviour. Emissions were calculated from downwind plume measurements of ammonia concentration using both inverse dispersion and tracer ratio methods. Measured colony emissions ranged 1-90 kg NH3 hour-1, and equated to 16 and 36% volatilization of excreted nitrogen for colonies dominated by ground/burrow nesting and bare rock nesting birds, respectively. The results were applied in a bioenergetics model with a global seabird database. Seabird colonies are found to represent the largest point sources of ammonia globally (up to ~6 Gg NH3 colony-1 year-1). Moreover the largest emissions occur mainly in remote environments with otherwise low NH3 emissions. These ammonia hot spots'' explain significant perturbations of the nitrogen cycle in these regions and add ~20% to oceanic ammonia emissions south of latitude 45S.
Blackall, Trevor D.; Wilson, Linda J.; Theobald, Mark R.; Milford, Celia; Nemitz, Eiko; Bull, Jennifer; Bacon, Philip J.; Hamer, Keith C.; Wanless, Sarah; Sutton, Mark A.
2007-05-01
32
PubMed
The essay explores the hypothesis of colonial collecting processes involving the active addition of the colonial context and historical past to museum objects through the production of short stories. It examines the emergent historicity of collections through a focus on the "histories" that museum workers and colonial agents have been attaching to scientific collections of human skulls. Drawing on the notions of collection trajectory and historiographical work, it offers an alternative perspective from which to approach the creation of singular histories and individual archives for objects in collections. PMID:22371979
Roque, Ricardo
2011-01-01
33
Multiple Objective Optimisation is a fast growing area of research, and consequently several Ant Colony Optimisation approaches\\u000a have been proposed for a variety of these problems. In this paper, a taxonomy for Multiple Objective Ant Colony Optimisation\\u000a algorithms is proposed and many existing approaches are reviewed and described using the taxonomy. The taxonomy offers guidelines\\u000a for the development and use
Daniel Angus; Clinton Woodward
2009-01-01
34
NSDL National Science Digital Library
Presented by Dinsmore Documentation, Classics of American Colonial History is a research database consisting of scholarly books and articles on American colonial history that, according to the creators, "appear to be of continuing interest." The collection currently offers 22 source materials by 15 different authors. Browseable by author or subject, the collection contains subject categories including Administration, African Americans and Slavery, Economics and Trade, Immigration from Europe, Law, Native Americans, Politics, Religion, and Wars.
35
The computational model from life system has become a main intelligent algorithm. Ant colony algorithm is a new computational model from mimic the swarm intelligence of ant colony behavior. And it is a very good combination optimization method. To extend the ant colony algorithm, some continuous ant colony algorithms have been proposed. To improve the searching performance, the principles of
Gao Wei
2007-01-01
36
SUMMARY In addition to R outgrowths, strains of Lactobacillus casei growing on a carbohydrate-free medium also formed smooth secondary colonies situated on the primary colonies. These secondary colonies arose after about 6 days of incubation and were of two types : when centrally situated they formed papillae; when near the margin of the mother colony they often spilt over and
H. C. De Klerk; J. N. Coetzee
1962-01-01
37
Intensive surveys of an area of woodland in Phitsanulok province, Thailand, revealed 15 colonies of Apis florea. The colonies had a highly aggregated spatial distribution (Standardized Morisitas Index of Dispersion = 0.59). Microsatellite\\u000a analysis based on 5 loci showed that no colonies were related as mother-daughter, suggesting that unrelated colonies tend\\u000a to nest near existing colonies.
Wandee Wattanachaiyingcharoen; Siriwat Wongsiri; Benjamin P. Oldroyd
2008-01-01
38
ERIC Educational Resources Information Center
This monograph focuses on the development of colonial and post-colonial language policies and practices in Zimbabwe, attributing changes to evolving philosophies and politics in colonial and post-colonial Zimbabwe. In colonial Zimbabwe, we argue that the language policies had as one of their key objectives the development of a bilingual white
Makoni, Sinfree B.; Dube, Busi; Mashiri, Pedzisai
2006-01-01
39
Workers of polydomous colonies of social insects must recognize not only colony-mates residing in the same nest but also those living in other nests. We investigated the impact of a decentralized colony structure on colony- and nestmate recognition in the polydomous Australian meat ant (Iridomyrmex purpureus). Field experiments showed that ants of colonies with many nests were less aggressive toward
E. van Wilgenburg; D. Ryan; P. Morrison; P. J. Marriott; M. A. Elgar
2006-01-01
40
The formation of concentric ring colonies by bacterial species Bacillus subtilis and Proteus mirabilis has been investigated experimentally, focusing our attention on the dependence of local cell density upon the bacterial motility. It has been confirmed that these concentric ring colonies reflect the periodic change of the bacterial motility between motile cell state and immotile cell state. We conclude that this periodic change is macroscopically determined neither by biological factors (i.e., biological clock) nor by chemical factors (chemotaxis as inhibitor). And our experimental results strongly suggest that the essential factor for the change of the bacterial motility during concentric ring formation is the local cell density.
Yamazaki, Yoshihiro; Ikeda, Takemasa; Shimada, Hirotoshi; Hiramatsu, Fumiko; Kobayashi, Naoki; Wakita, Jun-Ichi; Itoh, Hiroto; Kurosu, Sayuri; Nakatsuchi, Michio; Matsuyama, Tohey; Matsushita, Mitsugu
2005-06-01
41
SUMMARY Recently, researchers in various fields have shown interest in the behavior of creatures from the viewpoint of adaptiveness and flexibility. Ants, known as social insects, exhibit collective behavior in performingtasks that can not be carried out by an individual ant. In ant colonies, chemical sub- stances, called pheromones, are used as a way to communicate important information on global
Hidenori KAWAMURA; Masahito YAMAMOTO; Keiji SUZUKI; Azuma OHUCHI
2000-01-01
42
Honey bee queens mate with many males, creating numerous patrilines within colonies that are genetically distinct. The effects of genetic diversity on colony productivity and long-term fitness are unknown. We show that swarms from genetically diverse colonies (15 patrilines per colony) founded new colonies faster than swarms from genetically uniform colonies (1 patriline per colony). Accumulated differences in foraging rates,
Heather R. Mattila; Thomas D. Seeley
2007-01-01
43
NSDL National Science Digital Library
During the Civil War, Roanoke Island, located between the coast of North Carolina and the Outer Banks, became a refuge for escaped slaves, called contrabands or freedmen. This site, created by University of Virginia professor Patricia C. Click presents an account of the history and selected documents and maps of the Roanoke Island Freedmens Colony, as the community was known. Documents include letters from Superintendent of the Colony, Horace James, a minister and abolitionist from Massachusetts, and letters from Freedmen themselves. The documents have been transcribed and are in .pdf format, so users should not expect to see scanned versions of 19th century originals. The projects section includes seven projects for high school and college students, using historical materials at the site, and from other related Web sites. Professor Click has written a book, Time Full of Trial: The Roanoke Island Freedmens Colony, 1862-1867, and the Preview section contains the table of contents and Chapter One. Links in the site refer to this book for more information; in the Maps section users are referred to its online ordering instructions for more information on the layout of the colony.
Click, Patricia C.
2001-01-01
44
Ants, as paradigm of social insects, have become a recurrent example of efficient problem solvers via self-organization. In spite of the simple behavior of each individual, the colony as a whole displays swarm intelligence: the organization of ant trails for foraging is a typical output of it. But conventional techniques of observation can hardly record the amount of data needed
C. Noda; J. Fernandez; C. Perez-Penichet; E. Altshuler
2006-01-01
45
The very basis of this thesis is the collective behavior of ants in colonies. Ants are an excellent example of how rather simple behavior on a local level can lead to complex behavior on a global level that is beneficial for the individuals. The key in the self-organization of ants is communication through pheromones. When an ant forages for food,
J. M. Van Ast
2010-01-01
46
National Technical Information Service (NTIS)
This section will deal with the culture technique, growth characteristics, and properties of the M-CFC(Macrophage Colony Forming Cell) a CFC distinct in many ways from the more primitive GM(Granulocyte Macrophage)-CFC and HPP(Hematopoietic Progenitor Cell...
T. J. MacVittie
1984-01-01
47
National Technical Information Service (NTIS)
The report is a summary of data collected from 1972 to 1982 on the location, size, and species composition of seabird colonies in Washington. It documents more than 440 nesting areas, with a total of more than 300,000 birds, within the marine shoreline ha...
S. M. Speich T. R. Wahl
1989-01-01
48
Multi colony ant algorithms are evolutionary optimization heuristics that are well suited for parallel execution. Information exchange between the colonies is an important topic that not only influences the parallel execution time but also the optimization behaviour. In this paper different kinds of information exchange strategies in multi colony ant algorithms are investigated. It is shown that the exchange of
Martin Middendorf; Frank Reischle; Hartmut Schmeck
2000-01-01
49
We describe an artificial ant colony capable of solving the traveling salesman problem (TSP).Ants of the artificial colony are able to generate successively shorter feasible tours by usinginformation accumulated in the form of a pheromone trail deposited on the edges of the TSPgraph. Computer simulations demonstrate that the artificial ant colony is capable of generatinggood solutions to both symmetric and
Luca Maria Gambardella; Marco Dorigo
1997-01-01
50
ERIC Educational Resources Information Center
|Dialogue and illustrations trace the history of the first peoples of South, Central, and North America and encourage students to look at past and present patterns of colonialism and to view colonialism from the perspective of the colonized. Chapter 1 critiques Columbus 500 years after founding the first colony in the Americas. Chapter 2 presents
Gage, Susan
51
Bacterial colony enumeration is an essential tool for many widely used biomedical assays. However, bacterial colony enumerating is a low throughput, time consuming and labor intensive process since there might exist hundreds or thousands of colonies on a Petri dish, and the counting process is often manually performed by well-trained technicians. In this paper, we introduce a fully automatic yet
Chengcui Zhang; Wei-bang Chen; Wen-lin Liu; Chi-bang Chen
2008-01-01
52
Long-term growth in developing countries has been explained in four frameworks: extractive colonial institutions (Acemoglu et al., 2001), colonial legal origin (La Porta et al., 2004), geography (Gallup et al., 1998) and colonial human capital (Glaeser et al., 2004). In this paper we test the colonial human capital explanation for sub-Saharan Africa, controlling for legal origin and geography. Utilising data
Jutta Bolt; Dirk Bezemer
2009-01-01
53
PubMed
Workers of polydomous colonies of social insects must recognize not only colony-mates residing in the same nest but also those living in other nests. We investigated the impact of a decentralized colony structure on colony- and nestmate recognition in the polydomous Australian meat ant (Iridomyrmex purpureus). Field experiments showed that ants of colonies with many nests were less aggressive toward alien conspecifics than those of colonies with few nests. In addition, while meat ants were almost never aggressive toward nestmates, they were frequently aggressive when confronted with an individual from a different nest within the same colony. Our chemical analysis of the cuticular hydrocarbons of workers using a novel comprehensive two-dimensional gas chromatography technique that increases the number of quantifiable compounds revealed both colony- and nest-specific patterns. Combined, these data indicate an incomplete transfer of colony odor between the nests of polydomous meat ant colonies. PMID:16555093
van Wilgenburg, E; Ryan, D; Morrison, P; Marriott, P J; Elgar, M A
2006-03-23
54
Workers of polydomous colonies of social insects must recognize not only colony-mates residing in the same nest but also those living in other nests. We investigated the impact of a decentralized colony structure on colony- and nestmate recognition in the polydomous Australian meat ant ( Iridomyrmex purpureus). Field experiments showed that ants of colonies with many nests were less aggressive toward alien conspecifics than those of colonies with few nests. In addition, while meat ants were almost never aggressive toward nestmates, they were frequently aggressive when confronted with an individual from a different nest within the same colony. Our chemical analysis of the cuticular hydrocarbons of workers using a novel comprehensive two-dimensional gas chromatography technique that increases the number of quantifiable compounds revealed both colony- and nest-specific patterns. Combined, these data indicate an incomplete transfer of colony odor between the nests of polydomous meat ant colonies.
van Wilgenburg, E.; Ryan, D.; Morrison, P.; Marriott, P. J.; Elgar, M. A.
2006-07-01
55
\\u000a This chapter discusses in detail individual honeybees fending off an enemy and the effects that can be rendered when whole\\u000a colony defence is a coordinated, social effort. Enemies extend from viruses to bears. Whatever the predator, the nesting styles\\u000a and nests of the bees afford a first line of defence. These are supplemented by various weapons, including stings, mandibles,\\u000a legs
Stefan Fuchs; Jrgen Tautz
56
\\u000a This paper discusses the application of ACS metaheuristics (based on behaviour of real ants: stigmergy and synergetic effect\\u000a among ants) for Job-Shop Scheduling problem (JSP). This algorithm is improved by introducing the concept of critical events,\\u000a in which two new techniques will be applied. Thus, a more flexible heuristic technique is obtained, which improves the performance\\u000a of ant colony system
Urszula Boryczka
2004-01-01
57
Ant colony optimization (ACO) can be applied to the data mining field to extract rule-based classifiers. The aim of this paper is twofold. On the one hand, we provide an overview of previous ant-based approaches to the classification task and compare them with state-of-the-art classification techniques, such as C4.5, RIPPER, and support vector machines in a benchmark study. On the
David Martens; Manu De Backer; Raf Haesen; Jan Vanthienen; Monique Snoeck; Bart Baesens
2007-01-01
58
PubMed
The compound ascidian Botryllus schlosseri reproduces asexually, and forms colonies to adhere to matrices such as rocks. This species has developed a mechanism to distinguish between self stem cells and invasive parasitizing nonself cells from other individuals of the same species, probably as a defense against parasitism. It is highly likely that such adult colony histocompatibility is controlled differently from its gametic allorecognition during fertilization. Allorecognition in adults is controlled by a single fusion/histocompatibility (FuHC) locus. In 2005, a candidate gene responsible for the phenotype associated with this genetic locus, named cFuHC, was reported; however, this proposal was subsequently refuted, and the actual determinant may exist elsewhere within the FuHC locus. Given that its is unlikely that a single gene could produce the diversity of FuHC alleles needed to determine individual identity and to distinguish self from nonself colonies, it is possible that the FuHC locus consists of a cluster of multiple determinants aligned in tandem. PMID:24004073
2013-09-01
59
PubMed Central
A highly polymorphic Xenorhabdus luminescens strain was isolated. The primary form of X. luminescens was luminescent and nonswarming and produced a yellow pigment and antimicrobial substances. The primary form generated a secondary form that had a distinct orange pigmentation, was weakly luminescent, and did not produce antimicrobial substances. Both the primary and secondary forms generated a set of colony variants at frequencies that exceeded normal rates for spontaneous mutation. The variant forms include nonswarming and swarming forms that formed large colonies and a small-colony (SC) form. The primary and secondary forms generated their SC forms at frequencies of between 1 and 14% and 1 and 2%, respectively. The SC forms were distinct from their parental primary and secondary forms in colony and cellular morphology and in protein composition. The cellular morphology and protein patterns of the nonswarming and swarming colony variants were all very similar. The DNA fingerprints of all forms were similar. Each SC-form colony reverted at high frequency to the form from which it was derived. The proportion of parental-type cells in the SC-form colonies varied with age, with young colonies containing as few as 0.0002% parental-type cells. The primary-to-secondary switch was stable, but all the other colony forms were able to switch at high frequencies to the alternative colony phenotypes. Images
Hurlbert, Ronald E.; Xu, Jimin; Small, Christopher L.
1989-01-01
60
PubMed
In socially foraging species resource information can be shared between individuals, increasing foraging success. In ant colonies, nestmate recruitment allows high exploitation rates at known resources however, to maximise foraging efficiency this must be balanced with searching for new resources. Many ant species form colonies inhabiting two or more spatially separated but socially connected nests: this type of organisation is known as polydomy. Polydomous colonies may benefit from increased foraging efficiency by carrying out dispersed-central place foraging. However, decentralisation of the colony may affect recruitment success by limiting interaction between ants based in separate nests. We use an agent-based model which compares the foraging success of monodomous and polydomous colonies in different food environments, incorporating recruitment through pheromone trails and group foraging. In contrast to previous results we show that polydomy is beneficial in some but not all cases. Polydomous colonies discover resources at a higher rate, making them more successful when food is highly dispersed, but their relative success can be lowered by limitations on recruitment success. Monodomous colonies can have higher foraging efficiency than polydomous colonies by exploiting food more rapidly. The results show the importance of interactions between recruitment strategy, colony size, and colony organisation. PMID:23380232
Cook, Zoe; Franks, Daniel W; Robinson, Elva J H
2013-02-01
61
\\u000a This paper presents a Multiple Ant Colony Optimization (MACO) approach for load balancing in circuit-switched networks. Based on the problem-solving approach of ants in nature, Ant Colony\\u000a Optimization (ACO) has been applied to solve problems in optimization, network routing and load balancing by modeling ants\\u000a as a society of mobile agents. While traditional ACO approaches employed one ant colony for
Kwang Mong Sim; Weng Hong Sun
2003-01-01
62
PubMed
Ants use a great variety of recruitment methods to forage for food or find new nests, including tandem running, group recruitment and scent trails. It has been known for some time that there is a loose correlation across many taxa between species-specific mature colony size and recruitment method. Very small colonies tend to use solitary foraging; small to medium sized colonies use tandem running or group recruitment whereas larger colonies use pheromone recruitment trails. Until now, explanations for this correlation have focused on the ants' ecology, such as food resource distribution. However, many species have colonies with a single queen and workforces that grow over several orders of magnitude, and little is known about how a colony's organization, including recruitment methods, may change during its growth. After all, recruitment involves interactions between ants, and hence the size of the colony itself may influence which recruitment method is used--even if the ants' behavioural repertoire remains unchanged. Here we show using mathematical models that the observed correlation can also be explained by recognizing that failure rates in recruitment depend differently on colony size in various recruitment strategies. Our models focus on the build up of recruiter numbers inside colonies and are not based on optimality arguments, such as maximizing food yield. We predict that ant colonies of a certain size should use only one recruitment method (and always the same one) rather than a mix of two or more. These results highlight the importance of the organization of recruitment and how it is affected by colony size. Hence these results should also expand our understanding of ant ecology. PMID:20694195
Planqu, Robert; van den Berg, Jan Bouwe; Franks, Nigel R
2010-08-04
63
PubMed
Honey bee queens mate with many males, creating numerous patrilines within colonies that are genetically distinct. The effects of genetic diversity on colony productivity and long-term fitness are unknown. We show that swarms from genetically diverse colonies (15 patrilines per colony) founded new colonies faster than swarms from genetically uniform colonies (1 patriline per colony). Accumulated differences in foraging rates, food storage, and population growth led to impressive boosts in the fitness (i.e., drone production and winter survival) of genetically diverse colonies. These results further our understanding of the origins of polyandry in honey bees and its benefits for colony performance. PMID:17641199
Mattila, Heather R; Seeley, Thomas D
2007-07-20
64
Heritable cuticular hydrocarbon patterns ofSolenopsis invicta workers are consistent within colonies for a given sampling time but vary sufficiently from colony to colony to distinguish the colonies from each other. In addition, cuticular hydrocarbon patterns change within colonies over time. Nestmate recognition cues found on the individual's cuticle, can be from heritable or environmental sources, and are a subset of
Robert K. vander Meer; David Saliwanchik; Barry Lavine
1989-01-01
65
National Technical Information Service (NTIS)
A systems engineering study is presented for a proposed lunar colony. The lunar colony was to grow from an existent, 12-man, earth-dependent lunar surface base and was to utilize lunar resources, becoming as earth-independent as possible. An in-depth trea...
C. Dalton E. Hohmann
1972-01-01
66
In this paper, the ant colony search algorithm (ACSA) is proposed to solve the thermal unit commitment problem. ACSA is a new cooperative agents approach, which is inspired by the observation of the behaviors of real ant colonies on the topic of ant trial formation and foraging methods. In the ACSA, a set of cooperating agents called \\
T. Sum-im; W. Ongsakul
2003-01-01
67
In this paper, ant colony search algorithm (ACSA) is proposed to solve the economic dispatch (ED) with transmission losses problem. ACSA is a new cooperative agents approach, which is inspired by the observation of the behaviors of real ant colonies on the topic of ant trail formation and foraging methods. In the ACSA, a set of cooperating agents called \\
Thanathip Sum-im
2004-01-01
68
New scholarship on economic development in Korea has focused on the beneficial effects of Japanese colonialism and on certain continuities between Korea's growth strategy before and after World War II. We challenge this new revisionism. The growth record under the Japanese occupation was more modest than is often thought, there are greater discontinuities than continuities between the colonial and postwar
Chung-In Moon; David Kang
1997-01-01
69
Between 1946 and 1976, the European powers granted independence to all of their large colonies in Africa and Southeast Asia. This paper attempts to provide an economic explanation for this remarkable ending to the era of colonialism. The main theoretical innovation is to consider the effect of population increase on the allocation of time by the indigenous population between productive
Herschel I. Grossman; Murat F. Iyigun
1997-01-01
70
ERIC Educational Resources Information Center
|This illustrated unit of study can be incorporated into regular social studies courses in elementary classrooms. The unit focuses on life in the 13 original colonies from the settlement period to the Revolutionary War. Activities are provided to help students learn the names and locations of the colonies. A highlight of the unit is a study of the
Bennett, Sondra; Stephens, Mark
71
We present a study of colony transformations during growth of Bacillus subtilis under adverse environmental conditions. It is a continuation of our pilot study of Adaptive self-organization during growth of bacterial colonies'' (Physica A 187 (1992) 378). First we identify and describe the transformations pathway, i.e. the excitation of the branching modes from Bacillus subtilis 168 (grown under diffusion limited
Eshel Ben-Jacob; Adam Tenenbaum; Ofer Shochet; Orna Avidan
1994-01-01
72
THEMAJOR CONTRIBUTION of two hundred years of British colonial rule to Indian publishing is an internal market for books in the English language -a market that persists and even grows despite the end of direct colonial domination in 1947. This has had a profound effect, for good and ill, on the growth of Indian publishing since independence. On the positive
SAMUEL ISRAEL
73
PubMed
Hemadsorption by colonies of Ureaplasma urealyticum and Mycoplasma pneumoniae differed quantitatively and qualitatively. Using standard methodology, few strains of U. urealyticum hemadsorbed; with a modified method, most strains hemadsorbed, indicating a second type of association. Scanning electron microscopy of tannin-osmium-stained preparations showed guinea pig erythrocytes embedded in ureaplasma colonies and craters left when erythrocytes were dislodged. PMID:2037381
Robertson, J A; Sherburne, R
1991-06-01
74
We examine the Genetically Modified Ant Colony System (GMACS) algorithm (3), which claims to dynamically tune an Ant Colony Optimization (ACO) algorithm to its near-optimal parameters. While our research indicates that the use of GMACS does result in higher quality solutions over a hand-tuned ACO algorithm, we found that the algorithm is ultimately hindered by its emphasis on randomized ant
Adrian A. De Freitas; Christopher B. Mayer
2007-01-01
75
ERIC Educational Resources Information Center
|Notions of white supremacy, racism, sexism, and patriarchy constitute the power relationships and hierarchical structures of colonialism. Power is accessed when certain cultural forms are made to prevail over others, thus producing racialized and marginalized identities. The will to control what is different is the main tenet of colonialism.
Weenie, Angelina
76
Technology Transfer Automated Retrieval System (TEKTRAN)
Managed honey bee colonies are currently affected by abrupt depopulation during winter and many factors are suspected to be involved, either alone or in combination. Pathogens are considered as principal actors, contributing to weaken colony health and leaving room for secondary infections. In parti...
77
ERIC Educational Resources Information Center
|Energy development has led many people concerned with the American West to consider it a powerless colony of outside interests. The characteristics of colonies, particularly external control by energy companies and the federal government, and the applicability of these characteristics to the West are discussed. (IS)|
Warren, Eugene H., Jr.
1983-01-01
78
ERIC Educational Resources Information Center
Examines the introduction and growth of state-supported schools in two German colonies in Africa, Kamerun and Deutsch Ostafrika, describes African reaction to and utilization of them, assesses, from the colonial perspective, why such schools were introduced and what they were intended to accomplish, and examines the reasons for their differential
vanderPloeg, Arie J.
1977-01-01
79
This paper seeks to explore a different way of examining the difference of European and colonial governments, showing how the Indian colonial state privileged investments in political, rather than civil, society. The former targeted the population and sought effects through policies that could be co-ordinated from a distance, at low cost. The latter targeted the social realm and necessarily involved
Stephen Legg
2006-01-01
80
Most existing historiographies of colonial and post-colonial policing in Ghana have focused nearly exclusively on providing a basic understanding of managerial issuesthat is, organisational and administrative structure, functions and modes of operation. Our knowledge of issues of police legitimation, and of the quality of policing remains very limited. This article discusses these issues and establishes the vital importance of history
Justice Tankebe
2008-01-01
81
Technology Transfer Automated Retrieval System (TEKTRAN)
Over the last two winters, there have been large-scale, unexplained losses of managed honey bee (Apis mellifera L.) colonies in the United States. In the absence of a known cause, this syndrome was named Colony Collapse Disorder (CCD) because the main trait was a rapid loss of adult worker bees. We ...
82
ERIC Educational Resources Information Center
This illustrated unit of study can be incorporated into regular social studies courses in elementary classrooms. The unit focuses on life in the 13 original colonies from the settlement period to the Revolutionary War. Activities are provided to help students learn the names and locations of the colonies. A highlight of the unit is a study of the
Bennett, Sondra; Stephens, Mark
83
ERIC Educational Resources Information Center
|Examines the introduction and growth of state-supported schools in two German colonies in Africa, Kamerun and Deutsch Ostafrika, describes African reaction to and utilization of them, assesses, from the colonial perspective, why such schools were introduced and what they were intended to accomplish, and examines the reasons for their differential
vanderPloeg, Arie J.
1977-01-01
84
BackgroundOver the last two winters, there have been large-scale, unexplained losses of managed honey bee (Apis mellifera L.) colonies in the United States. In the absence of a known cause, this syndrome was named Colony Collapse Disorder (CCD) because the main trait was a rapid loss of adult worker bees. We initiated a descriptive epizootiological study in order to better
Dennis Vanengelsdorp; Jay D. Evans; Claude Saegerman; Chris Mullin; Eric Haubruge; Bach Kim Nguyen; Maryann Frazier; Jim Frazier; Diana Cox-Foster; Yanping Chen; Robyn Underwood; David R. Tarpy; Jeffery S. Pettis; Justin Brown
2009-01-01
85
Background: Over the last two winters, there have been large-scale, unexplained losses of managed honey bee (Apis mellifera L.) colonies in the United States. In the absence of a known cause, this syndrome was named Colony Collapse Disorder (CCD) because the main trait was a rapid loss of adult worker bees. We initiated a descriptive epizootiological study in order to
Dennis vanEngelsdorp; Jay D. Evans; Claude Saegerman; Chris Mullin; Eric Haubruge; Bach Kim Nguyen; Maryann Frazier; Jim Frazier; Diana Cox-Foster; Yanping Chen; Robyn Underwood; David R. Tarpy; Jeffery S. Pettis
2009-01-01
86
PubMed
Laboratory-reared western corn rootworms, Diabrotica virgifera virgifera, from colonies maintained at the North Central Agricultural Research Laboratory (NCARL) in Brookings, SD, are used extensively by many researchers in studies of the biology, ecology, behavior, and genetics of this major insect pest. A nondiapause colony developed through artificial selection in the early 1970s is particularly attractive for many studies because its generation time is much shorter than that of typical diapause colonies. However, the nondiapause colony has been in culture for approximately 190 generations without out-crossing. We compared variation at six microsatellite loci among individuals from the NCARL nondiapause colony (approximately 190 generations), main diapause colony (approximately 22 generations), four regional diapause colonies (3-8 generations), and four wild populations. Genetic diversity was very similar among the diapause laboratory colonies and wild populations. However, the nondiapause colony showed approximately 15-39% loss of diversity depending on the measure. Pairwise estimates of F(ST) were very low, revealing little genetic differentiation among laboratory colonies and natural populations. The nondiapause colony showed the greatest genetic differentiation with an average pairwise F(ST) of 0.153. There was little evidence that the laboratory colonies had undergone genetic bottlenecks except for the nondiapause colony. The nondiapause colony has suffered a moderate loss in genetic diversity and is somewhat differentiated from wild populations. This was not unexpected given its history of artificial selection for the nondiapause trait, and the large number of generations in culture. In contrast, the results indicate that the diapause colonies maintained at NCARL are genetically similar to wild populations. PMID:17540076
Kim, Kyung Seok; French, B Wade; Sumerford, Douglas V; Sappington, Thomas W
2007-06-01
87
PubMed
Across the Northern hemisphere, managed honey bee colonies, Apis mellifera, are currently affected by abrupt depopulation during winter and many factors are suspected to be involved, either alone or in combination. Parasites and pathogens are considered as principal actors, in particular the ectoparasitic mite Varroa destructor, associated viruses and the microsporidian Nosema ceranae. Here we used long term monitoring of colonies and screening for eleven disease agents and genes involved in bee immunity and physiology to identify predictive markers of honeybee colony losses during winter. The data show that DWV, Nosema ceranae, Varroa destructor and Vitellogenin can be predictive markers for winter colony losses, but their predictive power strongly depends on the season. In particular, the data support that V. destructor is a key player for losses, arguably in line with its specific impact on the health of individual bees and colonies. PMID:22384162
Dainat, Benjamin; Evans, Jay D; Chen, Yan Ping; Gauthier, Laurent; Neumann, Peter
2012-02-23
88
PubMed Central
Across the Northern hemisphere, managed honey bee colonies, Apis mellifera, are currently affected by abrupt depopulation during winter and many factors are suspected to be involved, either alone or in combination. Parasites and pathogens are considered as principal actors, in particular the ectoparasitic mite Varroa destructor, associated viruses and the microsporidian Nosema ceranae. Here we used long term monitoring of colonies and screening for eleven disease agents and genes involved in bee immunity and physiology to identify predictive markers of honeybee colony losses during winter. The data show that DWV, Nosema ceranae, Varroa destructor and Vitellogenin can be predictive markers for winter colony losses, but their predictive power strongly depends on the season. In particular, the data support that V. destructor is a key player for losses, arguably in line with its specific impact on the health of individual bees and colonies.
Dainat, Benjamin; Evans, Jay D.; Chen, Yan Ping; Gauthier, Laurent; Neumann, Peter
2012-01-01
89
PubMed Central
In both African and Asian colonies until the late 19th century, colonial medicine operated pragmatically to meet the medical needs first of colonial officers and troops, immigrant settlers, and laborers responsible for economic development, then of indigenous populations when their ill health threatened the well-being of the expatriate population. Since the turn of the century, however, the consequences of colonial expansion and development for indigenous people's health had become increasingly apparent, and disease control and public health programs were expanded in this light. These programs increased government surveillance of populations at both community and household levels. As a consequence, colonial states extended institutional oversight and induced dependency through public health measures. Drawing on my own work on colonial Malaya, I illustrate developments in public health and their links to the moral logic of colonialism and its complementarity to the political economy.
Manderson, L
1999-01-01
90
Code of Federal Regulations, 2010 CFR
...2010-04-01 2010-04-01 false Manual colony counter. 866.2180 Section 866.2180...Microbiology Devices § 866.2180 Manual colony counter. (a) Identification. A manual colony counter is a device intended for...
2010-04-01
91
Code of Federal Regulations, 2010 CFR
...2009-04-01 2009-04-01 false Automated colony counter. 866.2170 Section 866.2170...Microbiology Devices § 866.2170 Automated colony counter. (a) Identification. An automated colony counter is a mechanical device...
2009-04-01
92
Code of Federal Regulations, 2010 CFR
...2010-04-01 2010-04-01 false Automated colony counter. 866.2170 Section 866.2170...Microbiology Devices § 866.2170 Automated colony counter. (a) Identification. An automated colony counter is a mechanical device...
2010-04-01
93
Code of Federal Regulations, 2010 CFR
...2009-04-01 2009-04-01 false Manual colony counter. 866.2180 Section 866.2180...Microbiology Devices § 866.2180 Manual colony counter. (a) Identification. A manual colony counter is a device intended for...
2009-04-01
94
PubMed
Cultures of Vibrio cholerae 01, biotype El Tor, from the current epidemic of cholera in the Western Hemisphere, and of the new V. cholerae serogroup O139, from the current outbreak in India and Bangladesh, revealed marked colonial heterogeneity when received by the authors. By comparison with reference colony types, using a stereoscope and transmitted oblique illumination, colonies of approximately 10 different degrees of opacity could be distinguished. In contrast, strains freshly isolated from patients and rapidly and carefully preserved were more homogeneous although still differentiable by this technique. These (and older) observations prompted the questions: (1) why is a V. cholerae colony opaque or translucent? and (2) what benefit is it to the vibrios to vary their colonial appearance? The observed changes in colonial opacity, which are reversible, are sometimes (rarely) accompanied by changes in virulence for infant rabbits and, more frequently, by other phenotypic variations including the ability to produce poly-beta-hydroxybutyrate inclusion bodies on glycerol-containing medium, the degree of encapsulation in 0139, changes in outer-membrane proteins, alteration in lipopolysaccharide structure, changes in expression of glycolytic pathways, and differences in ability to survive under adverse conditions. Colonial variations in choleragenic vibrios are phenotypically multifactorial. The genetic mechanisms(s) underlying the observed phenotypic changes remain to be defined. PMID:9025275
Finkelstein, R A; Boesman-Finkelstein, M; Sengupta, D K; Page, W J; Stanley, C M; Phillips, T E
1997-01-01
95
Ants, as paradigm of social insects, have become a recurrent example of efficient problem solvers via self-organization. In spite of the simple behavior of each individual, the colony as a whole displays swarm intelligence:'' the organization of ant trails for foraging is a typical output of it. But conventional techniques of observation can hardly record the amount of data needed to get a detailed understanding of self-organization of ant swarms in the wild. Here we are presenting a measurement system intended to monitor ant activity in the field comprising massive data acquisition and high sensitivity. A central role is played by an infrared sensor devised specifically to monitor relevant parameters to the activity of ants through the exits of the nest, although other sensors detecting temperature and luminosity are added to the system. We study the characteristics of the activity sensor and its performance in the field. Finally, we present massive data measured at one exit of a nest of Atta insularis, an ant endemic to Cuba, to illustrate the potential of our system.
Noda, C.; Fernndez, J.; Prez-Penichet, C.; Altshuler, E.
2006-12-01
96
PubMed
Histocompatibility is the basis by which multicellular organisms of the same species distinguish self from nonself. Relatively little is known about the mechanisms underlying histocompatibility reactions in lower organisms. Botryllus schlosseri is a colonial urochordate, a sister group of vertebrates, that exhibits a genetically determined natural transplantation reaction, whereby self-recognition between colonies leads to formation of parabionts with a common vasculature, whereas rejection occurs between incompatible colonies. Using genetically defined lines, whole-transcriptome sequencing, and genomics, we identified a single gene that encodes self-nonself and determines "graft" outcomes in this organism. This gene is significantly up-regulated in colonies poised to undergo fusion and/or rejection, is highly expressed in the vasculature, and is functionally linked to histocompatibility outcomes. These findings establish a platform for advancing the science of allorecognition. PMID:23888037
Voskoboynik, Ayelet; Newman, Aaron M; Corey, Daniel M; Sahoo, Debashis; Pushkarev, Dmitry; Neff, Norma F; Passarelli, Benedetto; Koh, Winston; Ishizuka, Katherine J; Palmeri, Karla J; Dimov, Ivan K; Keasar, Chen; Fan, H Christina; Mantalas, Gary L; Sinha, Rahul; Penland, Lolita; Quake, Stephen R; Weissman, Irving L
2013-07-26
97
For counting of both colonies and plaques, there is a large number of applications including food, dairy, beverages, hygiene, environmental monitoring, water, toxicology, sterility testing, AMES testing, pharmaceuticals, paints, sterile fluids and fungal contamination. Recently, many researchers and developers have made efforts for this kind of systems. By investigation, some existing systems have some problems since they belong to a new technology product. One of the main problems is image acquisition. In order to acquire colony images with good quality, an illumination box was constructed as: the box includes front lightning and back lightning, which can be selected by users based on properties of colony dishes. With the illumination box, lightning can be uniform; colony dish can be put in the same place every time, which make image processing easy. A digital camera in the top of the box connected to a PC computer with a USB cable, all the camera functions are controlled by the computer.
Wang, Weixing; Jin, Wenbiao
2006-02-01
98
We study the statistical properties of melanoma cell colonies grown in vitro by analyzing the results of crystal violet assays at different concentrations of initial plated cells and for different growth times. The distribution of colony sizes is described well by a continuous time branching process. To characterize the shape fluctuations of the colonies, we compute the distribution of eccentricities. The experimental results are compared with numerical results for models of random division of elastic cells, showing that experimental results are best reproduced by restricting cell division to the outer rim of the colony. Our results serve to illustrate the wealth of information that can be extracted by a standard experimental method such as the crystal violet assay.
Baraldi, Massimiliano Maria; Alemi, Alexander A.; Sethna, James P.; Caracciolo, Sergio; La Porta, Caterina A. M.; Zapperi, Stefano
2013-02-01
99
PubMed Central
Recent losses in honey bee colonies are unusual in their severity, geographical distribution, and, in some cases, failure to present recognized characteristics of known disease. Domesticated honey bees face numerous pests and pathogens, tempting hypotheses that colony collapses arise from exposure to new or resurgent pathogens. Here we explore the incidence and abundance of currently known honey bee pathogens in colonies suffering from Colony Collapse Disorder (CCD), otherwise weak colonies, and strong colonies from across the United States. Although pathogen identities differed between the eastern and western United States, there was a greater incidence and abundance of pathogens in CCD colonies. Pathogen loads were highly covariant in CCD but not control hives, suggesting that CCD colonies rapidly become susceptible to a diverse set of pathogens, or that co-infections can act synergistically to produce the rapid depletion of workers that characterizes the disorder. We also tested workers from a CCD-free apiary to confirm that significant positive correlations among pathogen loads can develop at the level of individual bees and not merely as a secondary effect of CCD. This observation and other recent data highlight pathogen interactions as important components of bee disease. Finally, we used deep RNA sequencing to further characterize microbial diversity in CCD and non-CCD hives. We identified novel strains of the recently described Lake Sinai viruses (LSV) and found evidence of a shift in gut bacterial composition that may be a biomarker of CCD. The results are discussed with respect to host-parasite interactions and other environmental stressors of honey bees.
Cornman, R. Scott; Tarpy, David R.; Chen, Yanping; Jeffreys, Lacey; Lopez, Dawn; Pettis, Jeffery S.; vanEngelsdorp, Dennis; Evans, Jay D.
2012-01-01
100
This paper uses the concepts of Disneyfication and Disneyization to discuss the (re)presentation of history at Disneys American Adventure, Mount Vernon, Monticello, and Colonial Williamsburg. It is argued that these historical properties to varying degrees have adopted Disney principles. While the discussion focuses upon the Disney?like experiences of colonial America at these sites, the piece concludes with a comment on
Laurie A. Meamber
2011-01-01
101
Biomimicry means learning from nature. Well known examples include physical structures such as the Velcro fastener. But natural\\u000a selection has also engineered mechanisms by which the components of adaptive biological systems are organized. For example,\\u000a natural selection has caused the foragers in an ant colony to cooperate and communicate in order to increase the total foraging\\u000a success of the colony.
Francis L. W. Ratnieks
2007-01-01
102
PubMed
Recent losses in honey bee colonies are unusual in their severity, geographical distribution, and, in some cases, failure to present recognized characteristics of known disease. Domesticated honey bees face numerous pests and pathogens, tempting hypotheses that colony collapses arise from exposure to new or resurgent pathogens. Here we explore the incidence and abundance of currently known honey bee pathogens in colonies suffering from Colony Collapse Disorder (CCD), otherwise weak colonies, and strong colonies from across the United States. Although pathogen identities differed between the eastern and western United States, there was a greater incidence and abundance of pathogens in CCD colonies. Pathogen loads were highly covariant in CCD but not control hives, suggesting that CCD colonies rapidly become susceptible to a diverse set of pathogens, or that co-infections can act synergistically to produce the rapid depletion of workers that characterizes the disorder. We also tested workers from a CCD-free apiary to confirm that significant positive correlations among pathogen loads can develop at the level of individual bees and not merely as a secondary effect of CCD. This observation and other recent data highlight pathogen interactions as important components of bee disease. Finally, we used deep RNA sequencing to further characterize microbial diversity in CCD and non-CCD hives. We identified novel strains of the recently described Lake Sinai viruses (LSV) and found evidence of a shift in gut bacterial composition that may be a biomarker of CCD. The results are discussed with respect to host-parasite interactions and other environmental stressors of honey bees. PMID:22927991
Cornman, R Scott; Tarpy, David R; Chen, Yanping; Jeffreys, Lacey; Lopez, Dawn; Pettis, Jeffery S; vanEngelsdorp, Dennis; Evans, Jay D
2012-08-21
103
The review briefs the history of the invention of the molecular colony techique, also known as a polony technology; applications\\u000a of this method to studies of the reactions between single RNA molecules, ultrasensitive diagnosis, gene cloning, and in vitro\\u000a screening, as well as the concepts of the origin of life that regard molecular colonies as a prototype of living organisms.
A. B. Chetverin; E. V. Chetverina
2007-01-01
104
The evolutionary stability of cooperation and altruism in colonies of social insects requires that nestmates be to some extent\\u000a related. An efficient system of discrimination against non-nestmates protects the nest against unrelated conspecifics, which\\u000a might exploit or parasitize the colony. The co-occurrence of unrelated individuals in mature colonies therefore is a rare\\u000a event that deserves more attention. Here, we report
Katrin Kellner; Benjamin Barth; Juergen Heinze
2010-01-01
105
PubMed Central
Comparisons across bird species have indicated that those more exposed to parasites and pathogens invest more in immunological defence, as measured by spleen size. We investigated how spleen volume varied with colony size, parasite load and an individual's colony-size history in the cliff swallow, Petrochelidon pyrrhonota, a colonial passerine bird of North America. We used a sample of over 1700 birds that had all died during a period of inclement weather in 1996. We experimentally manipulated ectoparasitism by fumigating nests in some colonies prior to the bad weather. Birds from parasite-free colonies had significantly smaller spleens than those from naturally infested sites; spleen volume did not differ between the sexes and did not vary with age. Mean spleen volume increased significantly with the colony size at a site prior to the bad weather in 1996 and at the site in 1995, both measures of colony size being indices of ectoparasitism at a site. An individual's history of breeding-colony size (defined as the average colony size it had occupied in years prior to 1996) had no association with its spleen size. The results are consistent with parasite-induced splenomegaly whenever birds are exposed to large numbers of ectoparasites. The results do not support spleen size as being a signal of differential life-history investment in immunological defence among individuals and thus run counter to interpretations from recent cross-species comparisons.
Brown, Charles R; Bomberger Brown, Mary
2002-01-01
106
NSDL National Science Digital Library
Access to the article is free, however registration and sign-in are required. Leprosy has been the scourge of humanity for thousands of years, yet we still know very little about the pathogenesis of this tragic disease. In his Perspective, Brophy explains exciting new findings (Rambukkana et al.) that reveal how the bacterium causing this disease, M. leprae, instigates demyelination of peripheral nerves without the help of the immune system, and subverts the attempts of myelinating Schwann cells to repair the damage.
Peter J. Brophy (University of Edinburgh;Department of Preclinical Veterinary Sciences)
2002-05-03
107
Ant colony optimization (ACO) is a metaheuristic that takes inspiration from the foraging behaviour of a real ant colony to solve the optimization problem. This paper presents a multiple colony ant algorithm to solve the Job-shop Scheduling Problem with the objective that minimizes the makespan. In a multiple colony ant algorithm, ants cooperate to find good solutions by exchanging information
A. Udomsakdigool; V. Kachitvichyanukul
2008-01-01
108
The emphasis on culture in studies of colonialism tends to obscure other forms of colonial power while making it impossible to contextualize the cultural argument and assess its salience. Rather than focusing on texts, systems of signification, and procedures of knowledge generation, as the colonial discourse literature is wont to do, a fuller understanding of colonial powers is achieved by
Cole Harris
2004-01-01
109
Social insect colonies invest in reproduction and growth, but how colonies achieve an adaptive allocation to these life-history characters remains an open question in social insect biology. Attempts to understand how a colony's investment in reproduction is shaped by the queen and the workers have proved complicated because of the potential for queen--worker conflict over the colony's investment in males
Katie E. Wharton; Fred C. Dyer; Zachary Y. Huang
2007-01-01
110
PubMed
Manual counting of bacterial colony forming units (CFUs) on agar plates is laborious and error-prone. We therefore implemented a colony counting system with a novel segmentation algorithm to discriminate bacterial colonies from blood and other agar plates.A colony counter hardware was designed and a novel segmentation algorithm was written in MATLAB. In brief, pre-processing with Top-Hat-filtering to obtain a uniform background was followed by the segmentation step, during which the colony images were extracted from the blood agar and individual colonies were separated. A Bayes classifier was then applied to count the final number of bacterial colonies as some of the colonies could still be concatenated to form larger groups. To assess accuracy and performance of the colony counter, we tested automated colony counting of different agar plates with known CFU numbers of S. pneumoniae, P. aeruginosa and M. catarrhalis and showed excellent performance. PMID:22448267
Brugger, Silvio D; Baumberger, Christian; Jost, Marcel; Jenni, Werner; Brugger, Urs; Mhlemann, Kathrin
2012-03-20
111
PubMed
Changes in host phenotype are often attributed to manipulation that enables parasites to complete trophic transmission cycles. We characterized changes in host phenotype in a colonial hostendoparasite system that lacks trophic transmission (the freshwater bryozoan Fredericella sultana and myxozoan parasite Tetracapsuloides bryosalmonae). We show that parasitism exerts opposing phenotypic effects at the colony and module levels. Thus, overt infection (the development of infectious spores in the host body cavity) was linked to a reduction in colony size and growth rate, while colony modules exhibited a form of gigantism. Larger modules may support larger parasite sacs and increase metabolite availability to the parasite. Host metabolic rates were lower in overtly infected relative to uninfected hosts that were not investing in propagule production. This suggests a role for direct resource competition and active parasite manipulation (castration) in driving the expression of the infected phenotype. The malformed offspring (statoblasts) of infected colonies had greatly reduced hatching success. Coupled with the severe reduction in statoblast production this suggests that vertical transmission is rare in overtly infected modules. We show that although the parasite can occasionally infect statoblasts during overt infections, no infections were detected in the surviving mature offspring, suggesting that during overt infections, horizontal transmission incurs a trade-off with vertical transmission. PMID:23965820
Hartikainen, Hanna; Fontes, Ins; Okamura, Beth
2013-09-01
112
PubMed Central
Background Over the last two winters, there have been large-scale, unexplained losses of managed honey bee (Apis mellifera L.) colonies in the United States. In the absence of a known cause, this syndrome was named Colony Collapse Disorder (CCD) because the main trait was a rapid loss of adult worker bees. We initiated a descriptive epizootiological study in order to better characterize CCD and compare risk factor exposure between populations afflicted by and not afflicted by CCD. Methods and Principal Findings Of 61 quantified variables (including adult bee physiology, pathogen loads, and pesticide levels), no single measure emerged as a most-likely cause of CCD. Bees in CCD colonies had higher pathogen loads and were co-infected with a greater number of pathogens than control populations, suggesting either an increased exposure to pathogens or a reduced resistance of bees toward pathogens. Levels of the synthetic acaricide coumaphos (used by beekeepers to control the parasitic mite Varroa destructor) were higher in control colonies than CCD-affected colonies. Conclusions/Significance This is the first comprehensive survey of CCD-affected bee populations that suggests CCD involves an interaction between pathogens and other stress factors. We present evidence that this condition is contagious or the result of exposure to a common risk factor. Potentially important areas for future hypothesis-driven research, including the possible legacy effect of mite parasitism and the role of honey bee resistance to pesticides, are highlighted.
vanEngelsdorp, Dennis; Evans, Jay D.; Saegerman, Claude; Mullin, Chris; Haubruge, Eric; Nguyen, Bach Kim; Frazier, Maryann; Frazier, Jim; Cox-Foster, Diana; Chen, Yanping; Underwood, Robyn; Tarpy, David R.; Pettis, Jeffery S.
2009-01-01
113
PubMed Central
1. Smooth, round, shiny, non-granular, and non-spreading colonies have been observed in cultures of virulent tubercle bacilli freshly isolated from eight human sources other than sputum. The classification of six of these strains as of human type was established by inoculation into rabbits and guinea pigs. 2. The 3 per cent NaOH or 6 per cent H2SO4 frequently used in the isolation of tubercle bacilli are definitely unfavorable to the development of smooth colonies. 3. It was observed that smooth colonies are produced in greater number when the pH of the medium (Corper's egg yolk-glycerine) is adjusted to a point near to but slightly on the acid side of neutral.
Smithburn, Kenneth C.
1935-01-01
114
NSDL National Science Digital Library
The role of missionaries in the process of colonization has intrigued historians and others for decades, and this compilation of scholarly works on this subject is quite a find. This set of papers was published by the eScholarship Research Centre at The University of Melbourne in July 2008, and it contains fifteen works that look at "current concepts of gender, race and colonial governance." Drawing on a range of methodological and theoretical approaches, the works are divided into thematic sections such as "Consolidating the Missionary Project" and "A Global Mission". Within these sections, visitors will find papers that include "Imperial Critics: Moravian Missionaries in the British Colonial World" and "Missions, Colonialism and the Politics of Agency". For persons with an interest in these types of historical explorations, this site will prove quite indispensable.
115
Two-way selection for quantities of stored pollen resulted in the production of high and low pollen hoarding strains of honey bees (Apis mellifera L.). Strains differed in areas of stored pollen after a single generation of selection and, by the third generation, the high strain colonies stored an average 6 times more pollen than low strain colonies. Colony-level organizational components
Robert E. Page; M. Kim Fondrk
1995-01-01
116
PubMed
Drug therapy during the Colonial and Revolutionary War period in America is discussed. Therapy in the 17th and 18th centuries remained largely symptomatic rather than curative. Treatment included such "depletion" measures as purging, sweating, bleeding, blistering and vomiting. Purgatives, emetics, opium, cinchona bark, camphor, potassium nitrate and mercury were among the most widely used drugs. European herbals, dispensatories and textbooks were used in the American colonies, and beginning in the early 18th century, British "patent medicines" were imported. During the Revolutionary War, the supply of drugs from Britain was cut off. The Continental Congress established laboratories and storehouses to serve the needs of the army. PMID:782235
Parascandola, J
1976-08-01
117
The role of geophysics in early America is a fragmented and rarely told story. Its beginning predated the actual rise of America as a nation, and its development can be traced even through the years of the American Revolution. It seems appropriate to look back to these Colonial times to reflect, as part of science's input to the Bicentennial Year,
1976-01-01
118
Swarm robotics draws inspiration from decentral- ized self-organizing biological systems in general and from the collective behavior of social insects in particular. In social insect colonies, many tasks are performed by higher order group or team entities, whose task-solving capacities transcend those of the individual participants. In this paper, we investigate the emergence of such higher order entities. We report
Shervin Nouyan; Roderich Gross; Michael Bonani; Francesco Mondada; Marco Dorigo
2009-01-01
119
Jeanne Van Eeden
2006-01-01
120
NSDL National Science Digital Library
Through a close study of a rich set of demographic and economic statistics, students will see the development over 150 years of two similar yet divergent colonies (Virginia and Barbados). They will work through population, land use, and trade statistics with closely-guiding questions in order to find links between one set of numbers and another.
Zabin, Serena
121
The unusual features of the Icarian Colony included the emphasis on equality in participation in the social organization by all age groups. The men, their wives, and their children all had a contribution to make through various roles. These roles included the positions of responsibility in the daily life of the group, in the governance of the Society, in the
LILLIAN SNYDER
1983-01-01
122
ERIC Educational Resources Information Center
|This article considers two related educational endeavors of the Massachusetts colony. The first is the colonists' efforts to pass their religious traditions to their children. The second is the effort of missionaries to spread the Christian faith to Native Americans. In both cases, the colonists wanted their children and the American Indians to
Watras, Joseph
2008-01-01
123
Bacterial colonies often exhibit complex spatio-temporal organization. This collective behavior is affected by a multitude of factors ranging from the properties of individual cells (shape, motility, membrane structure) to chemotaxis and other means of cell-cell communication. One of the important but often overlooked mechanisms of spatio-temporal organization is direct mechanical contact among cells in dense colonies such as biofilms. While in natural habitats all these different mechanisms and factors act in concert, one can use laboratory cell cultures to study certain mechanisms in isolation. Recent work demonstrated that growth and ensuing expansion flow of rod-like bacteria Escherichia coli in confined environments leads to orientation of cells along the flow direction and thus to ordering of cells. However, the cell orientational ordering remained imperfect. In this paper we study one mechanism responsible for the persistence of disorder in growing cell populations. We demonstrate experimentally that a growing colony of nematically ordered cells is prone to the buckling instability. Our theoretical analysis and discrete-element simulations suggest that the nature of this instability is related to the anisotropy of the stress tensor in the ordered cell colony.
Boyer, Denis; Mather, William; Mondragn-Palomino, Octavio; Orozco-Fuentes, Sirio; Danino, Tal; Hasty, Jeff; Tsimring, Lev S.
2011-04-01
124
ERIC Educational Resources Information Center
|The United States revolution of 1776 is said to lose validity in light of Puerto Rico's colonial situation under American rule. The plight of the Puerto Rican people is compared to that of the Euro-American settlers under the thumb-screw of British imperialism. (Author/AM)|
Thomas, Piri
1975-01-01
125
ERIC Educational Resources Information Center
Argues that attempts to institute proper and effective methods of educating non English speaking students cannot be reduced simply to issues of language, but rest on a full understanding of the ideological elements that generate and sustain linguistic, cultural, and racial discrimination, which represent vestiges of a colonial legacy in today's
Macedo, Donaldo
2000-01-01
126
PubMed Central
Bacterial colonies often exhibit complex spatio-temporal organization. This collective behavior is affected by a multitude of factors ranging from the properties of individual cells (shape, motility, membrane structure) to chemotaxis and other means of cellcell communication. One of the important but often overlooked mechanisms of spatio-temporal organization is direct mechanical contact among cells in dense colonies such as biofilms. While in natural habitats all these different mechanisms and factors act in concert, one can use laboratory cell cultures to study certain mechanisms in isolation. Recent work demonstrated that growth and ensuing expansion flow of rod-like bacteria Escherichia coli in confined environments leads to orientation of cells along the flow direction and thus to ordering of cells. However, the cell orientational ordering remained imperfect. In this paper we study one mechanism responsible for the persistence of disorder in growing cell populations. We demonstrate experimentally that a growing colony of nematically ordered cells is prone to the buckling instability. Our theoretical analysis and discrete-element simulations suggest that the nature of this instability is related to the anisotropy of the stress tensor in the ordered cell colony.
Boyer, Denis; Mather, William; Mondragon-Palomino, Octavio; Orozco-Fuentes, Sirio; Danino, Tal; Hasty, Jeff; Tsimring, Lev S
2013-01-01
127
ERIC Educational Resources Information Center
This paper explores the effect of 350 years of Dutch colonial rule upon Indonesian educational policies and the resulting regional inequalities in education. It was Dutch policy not to educate most of the children from the poorer social classes, but to use education to maintain and strengthen the existing social structure. Education was also used
Carpenter, Harold F., Jr.
128
The scarcity of data relative to the first importations of cattle into Colonial North America has lent obscurity to one of the most interesting phases of early American husbandry. In fact this paucity and incomplete- ness of information dealing with the introduction of cattle into what is now the United States of America has led many authors in the field
G. A. BOWLING
129
This essay examines the relationship between religion and the concept of nationhood in late colonial India. Religion was a crucial element in the formation of modern states in the early 20th century in South Asia. Different religious groups had different opinions about nation: Hindus and Muslims had different ideas of nationhood; even within the Hindu tradition, the Hindus themselves had
Chao Ren
2011-01-01
130
Protestant and Roman Catholic missions pioneered Western medicine and public health in much of Africa decades in advance of health services provided by colonial governments. A century later church-based hospitals and health care programs continue to account for 25% to 50% of available services in most African countries. In view of the important historical and continuing role of medical missions
Charles M. Good
1991-01-01
131
Police forces in Nigeria have been variously described as corrupt, oppressive and subservient to the whims and caprices of the government of the day. This paper analyses the development of police forces in Nigeria since the era of British colonial domination in the country. Police corruption and repression in Nigeria is analyzed in the context of the wider political and
Etannibi E. O. Alemika
1993-01-01
132
ERIC Educational Resources Information Center
|Rejects the essentialist notion of the need to exclude children with disabilities from the school community, tracing the origin of disability segregation to the advent of western colonialism and demonstrating the symbiotic relationship between cultural and racial oppression and the oppression of people with disabilities. The paper strongly
Kliewer, Christopher; Fitzgerald, Linda May
2001-01-01
133
PubMed
The moral modality of colonial power is still with us when it comes to the recreation of sexual norms of traditional or feudal society. We can examine the emergent properties of colonial knowledge anew by exploring how the colonial regime's strategic attention of regulating brothels in India differed from the analytic of power Foucault described for sexuality in European society. It turns out that amongst other things, public anxieties about the failure of adaptation by South Asians are incapable of leaving sexuality aside as a key interpretive device for their culture. The British preoccupation with reproducing the dynamics of the bourgeois matrimonial market on foreign soil in the mid-nineteenth century similarly necessitated a sociological pretext for racial purity. However, the kind of knowledge a typical traveller and employee of the East India Company brought to the Victorian public from his own researches in the brothels and streets of colonial India, which revealed how popular prostitution was as a vice amongst the officer class, was also more than a welcome imaginary relief from Christian morality; it was an alternative vision of modernity. PMID:23240839
Jabbar, Naheem
2012-12-01
134
ERIC Educational Resources Information Center
|This project is a unit of six lessons designed to study and understand the roles and expectations of women in the colonial period. The unit provides an historical perspective on those expectations, examines how both men and women viewed the sphere of women, and how enlightened thought on this topic began to emerge during this revolutionary time.
Cook, Robert
135
ERIC Educational Resources Information Center
This project is a unit of six lessons designed to study and understand the roles and expectations of women in the colonial period. The unit provides an historical perspective on those expectations, examines how both men and women viewed the sphere of women, and how enlightened thought on this topic began to emerge during this revolutionary time.
Cook, Robert
136
When considering the nature of culture contact and colonialism it is as important to study the continuities in the host society, as it is to study the impositions made by incoming peoples. The diverse relationships between colonised and colonising societies are likely to be played out in aspects of material culture. This study examines Ntsweng and Phalatswe, two Tswana settlements
Andrew Reid; Alinah Segobye; Lowe Borjeson; Nonofo Mathibidi; Princess Sekgarametso
1997-01-01
137
Ant colony algorithms are a group of heuristic optimization algorithms that have been inspired by ants foraging for food. In these algorithms there are some agents, the ants, that for finding the suitable solution, search the solution space. On the other hand, Learning Automata is an abstract model that can do finite actions. Each selected action is evaluated by a
F. Abdali; M. R. Meybodi
138
Ant Colony Optimization is a constructive meta-heuristic that uses an analogue of ant trail pheromones to learn about good features of solutions. In this paper, using the difference equations as a tool of research, we propose the mathematical model of the distribution of pheromone at the classic double bridge experiment, explain the mathematical model of the pheromone function in the
E. Foundas
2006-01-01
139
The structure of cell colonies is governed by the interplay of many physical and biological factors, ranging from properties of surrounding media to cell-cell communication and gene expression in individual cells. The biomechanical interactions arising from the growth and division of individual cells in confined environments are ubiquitous, yet little work has focused on this fundamental aspect of colony formation. By combining experimental observations of growing monolayers of non-motile strain of bacteria Escherichia coli in a shallow microfluidic chemostat with discrete-element simulations and continuous theory, we demonstrate that expansion of a dense colony leads to rapid orientational alignment of rod-like cells. However, in larger colonies, anisotropic compression may lead to buckling instability which breaks perfect nematic order. Furthermore, we found that in shallow cavities feedback between cell growth and mobility in a confined environment leads to a novel cell streaming instability. Joint work with W. Mather, D. Volfson, O. Mondrag'on-Palomino, T. Danino, S. Cookson, and J. Hasty (UCSD) and D. Boyer, S. Orozco-Fuentes (UNAM, Mexico).
Tsimring, Lev
2012-02-01
140
ERIC Educational Resources Information Center
The United States revolution of 1776 is said to lose validity in light of Puerto Rico's colonial situation under American rule. The plight of the Puerto Rican people is compared to that of the Euro-American settlers under the thumb-screw of British imperialism. (Author/AM)
Thomas, Piri
1975-01-01
141
The dominant hypothesis in the literature that studies conflict is that poverty is the main cause of civil wars. We instead analyze the effect of institutions on civil war, controlling for income per capita. In our set up, institutions are endogenous and colonial origins affect civil wars through their legacy on institutions. Our results indicate that institutions, proxied by the
Simeon Djankov; Marta Reynal-Querol
2007-01-01
142
This essay focuses on the earliest British travel narratives to Tibet and on colonial culture's reception of Tibetan Buddhism. It addresses the related discourses of commerce and religion to show how the interplay of free?market ideology and Buddhist culture, at work in these travelogues, enlarged the boundaries of Britain's imagined community, while complicating the Romantic hegemonic construction of Hinduism.
Elena Spandri
2009-01-01
143
The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related\\u000a to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run\\u000a one of the PC Windows operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh, or Linux operating system. JCMS
Chuck J. Donnelly; Mike McFarland; Abigail Ames; Beth Sundberg; Dave Springer; Peter Blauth; Carol J. Bult
2010-01-01
144
National Technical Information Service (NTIS)
An automatic colony counter was tested extensively with colonies of two bacterial species, Serratia marcescens and Bacillus subtilis var. niger, grown on agar media. A stable relationship was established between machine counts and counts done visually by ...
J. E. Malligo
1965-01-01
145
National Technical Information Service (NTIS)
Colonial National Historical Park was originally authorized as a national monument in 1930, and later established as a national historical park in 1936. The Park protects the historical units of Jamestown and Yorktown. In 1957, the Colonial Parkway was co...
C. N. Bentsen S. Costanzo T. Lookingbill T. J. B. Carruthers W. C. Dennison
2012-01-01
146
fter September 11th, more than a few commenta- tors have claimed that what is needed around the world is a revived colonialism under America's hand. These commentators accordingly urge us to look to the British colonial empire for guidance: \\
Julian Go
147
PubMed
Since 2006 the rate of honey bee colony failure has increased significantly. As an aid to testing hypotheses for the causes of colony failure we have developed a compartment model of honey bee colony population dynamics to explore the impact of different death rates of forager bees on colony growth and development. The model predicts a critical threshold forager death rate beneath which colonies regulate a stable population size. If death rates are sustained higher than this threshold rapid population decline is predicted and colony failure is inevitable. The model also predicts that high forager death rates draw hive bees into the foraging population at much younger ages than normal, which acts to accelerate colony failure. The model suggests that colony failure can be understood in terms of observed principles of honey bee population dynamics, and provides a theoretical framework for experimental investigation of the problem. PMID:21533156
Khoury, David S; Myerscough, Mary R; Barron, Andrew B
2011-04-18
148
National Technical Information Service (NTIS)
In response to the unexplained losses of U.S. honey bee colonies now known as colony collapse disorder (CCD), USDA's Agricultural Research Service (ARS) and Cooperative State Research, Education, and Extension Service (CSREES) led a collaborative effort t...
B. McPheron D. Holy K. Hackett M. Purcell-Miramontes R. Meyer R. Rose S. Ramaswamy T. Steeger
2009-01-01
149
PubMed Central
Since 2006 the rate of honey bee colony failure has increased significantly. As an aid to testing hypotheses for the causes of colony failure we have developed a compartment model of honey bee colony population dynamics to explore the impact of different death rates of forager bees on colony growth and development. The model predicts a critical threshold forager death rate beneath which colonies regulate a stable population size. If death rates are sustained higher than this threshold rapid population decline is predicted and colony failure is inevitable. The model also predicts that high forager death rates draw hive bees into the foraging population at much younger ages than normal, which acts to accelerate colony failure. The model suggests that colony failure can be understood in terms of observed principles of honey bee population dynamics, and provides a theoretical framework for experimental investigation of the problem.
Khoury, David S.; Myerscough, Mary R.; Barron, Andrew B.
2011-01-01
150
PubMed Central
Bovine bone marrow granulocyte/macrophage colonies were cultured in vitro in methyl cellulose and in plasma clots using bovine endotoxin-stimulated serum as a source of colony stimulating activity. The endotoxin-stimulated serum was four times as potent as the control serum in the methyl cellulose cultures. No significant increase in the number of colony forming units was observed when bovine marrow cells were maintained in suspension cultures for various periods prior to plating in methyl cellulose. The percentage of glass/plastic adherent cells in bovine marrow cells was observed to be 43% +/- 12 (SD). Benzidine positive erythroid colonies appeared in plasma clot cultures on day 4 and disappeared by day 9. No second population of erythroid colonies appeared either as a function of time or as a function of erythropoietin concentration. The optimum erythropoietin concentration for bovine erythroid cultures was found to be 1.0 unit/mL. A significant difference was observed between animals in their marrow capacity to produce erythroid colonies in culture but no significant difference was observed within individual animals over a period of three months. Images Fig. 3.
Kaaya, G P; Maxie, M G; Valli, V E; Losos, G J
1979-01-01
151
PubMed
Who needs to go to outer space to study alien beings when the oceans of our own planet abound with bizarre and unknown creatures? Many of them belong to sessile clonal and colonial groups, including sponges, hydroids, corals, octocorals, ascidians, bryozoans, and some polychaetes. Their life histories, in many ways unlike our own, are a challenge for biologists. Studying their ecology, behavior, and taxonomy means trying to think like a colony to understand the factors important in their lives. Until the 1980s, most marine ecologists ignored these difficult modular organisms. Plant ecologists showed them ways to deal with the two levels of asexually produced modules and genetic individuals, leading to a surge in research on the ecology of clonal and colonial marine invertebrates. Bryozoans make excellent model colonial animals. Their life histories range from ephemeral to perennial. Aspects of their lives such as growth, reproduction, partial mortality due to predation or fouling, and the behavior of both autozooids and polymorphs can be studied at the level of the colony, as well as that of the individual module, in living colonies and over time. PMID:21714171
Winston, Judith E
2010-12-01
152
ERIC Educational Resources Information Center
|Focuses on an early twentieth century journal called "Oversea Education," designed to increase communication among British colonies, particularly for education, based on William Ormsby Gore's travels among the colonies. Describes Frank Ward's editorial work that championed the rights of colonial subjects to have better educational policy. (KDR)|
2003-01-01
153
This paper presents a multi-ant colonies approach for clustering data that consists of some parallel and independent ant colonies and a queen ant agent. Each ant colony process takes different types of ants moving speed and different versions of the probability conversion function to generate various clustering results with an ant-based clustering algorithm. These results are sent to the queen
Yan Yang; Mohamed S. Kamel
2006-01-01
154
Behavioral plasticity in social insects is intriguing because colonies adjust to environmental change through the aggregated re- sponses of individuals. Without central control, colonies adjust num- bers of workers allocated to various tasks. Individual decisions are based on local information from the environment and other workers. This study examines how colonies of the seed-eating ant Pogono- myrmex barbatus adjust the
Deborah M. Gordon
2002-01-01
155
The paper presents the ant colony algorithm and its application for the path planning. Ant algorithms were designed on the base of the behaviour of real ant colonies. Real ants can always find the shortest way between the nest and the food so one of the most natural is the application of the ant colony algorithm in the path planning.
Marcin Pluci?ski
156
Legal historians have long emphasized the role courts played in promoting the development of a market society in colonial America. Indeed, judicial enforcement of debt agreements and other contractual obligations has been viewed as the central and most important aspect of government promotion of the nascent colonial economy. Nevertheless, there has been substantial disagreement about the extent of colonial economic
Claire Priest
2001-01-01
157
ERIC Educational Resources Information Center
Cities and religious orders in colonial Latin America competed vigorously and often bitterly to acquire a university, but little is understood of the cultural impact of the university on cities, regions, or the colonial system. The university in the Spanish colonies derived its organization and traditions from the University of Salamanca, a
McKibben, Joyce
158
ERIC Educational Resources Information Center
|Examines a Calcutta street child's experiences with vocational education within a broader historical framework of colonial and post-colonial discourses on formal education and the poor. Provides an ethnographic narrative of the child's experiences, exploring how colonialism, by establishing a modern education system and transforming children's
2002-01-01
159
This article serves as a foundation for understanding the earliest form of technical instruction in colonial America. It is a synthesis of historical studies that have addresses the edu- cation of indentured servants and apprentices in colonial America. It defines indentured servi- tude and contrasts it with apprenticeshipa form of indentured service. The paper addresses how indentured servitude in colonial
Mark R. Snyder
160
It is known that the zooplankter Daphnia induces colonies in the alga Scenedesmus. As Daphnia grazes on Scenedesmus, it has been postulated that colony formation represents an algal defense mechanism. This induction of Scenedesmus coenobia\\/colonies by Daphnia could be associated with a substance exuded by the animals that acts as a specific infochemical (kairomone) for Scenedesmus. However, the chemical nature
Karen Helen Wiltshire; Winfried Lampert
1999-01-01
161
ERIC Educational Resources Information Center
Demonstrates how the British Colonial Office employed public relations strategies as they administered the British colony of Northern Rhodesia before, during, and after World War II. Demonstrates how civil servants in London and colonial officials implemented public relations policies, strategies, and tactics on an ad hoc basis, covering political
Smyth, Rosaleen
2001-01-01
162
The cause or causes of Colony Collapse Disorder (CCD) are uncertain. CCD defines specific characteristics of the nationwide deaths of honey bee colonies in the last decade. Adult bees often disappear from the hive and die, leaving the colony weak and vulnerable to disease. Environmental scientists and agriculturalists have developed many different theories about CCD and its origins. The different
Meredith K. Boehm
2012-01-01
163
ERIC Educational Resources Information Center
|Cities and religious orders in colonial Latin America competed vigorously and often bitterly to acquire a university, but little is understood of the cultural impact of the university on cities, regions, or the colonial system. The university in the Spanish colonies derived its organization and traditions from the University of Salamanca, a
McKibben, Joyce
164
PubMed
The worldwide decline in honeybee colonies during the past 50 years has often been linked to the spread of the parasitic mite Varroa destructor and its interaction with certain honeybee viruses. Recently in the United States, dramatic honeybee losses (colony collapse disorder) have been reported; however, there remains no clear explanation for these colony losses, with parasitic mites, viruses, bacteria, and fungal diseases all being proposed as possible candidates. Common characteristics that most failing colonies share is a lack of overt disease symptoms and the disappearance of workers from what appears to be normally functioning colonies. In this study, we used quantitative PCR to monitor the presence of three honeybee viruses, deformed wing virus (DWV), acute bee paralysis virus (ABPV), and black queen cell virus (BQCV), during a 1-year period in 15 asymptomatic, varroa mite-positive honeybee colonies in Southern England, and 3 asymptomatic colonies confirmed to be varroa mite free. All colonies with varroa mites underwent control treatments to ensure that mite populations remained low throughout the study. Despite this, multiple virus infections were detected, yet a significant correlation was observed only between DWV viral load and overwintering colony losses. The long-held view has been that DWV is relatively harmless to the overall health status of honeybee colonies unless it is in association with severe varroa mite infestations. Our findings suggest that DWV can potentially act independently of varroa mites to bring about colony losses. Therefore, DWV may be a major factor in overwintering colony losses. PMID:19783750
Highfield, Andrea C; El Nagar, Aliya; Mackinder, Luke C M; Nol, Laure M-L J; Hall, Matthew J; Martin, Stephen J; Schroeder, Declan C
2009-09-25
165
PubMed Central
The worldwide decline in honeybee colonies during the past 50 years has often been linked to the spread of the parasitic mite Varroa destructor and its interaction with certain honeybee viruses. Recently in the United States, dramatic honeybee losses (colony collapse disorder) have been reported; however, there remains no clear explanation for these colony losses, with parasitic mites, viruses, bacteria, and fungal diseases all being proposed as possible candidates. Common characteristics that most failing colonies share is a lack of overt disease symptoms and the disappearance of workers from what appears to be normally functioning colonies. In this study, we used quantitative PCR to monitor the presence of three honeybee viruses, deformed wing virus (DWV), acute bee paralysis virus (ABPV), and black queen cell virus (BQCV), during a 1-year period in 15 asymptomatic, varroa mite-positive honeybee colonies in Southern England, and 3 asymptomatic colonies confirmed to be varroa mite free. All colonies with varroa mites underwent control treatments to ensure that mite populations remained low throughout the study. Despite this, multiple virus infections were detected, yet a significant correlation was observed only between DWV viral load and overwintering colony losses. The long-held view has been that DWV is relatively harmless to the overall health status of honeybee colonies unless it is in association with severe varroa mite infestations. Our findings suggest that DWV can potentially act independently of varroa mites to bring about colony losses. Therefore, DWV may be a major factor in overwintering colony losses.
Highfield, Andrea C.; El Nagar, Aliya; Mackinder, Luke C. M.; Noel, Laure M.-L. J.; Hall, Matthew J.; Martin, Stephen J.; Schroeder, Declan C.
2009-01-01
166
PubMed Central
Polymerase colony (polony) technology amplifies multiple individual DNA molecules within a thin acrylamide gel attached to a microscope slide. Each DNA molecule included in the reaction produces an immobilized colony of double-stranded DNA. We genotype these polonies by performing single base extensions with dye-labeled nucleotides, and we demonstrate the accurate quantitation of two allelic variants. We also show that polony technology can determine the phase, or haplotype, of two single- nucleotide polymorphisms (SNPs) by coamplifying distally located targets on a single chromosomal fragment. We correctly determine the genotype and phase of three different pairs of SNPs. In one case, the distance between the two SNPs is 45 kb, the largest distance achieved to date without separating the chromosomes by cloning or somatic cell fusion. The results indicate that polony genotyping and haplotyping may play an important role in understanding the structure of genetic variation.
Mitra, Robi D.; Butty, Vincent L.; Shendure, Jay; Williams, Benjamin R.; Housman, David E.; Church, George M.
2003-01-01
167
PubMed
INTRODUCTIONTo provide sufficient material for experimentation, a laboratory needs to expand and maintain a colony of planarians. It is crucial to keep a stable, healthy population of animals in a consistent environment to avoid inter-animal variability and modifier effects that can mask true phenotypes from experimental perturbation. In this protocol, we describe basic procedures for establishing and maintaining healthy colonies of Dugesia japonica, Schmidtea mediterranea, and Girardia tigrina (commonly found in the wild and commercially available in the United States). Although the recommendations are based on our optimization of conditions for G. tigrina, many of the procedures (such as food preparation and feeding strategy) can be applied to other species. For best results, the culture water must be carefully monitored and adjusted for each species. PMID:21356691
Oviedo, Nstor J; Nicolas, Cindy L; Adams, Dany S; Levin, Michael
2008-10-01
168
Abstract . Four lines of evidence indicate that evening bats, Nycticeius humeralis, at nursery colonies in northern,Missouri,transfer,information,by following,each,other,to feeding,and,roosting,sites . (1) Daily estimates,of insect,density,from,five,automated,suction,traps,showed,that,common,prey,in evening,bat faecal samples, small beetles and flies, occur in rich patches that persist for several days . Bats apparently respond,to prey,density,and,variability,because,these,variables,independently,predict,the,number,of trips and,capture,success,of foraging,bats,. (2) Videotape,records,of the,time,and,weight,of bats,arriving,and departing,from,a colony,indicated,that,adult,females,leave,within,10 s of each,other,on second,and subsequent,foraging,trips,more,often,than,expected,within,a night
GERALD S. WILKINSON
1992-01-01
169
An artificial ant sleeping model (ASM) and adaptive artificial ants clustering algorithm (A 4C) are presented to resolve the clustering problem in data mining by simulating the behaviors of gregarious ant colonies. In the ASM mode, each data is represented by an agent. The agents' environment is a two-dimensional grid. In A 4C, the agents can be formed into high-quality
Ling Chen; Xiao-Hua Xu; Yi-Xin Chen
2004-01-01
170
\\u000a The Ant Colony Optimization (ACO) technique was inspired by the ants behavior throughout their exploration for food. In nature,\\u000a ants wander randomly, seeking for food. After succeeding, they return to their nest. During their move, they lay down pheromone\\u000a that forms an evaporating chemical path. Other ants that locate this trail, follow it and reinforce it, since they also lay
Ioannis Michelakos; Nikolaos Mallios; Elpiniki Papageorgiou; Michael Vassilakopoulos
171
PubMed
Apis mellifera is used for honeybee keeping all over Turkey. Recently, honeybees have been suddenly disappearing for no apparent reason. It is presumed that some viral and parasitic honeybee pathogens are responsible for this. No medical research has been conducted to determine the pathologic causes of the sudden die-off of the honeybee colonies in Turkey as yet. This is of urgent importance for future of the honeybee industry. PMID:18985587
Muz, Mustafa N
2008-01-01
172
\\u000a We present a model for the travelling salesman problem (TSP) solved using the ant colony optimisation (ACO), a bio-inspired\\u000a mechanism that helps speed up the search for a solution and that can be applied to many other problems. The natural complexity\\u000a of the TSP combined with the self-organisation and emergent behaviours that result from the application of the ACO make
Lucio Mauro Duarte; Luciana Foss; Flvio Rech Wagner; Tales Heimfarth
2010-01-01
173
Summary: A major threat to eusocial colonies is predation (Starr, 1990) since these colonies place their entire reproductive investment into a single nest (Hansell, 1996). The vertebrate predator is probably the most destructive type of predator in that it can remove the entire nest and thereby destroy all of the investment made by the colony. In this study I considered
T. M. Judd
1998-01-01
174
Urquhart, M. L.; Garmany, C. D.
1996-05-01
175
SciTech Connect
We report a novel morphological transition in a Bacillus subtilis colony initially growing under ambient conditions, after ultraviolet radiation exposure. The bacteria in the central regions of the colonies are observed to migrate towards the colony edge forming a ring during uniform spatial exposure. When the radiation is switched off, the colonies were observed to grow both inward into the evacuated regions as well as outward indicating that the pattern is not formed due to depletion of nutrients at the center of the colony. We also propose a reaction-diffusion model in which waste-limited chemotaxis initiated by the UV radiation leads to the observed phenomenology.
2001-10-08
176
In nature, bacterial colonies must often cope with hostile environmental conditions. To do so they have developed sophisticated cooperative behaviour and intricate communication capabilities, such as direct cell- cell physical interactions via extra-membrane polymers, collective production of extracellular 'wetting' fluid for movement on hard surfaces, longrange chemical signalling such as quorum sensing and chemotactic (bias of movement according to gradient of chemical agent) signalling, collective activation and deactivation of genes and even exchange of genetic material. Utilizing these capabilities, the bacterial colonies develop complex spatio-temporal patterns in response to adverse growth conditions. We present a wealth of beautiful patterns formed during colonial development of various bacterial strains and for different environmental conditions. Invoking ideas from pattern formation in non-living systems and using generic modelling we are able to reveal novel bacterial strategies which account for the salient features of the evolved patterns. Using the models, we demonstrate how bacterial communication leads to colonial self-organization that can only be achieved via cooperative behaviour of the cells. It can be viewed as the action of a singular feedback between the microscopic level (the individual cells) and the macroscopic level (the colony) in the determination of the emerging patterns.
Ben-Jacob, Eshel
1997-03-01
177
The queen's role in colony activity integration in small post-emergence colonies of Polistes fuscatus was investigated in the field. We continuously recorded the behaviors of all wasps in (1) undisturbed colonies, (2) colonies from which the queen had been removed, (3) colonies from which a single worker had been removed, (4) colonies with a cooled, relatively inactive queen, and (5)
Hudson K. Reeve; George J. Gamboa
1983-01-01
178
PubMed
This paper traces an intricate path connecting racial fantasy, aesthetic judgment, and the larger cultural problem of inter-subjective recognition. In particular, the author examines the theme of fetishism, both sexual and racial, in a Western historical, colonial context, in order to unravel a set of disturbances that cohere around the racial fetish then and now. Taking the figure of an entertainment icon of the 1920s, Josephine Baker, as a case study, the author shows how the imagination of the colonizing white male was both articulated and disrupted by Baker as a ready-made representation of the cultural, racial, and sexual other. PMID:16482962
Cheng, Anne Anlin
2006-01-01
179
PubMed
A begger's colony where a neuropsychiatric extension clinic is being run by NIMHANS, Bangalore, was selected for this study wherein 78 neuropsychiatrically ill inmates and 85 well ones were examined and diagnosed as per I.C.D.-9 and followed up on treatment. A period prevalence of 131.09/1000 serious neuropsychiatric morbidity was found with psychoses, mental retardation and epilepsy being more frequent than in general population studies. Findings in this study, point towards a need for reaching neuropsychiatric care to this section of society, and also confirm the association of certain social factors with serious morbidity. PMID:21927125
Sharma, P S; Muralidhar, D; Gopinath, P S
1985-10-01
180
PubMed Central
In 1948, a small colony of emperor penguins Aptenodytes forsteri was discovered breeding on Emperor Island (67 51? 52? S, 68 42? 20? W), in the Dion Islands, close to the West Antarctic Peninsula (Stonehouse 1952). When discovered, the colony comprised approximately 150 breeding pairs; these numbers were maintained until 1970, after which time the colony showed a continuous decline. By 1999 there were fewer than 20 pairs, and in 2009 high-resolution aerial photography revealed no remaining trace of the colony. Here we relate the decline and loss of the Emperor Island colony to a well-documented rise in local mean annual air temperature and coincident decline in seasonal sea ice duration. The loss of this colony provides empirical support for recent studies (Barbraud & Weimerskirch 2001; Jenouvrier et al 2005, 2009; Ainley et al 2010; Barber-Meyer et al 2005) that have highlighted the vulnerability of emperor penguins to changes in sea ice duration and distribution. These studies suggest that continued climate change is likely to impact upon future breeding success and colony viability for this species. Furthermore, a recent circumpolar study by Fretwell & Trathan (2009) highlighted those Antarctic coastal regions where colonies appear most vulnerable to such changes. Here we examine which other colonies might be at risk, discussing various ecological factors, some previously unexplored, that may also contribute to future declines. The implications of this are important for future modelling work and for understanding which colonies actually are most vulnerable.
Trathan, Philip N.; Fretwell, Peter T.; Stonehouse, Bernard
2011-01-01
181
Technology Transfer Automated Retrieval System (TEKTRAN)
Here we describe a new phenomenon, entombed pollen, which is highly associated with increased colony mortality. Entombed pollen appears as sunken, wax-covered cells amidst normal, uncapped cells of stored pollen, and the pollen contained within these cells is brick red in color. There appears to b...
182
Body mass shapes processes from cell metabolism to community dynamics. Little is known, however, about how the average body mass of individuals varies among ecological communities. Ants alter colony mass by independently changing worker mass and\\/or worker number. In a survey of 49 ecosystems from tundra to tropical rainforest, average worker mass and worker number were uncorrelated (rs = 0.2,
Michael Kaspari
2005-01-01
183
This paper explores the relationships between landscape and power, colonialism and its aftermaths, and state territoriality and its contestation, in the work of two popular Northwest Coast landscape painters: Emily Carr and Lawrence Paul Yuxweluptun. The work of both artists is explored in terms of their representation of relations between indigenous peoples, physical landscapes, state power, and modernity, and in
Bruce Braun
2002-01-01
184
Technology Transfer Automated Retrieval System (TEKTRAN)
Ecologists use stable isotopes to infer diets and trophic levels of animals in food webs, yet some assumptions underlying these inferences have not been thoroughly tested. We used laboratory-reared colonies of Solenopsis invicta Buren (Formicidae: Solenopsidini) to test the effects of metamorphosis,...
185
ERIC Educational Resources Information Center
Previous accounts of "europhone" status (anglophone, francophone, etc.) have inadequately addressed spoken-written differences as well as different post-colonial developments taken by Southeast Asia, South Asia, North Africa, and East Africa vis-a-vis those of West, Central, and Southern Africa. This article investigates the extent to which the
Riney, Timothy J.
1998-01-01
186
PubMed
In this paper I outline a brief period in the history of the British Empire, during which colonial lunatic asylum policy began to be formulated. I begin with a scandal that erupted in Jamaica and suggest that this set in motion processes that led to critical changes in asylum administration. The first of these processes was an audit of hospitals and asylums in the colonies. The results of the audit and the policy that emerged from it marked the beginning of systematic regulation of lunatic asylum practice across the British Empire. It revealed a formulation of policy that was intended to cut across the self-governing regimes that had up to this point been allowed to evolve. Drawing on the work of Michel Foucault and Nikolas Rose, I argue that the policy and the practices associated with it contribute to an understanding of the emergence of the psy-sciences in colonial settings. They illustrate the establishment of a panoptic gaze on previously neglected insane spaces. Systematic surveillance constituted government at a distance and made colonial lunacy administration a governable discursive space. The regulation of the medical officers, lunatic attendants, and hospital boards began the process of creating a professional psychiatric workforce. I conclude with a discussion of the implications and the mixed impact of this policy change for the mentally ill across the empire, over the ensuing decades. PMID:20533769
Swartz, Sally
2010-05-01
187
PubMed Central
We investigated the phenomenon of activity cycles in ants, taking into account the spatial structure of colonies. In our study species, Leptothorax acervorum, there are two spatially segregated groups in the nest. We developed a model that considers the two groups as coupled oscillators which can produce synchronized activity. By investigating the effects of noise on the model system we predicted how the return of foragers affects activity cycles in ant colonies. We tested these predictions empirically by comparing the activity of colonies under two conditions: when foragers are and are not allowed to return to the nest. The activity of the whole colony and of each group within the colony was studied using image analysis. This allowed us to reveal the spatial pattern of activity wave propagation in ant colonies for the first time.
Boi, S.; Couzin, I. D.; Buono, N. Del; Franks, N. R.; Britton, N. F.
1999-01-01
188
PubMed Central
Using computational modeling, we design colonies of biomimetic microcapsules that exploit chemical mechanisms to communicate and alter their local environment. As a result, these synthetic objects can self-organize into various autonomously moving structures and exhibit ant-like tracking behavior. In the simulations, signaling microcapsules release agonist particles, whereas target microcapsules release antagonist particles and the permeabilities of both capsule types depend on the local particle concentration in the surrounding solution. Additionally, the released nanoscopic particles can bind to the underlying substrate and thereby create adhesion gradients that propel the microcapsules to move. Hydrodynamic interactions and the feedback mechanism provided by the dissolved particles are both necessary to achieve the collective dynamics exhibited by these colonies. Our model provides a platform for integrating both the spatial and temporal behavior of assemblies of artificial cells, and allows us to design a rich variety of structures capable of exhibiting complex, cooperative behavior. Due to the cell-like attributes of polymeric microcapsules and polymersomes, material systems are available for realizing our predictions.
Kolmakov, German V.; Yashin, Victor V.; Levitan, Steven P.; Balazs, Anna C.
2010-01-01
189
This work chronicles the phases of early childhood development in Ghana. This West African country experienced a change in\\u000a education after the inception of colonialism. Education of the very young became a part, though limited, of the missionary-based\\u000a education system under colonialism. The country moved from colonialism to a republic form of government in 1957. The republic\\u000a was determined and
2000-01-01
190
Workers of the ant Temnothorax nylanderi form dominance orders in orphaned colonies in which only one or a few top-ranking workers begin to produce males from unfertilized eggs. Between one and 11 individuals initiated 80% of all aggression in 14 queenless colonies. As predicted from inclusive fitness models (Molet M, van Baalen M, Monnin T, Insectes Soc 52:247 256, 2005), hierarchy length was found to first increase with colony size and then to level off at larger worker numbers. The frequency and skew of aggression decreased with increasing size, indicating that rank orders are less pronounced in larger colonies.
Heinze, J.
2008-08-01
191
PubMed Central
Varroa mites and viruses are the currently the high-profile suspects in collapsing bee colonies. Therefore, seasonal variation in varroa load and viruses (Acute-Kashmir-Israeli complex (AKI) and Deformed Wing Virus (DWV)) were monitored in a year-long study. We investigated the viral titres in honey bees and varroa mites from 23 colonies (15 apiaries) under three treatment conditions: Organic acids (11 colonies), pyrethroid (9 colonies) and untreated (3 colonies). Approximately 200 bees were sampled every month from April 2011 to October 2011, and April 2012. The 200 bees were split to 10 subsamples of 20 bees and analysed separately, which allows us to determine the prevalence of virus-infected bees. The treatment efficacy was often low for both treatments. In colonies where varroa treatment reduced the mite load, colonies overwintered successfully, allowing the mites and viruses to be carried over with the bees into the next season. In general, AKI and DWV titres did not show any notable response to the treatment and steadily increased over the season from April to October. In the untreated control group, titres increased most dramatically. Viral copies were correlated to number of varroa mites. Most colonies that collapsed over the winter had significantly higher AKI and DWV titres in October compared to survivors. Only treated colonies survived the winter. We discuss our results in relation to the varroa-virus model developed by Stephen Martin.
Francis, Roy M.; Nielsen, Steen L.; Kryger, Per
2013-01-01
192
PubMed
Four different colony morphologies were produced by Flavobacterium columnare strains on Shieh agar plate cultures: rhizoid and flat (type 1), non-rhizoid and hard (type 2), round and soft (type 3), and irregularly shaped and soft (type 4). Colonies produced on AO agar differed from these to some extent. The colony types formed on Shieh agar were studied according to molecular characteristics [Amplified Fragment Length Polymorphism (AFLP), Automated Ribosomal Intergenic Spacer Analysis (ARISA), and whole cell protein SDS-PAGE profiles], virulence on rainbow trout fingerlings, and adhesion on polystyrene and fish gills. There were no molecular differences between colony types within one strain. Type 2 was the most adherent on polystyrene, but type 1 was the most virulent. Adhesion of F. columnare strains used in this study was not connected to virulence. From fish infected with colony type 1, three colony types (types 1, 2 and 4) were isolated. Contrary to previous studies, our results suggest that strong adhesion capacity may not be the main virulence factor of F. columnare. Colony morphology change might be caused by phase variation, and different colony types isolated from infected fish may indicate different roles of the colony morphologies in the infection process of columnaris disease. PMID:18984035
Kunttu, Heidi M T; Suomalainen, Lotta-Riina; Jokinen, E Ilmari; Valtonen, E Tellervo
2008-10-17
193
PubMed
Redox chemistry, involving the transfer of electrons and hydrogen atoms, is central to energy conversion in respiration, and the control of gene expression by redox state commonly occurs in bacteria, allowing rapid responses to environmental changes, for instance, in the food supply. Colonial metazoans often encrust surfaces over which the food supply varies in time or space; hence, in these organisms, redox control of the development of feeding structures and gastrovascular connections could be similarly adaptive, allowing colonies to adjust the timing and spacing of structures in response to a variable food supply. To investigate the possibility of redox control of colony development, the redox states of hydractiniid hydroid colonies were manipulated experimentally. As in many colonial animals, hydractiniid hydroids display a range of morphological variation from sheet-like forms (i.e. closely spaced polyps with high rates of stolon branching) to runner-like forms (i. e. widely spaced polyps with low rates of stolon branching). In the runner-like Podocoryna carnea, azide, a blocker of the electron transport chain, and dinitrophenol, an uncoupler of oxidative phosphorylation, diminished the largely polyp-driven gastrovascular flow to a similar extent. Measures of the redox state of the polyp epitheliomuscular cells using the fluorescence of NAD(P)H suggest that azide shifts the redox state in the direction of reduction, while dinitrophenol shifts the redox state in the direction of oxidation. Colony development corresponds to redox state in that azide-treated colonies were more runner-like, while dinitrophenol-treated colonies were more sheet-like. Nevertheless, the functional role of polyps in feeding and generating gastrovascular flow probably contributed to a trade-off between polyp number and size such that azide-treated colonies had few large polyps, while dinitrophenol-treated colonies had many small polyps. Regardless of the treatment, P. carnea colonies developed to maturity and produced swimming medusae in the normal fashion. In the sheet-like Hydractinia symbiolongicarpus, treatment with azide resulted in complete suppression of the development of both the stolonal mat and the blastostyles, the reproductive polyps. Azide-treated H. symbiolongicarpus colonies therefore developed in a juvenilized, runner-like manner and much resembled colonies of P. carnea. Following cessation of azide treatment in H. symbiolongicarpus, normal colony development ensued, and both a stolonal mat and blastostyles formed. In both hydroid species, relative oxidization favors sheet-like growth, while relative reduction favors runner-like growth. Since feeding triggers strong contractions of polyp epitheliomuscular cells and results in relative oxidation, this experimental evidence supports the hypothesis of adaptive redox control of colony development and evolution. PMID:10574731
Blackstone
1999-12-01
194
PubMed
The evaluation of new drug treatments and combination treatments for gliomas and other cancers requires a robust means to interrogate wide dose ranges and varying times of drug exposure without stain-inactivation of the cells (colonies). To this end, we developed a 3-dimensional (3D) colony formation assay that makes use of GelCount technology, a new cell colony counter for gels and soft agars. We used U251MG, SNB19, and LNZ308 glioma cell lines and MiaPaCa pancreas adenocarcinoma and SW480 colon adenocarcinoma cell lines. Colonies were grown in a two-tiered agarose that had 0.7% agarose on the bottom and 0.3% agarose on top. We then studied the effects of DFMO, carboplatin, and SAHA over a 3-log dose range and over multiple days of drug exposure. Using GelCount we approximated the area under the curve (AUC) of colony volumes as the sum of colony volumes (microm2xOD) in each plate to calculate IC50 values. Adenocarcinoma colonies were recognized by GelCount scanning at 3-4 days, while it took 6-7 days to detect glioma colonies. The growth rate of MiaPaCa and SW480 cells was rapid, with 100 colonies counted in 5-6 days; glioma cells grew more slowly, with 100 colonies counted in 9-10 days. Reliable log dose versus AUC curves were observed for all drugs studied. In conclusion, the GelCount method that we describe is more quantitative than traditional colony assays and allows precise study of drug effects with respect to both dose and time of exposure using fewer culture plates. PMID:18642971
Kajiwara, Yoshinori; Panchabhai, Sonali; Levin, Victor A
2008-08-01
195
PubMed
Populations of ants and other social insects self-organize and develop 'emergent' properties through stigmergy in which individual ants communicate with one another via chemical trails of pheromones that attract or repulse other ants. In this way, sophisticated properties and functions develop. Under appropriate conditions, in vitro microtubule preparations, initially comprised of only tubulin and GTP, behave in a similar manner. They self-organize and develop other higher-level emergent phenomena by a process where individual microtubules are coupled together by the chemical trails they produce by their own reactive growing and shrinking. This behaviour is described and compared with the behaviour of ant colonies. Viewing microtubules as populations of molecular ants may provide new insights as to how the cytoskeleton may spontaneously develop high-level functions. It is plausible that such processes occur during the early stages of embryogenesis and in cells. PMID:16968217
Tabony, James
2006-10-01
196
MACS-VRPTW, an Ant Colony Optimization based approach useful to solve vehicle routing problems with time windows is presented. MACS-VRPTW is organized with a hierarchy of artificial ant colonies designed to successively optimize a multiple objective function: the first colony minimizes the number of vehicles while the second colony minimizes the traveled distances. Cooperation between colonies is performed by exchanging information
Luca Maria Gambardella; E. Taillard; Giovanni Agazzi
1999-01-01
197
The reproductive success of colonially breeding species depends in part upon a trade-off between the benefit of a dilution effect against nestling predation within larger colonies and colony conspicuousness. However, there may be no net survivorship benefit of dilution if smaller colonies are sufficiently inconspicuous. This raises the question about how the size distribution of breeding colonies on a landscape
James K. Kenyon; Barry D. Smith; Robert W. Butler
2007-01-01
198
The resource-constrained project scheduling problem is a typical combinatorial optimization problem. An ant algorithm with dual ant colonies is proposed to improve the effective allocation of project resources. The algorithm adaptively adjusts resource allocation according to the pheromone updated by artificial ants employed to search for feasible schedules. Two separate ant colonies are employed. The forward scheduling technique is applied
Yongyi Shou
2007-01-01
199
This work presents a multi-objective optimization method based on the artificial bee colony, called the MOABC, for optimizing problems with multiple objectives. The MOABC uses a grid-based approach to adaptively assess the Pareto front maintained in an external archive. The external archive is used to control the flying behaviours of the individuals and structuring the bee colony. The employed bees
200
ERIC Educational Resources Information Center
|Draws comparisons between the Australian education directors, Frank Tate and Jacques Henry Abendanon. Discusses educational reform issues based on racial contexts and social, political, and cultural aspects in the British colony of Victoria and the Dutch colony of Java. Concludes that, though their politcal contexts are different, their views are
Cote, Joost
2001-01-01
201
Abstract: this paper we propose a new approachtosolve bi-criterionoptimization problems with ant algorithms where several colonies of antscooperate innding good solutions. Weintroduce two methods for cooperationbetween the colonies and compare them with a multistart antalgorithm that corresponds to the case of no cooperation. Heterogeneouscolonies are used in the algorithm, i.e. the ants dier in their preferencesbetween the two criteria. Every
Steffen Iredi; Daniel Merkle; Martin Middendorf
2001-01-01
202
The introduction of the concept of swarm intelligence into ant colony optimization (ACO) algorithms has shown the rich possibilities of self-organization when dealing with difficult optimization. Indeed, the inherent flexibility and efficiency of ACO algorithms proved to be advantageous for difficult dynamic discrete problems, e.g. routing in telecommunication networks. Moreover, we believe that ant colony algorithms can be efficient for
J. Dro; P. Siarry
2006-01-01
203
Ant colony algorithms are a class of metaheuristics which are inspired from the behavior of real ants. The original idea consisted in simulating the stigmergic communication, therefore these algorithms are considered as a form of adaptive memory programming. A new formalization is proposed for the design of ant colony algorithms, introducing the biological notions of heterarchy and communication channels. We
Johann Dro; Patrick Siarry
2004-01-01
204
A hybrid simplex artificial bee colony algorithm (HSABCA) which combines NelderMead simplex method with artificial bee colony algorithm (ABCA) is proposed for inverse analysis problems. The proposed algorithm is applied to parameter identification of concrete dam-foundation systems. To verify the performance of HSABCA, it is compared with the basic ABCA and a real coded genetic algorithm (RCGA) on two examples:
Fei Kang; Junjie Li; Qing Xu
2009-01-01
205
To settle the contradictory between convergence speed and precocity and stagnation in ant colony algorithm, an adaptive ant colony algorithm, which is based on the equilibrium of the ant distribution, is presented. By dynamically adjusting the influence of each ant to the trail information updating and the selected probabilities of the paths according to the equilibrium of the ant distribution,
CHEN Ling; SHEN Jie; QIN Ling; CHEN Hong-Jian
206
Ant colony optimization (ACO) is a cooperative, population-based technique for optimization. Ant algorithms were designed on the base of the behavior of real ant colonies. Real ants can always find the shortest way between the nest and food source, using the environment as the communication tool, named stigmergy. In this paper we focus precisely on the process of finding an
2010-01-01
207
Ant colony optimization (ACO) is typically used to search paths through graphs. The concept is based on simulating the behavior of ants in finding paths from the colony to food. Its searching mechanism is applicable for optimizing electric circuits with components, like resistors and capacitors, available in discrete values. However, power electronic circuits (PECs) generally consist of components, like inductors,
Jun Zhang; Henry Shu-Hung Chung; Alan Wai-Lun Lo; Tao Huang
2009-01-01
208
Ant colony optimization (ACO) is typically used to search paths through graphs. The concept is based on simulating the behavior of ants in finding paths from the colony to food. Its searching mechanism is applicable for optimizing electric circuits with components, like resistors and capacitors, available in discrete values. In this paper, an extended ACO (eACO) that can search the
Jun Zhang; H. S. H. Chung; A. W. L. Lo; Tao Huang
2008-01-01
209
Employing the emergency number 911 as a device to open onto two continents of governance one hot the other cold, one binary, the other the disaggregation of the binary this paper shows that colonial governmentality is marked by a paradoxical combination of the two. Moreover, it argues that colonial governmentality is the progenitor of this form of governance
Michael Dutton
2010-01-01
210
ERIC Educational Resources Information Center
|To explore racial attitudes from the colonial period of the United States, a study examined advertising practices regarding announcements dealing with black slaves in colonial newspapers in Massachusetts, New York, Pennsylvania, Maryland, Virginia, and South Carolina. Careful scrutiny revealed no relationship between the editorial stance of a
211
The controlled use of a continuous power supply for robots of a colony is presented. This work builds on previous work where capacitors were used as an onboard power supply, and where robots with metallic probes were charged at a power station. An onboard controller was implemented to direct the hexapod colony robot behavior according to its power supply status.
Gary B. Parker; Richard S. Zbeda
2005-01-01
212
ERIC Educational Resources Information Center
To explore racial attitudes from the colonial period of the United States, a study examined advertising practices regarding announcements dealing with black slaves in colonial newspapers in Massachusetts, New York, Pennsylvania, Maryland, Virginia, and South Carolina. Careful scrutiny revealed no relationship between the editorial stance of a
213
The article addresses the issues of cultural and archival historical representations as they are presented in Danish journalism about historical events taking place in the former colonies of Denmark, the current United States' Virgin Islands (USVI). The (post)colonial relationship between Denmark and USVI has been overlooked by Danish and 'western'-based scholars for quite some time. The article presents the case
Bolette B. Blaagaard
2011-01-01
214
PubMed
The evolution of eusociality, especially how selection would favor sterility or subfertility of most individuals within a highly social colony, is an unresolved paradox. Eusociality evolved independently in diverse taxa, including insects (all ants and termites; some bees, wasps, thrips, and beetles), snapping shrimp, and naked mole rats. Termites have received comparatively less focus than the haplodiploid Hymenoptera (ants, bees, and wasps); however, they are the only diploid group with highly complex colonies and an extraordinary diversity of castes. In this study we staged encounters between unrelated colonies of primitive dampwood termites, Zootermopsis nevadensis, mimicking natural meetings that occur under bark. During encounters, kings and/or queens were killed and surviving members merged into one colony. After encounters, members of both unrelated colonies cooperated as a single social unit. We determined the colony of origin of replacement reproductives that emerged after death of kings and/or queens. Here, we document that replacement reproductives developed from workers in either or both original colonies, inherited the merged resources of the colony, and sometimes interbred. Because this species shares many characteristics with ancestral termites, these findings demonstrate how ecological factors could have promoted the evolution of eusociality by accelerating and enhancing direct fitness opportunities of helper offspring, rendering relatedness favoring kin selection less critical. PMID:19805058
Johns, Philip M; Howard, Kenneth J; Breisch, Nancy L; Rivera, Anahi; Thorne, Barbara L
2009-10-05
215
Trade unionism and politics are closely related in many developing countries, but they appear to be especially intimate in those countries which have recently gained their political independence from colonial rule. In such countries, nationalist movements were often built on a trade union base during the recent colonial period and continued to share common leadership and constituencies after independence. Consequently,
George E. Lichtblau
1962-01-01
216
ERIC Educational Resources Information Center
This article serves as a foundation for understanding the earliest form of technical instruction in colonial America. It is a synthesis of historical studies that have addresses the education of indentured servants and apprentices in colonial America. It defines indentured servitude and contrasts it with apprenticeship--a form of indentured
Snyder, Mark R.
2007-01-01
217
Football, one of the central components of twentieth-century Bengali popular culture, has generally been neglected by historians as unworthy of serious academic enquiry. This article examines the way in which football as a societal mirror reflected the articulation of race and nation in colonial Calcutta in a period of clearest nationalist upsurge against colonial rule. It attempts to explain how
2003-01-01
218
Colonial mentality is a term used widely by ethnic studies scholars and by the Filipino American community to refer to a form of internalized oppression among Filipinos and Filipino Americans. The authors propose that colonial mentality is a construct that is central to the understanding of the psychology of contemporary Filipino Americans. Drawing on larger scholarship from postcolonial studies and
E. J. R. David; Sumie Okazaki
2006-01-01
219
ERIC Educational Resources Information Center
|Ant colony optimization is a recently proposed heuristic procedure inspired by the behavior of real ants. This article applies the procedure to model specification searches in structural equation modeling and reports the results. The results demonstrate the capabilities of ant colony optimization algorithms for conducting automated searches.|
Marcoulides, George A.; Drezner, Zvi
2003-01-01
220
This research applies the meta-heuristic method of ant colony optimization (ACO) to an established set of vehicle routing problems (VRP). The procedure simulates the decision-making processes of ant colonies as they forage for food and is similar to other adaptive learning and artificial intelligence techniques such as Tabu Search, Simulated Annealing and Genetic Algorithms. Modifications are made to the ACO
John E. Bell; Patrick R. McMullen
221
Abstract This research applies the meta-heuristic method of ant colony optimization (ACO) to an established set of vehicle routing problems (VRP). The procedure simulates the decision-making processes of ant colonies as they forage for food and is similar to other adaptive learning and artificial intelligence techniques such as Tabu Search, Simulated Annealing and Genetic Algorithms. Modifications are made to the
John E. Bell; Patrick R. Mcmullen
2004-01-01
222
ERIC Educational Resources Information Center
|Science education in Papua New Guinea has been influenced by neo-colonial practices that have significantly contributed to the silencing of the Papua New Guinea voice. This silencing has led to the production of science curriculum documents that are irrelevant to the students for whom they are written. To avoid being caught up in neo-colonial
Ryan, Ann
2008-01-01
223
The Transatlantic Constitution makes a major impact on the way we see the legacy of the colonial period and the later federal relationship that continues to affect us today. Mary Sarah Bilder presents an intensive examination of the structure and functioning of the legal relationship across the Atlantic, between the people of a colony and the legal metropolis in London.
Mary S Bilder
2004-01-01
224
During the nineteenth century, an artistic trend spread across Europe. As urban centers housed the majority of professional artists, individuals and groups relocated to remote, bucolic areas to form art colonies. Artist colonies are typically defined as a group of artists, generally painters, writers, and composers who worked and lived as a community for a certain period of time. Artists
Jennifer L Aldrich
2008-01-01
225
Examination of genotypes of female-pup nursing pairs taken from large maternity colonies of the Mexican free-tailed bat in Texas demonstrates that nursing is nonrandom and selective along genetic (kinship) lines. This is contrary to previous reports that nursing in these colonies is indiscriminate. Although nursing is nonrandom, an estimated 17 percent of the females sampled were nursing pups that could
Gary F. McCracken
1984-01-01
226
The king penguin, Aptenodytes patagonicus, breeds without a nest in colonies of several thousands of birds. To be fed, the chick must recognize the parents in a particularly noisy environment using only vocal cues. The call an adult makes when seeking the chick is emitted at a high amplitude level. Nevertheless, it is transmitted in a colonial context involving the
Thierry Aubin; Pierre Jouventin
1998-01-01
227
Constructing Mexico City: Colonial Conflicts over Culture, Space, and Authority examines the spatial, material, and cultural dimensions of life in eighteenth-century Mexico City, through programs that colonial leaders created to renovate and reshape urban environments. Focusing particularly on the administration of Viceroy Juan Vicente de Gemes Pacheco y Padilla, the second count of Revillagigedo (1789-1794), this book considers how the
Sharon Bailey Glasco
2010-01-01
228
PubMed
In recent years, honeybees (Apis mellifera) have been strangely disappearing from their hives, and strong colonies have suddenly become weak and died. The precise aetiology underlying the disappearance of the bees remains a mystery. However, during the same period, Nosema ceranae, a microsporidium of the Asian bee Apis cerana, seems to have colonized A. mellifera, and it's now frequently detected all over the world in both healthy and weak honeybee colonies. For first time, we show that natural N. ceranae infection can cause the sudden collapse of bee colonies, establishing a direct correlation between N. ceranae infection and the death of honeybee colonies under field conditions. Signs of colony weakness were not evident until the queen could no longer replace the loss of the infected bees. The long asymptomatic incubation period can explain the absence of evident symptoms prior to colony collapse. Furthermore, our results demonstrate that healthy colonies near to an infected one can also become infected, and that N. ceranae infection can be controlled with a specific antibiotic, fumagillin. Moreover, the administration of 120 mg of fumagillin has proven to eliminate the infection, but it cannot avoid reinfection after 6 months. We provide Koch's postulates between N. ceranae infection and a syndrome with a long incubation period involving continuous death of adult bees, non-stop brood rearing by the bees and colony loss in winter or early spring despite the presence of sufficient remaining pollen and honey. PMID:18647336
Higes, Mariano; Martn-Hernndez, Raquel; Botas, Cristina; Bailn, Encarna Garrido; Gonzlez-Porto, Amelia V; Barrios, Laura; Del Nozal, M Jess; Bernal, Jos L; Jimnez, Juan J; Palencia, Pilar Garca; Meana, Arnzazu
2008-07-18
229
NSDL National Science Digital Library
Although more has been learned since colony collapse disorder (CCD) was first identified in mid-November 2006, the mystery remains. Some possibilitiescontamination with pollen from plants genetically modified to carry an insecticidal gene, radiation from cell phones, and perhaps even stress itselfcan probably be ruled out as contributory causes of CCD, but the cause of the bee colony losses remains unknown.
Myrna E. Watanabe (Science Writer;)
2008-05-01
230
One commonly observed phenomena about taxation in Africa are regional differences and the fact that southern African countries have higher levels of shares of taxation in GDP. This article argues that the major source of differences in tax effort is the colonial histories of various countries. Using standard measures of tax effort in a panel data framework and dividing colonial
Thandika Mkandawire
2010-01-01
231
ERIC Educational Resources Information Center
|A review of laws and records of the courts of colonial New England indicates early laws of Massachusetts extended certain rights to idiots: they authorized the transfer of property, exonerated idiots who committed capital crimes, and extended relief to impoverished idiots. The relationship between colonial laws and present legislation is
Wickham, Parnel
2001-01-01
232
PubMed
Physogastric queens of Melipona marginata were removed from their colonies in order to verify the acceptance of a new queen by workers. Colony strength was evaluated according to queen oviposition rate and comb diameters. Replacement was observed seven times. Its occurrence and speed related positively to colony strength, independently of queen's age. In weak colonies, queen replacement was observed only once, following colony population increase that occurred after introduction of combs from another colony. Worker oviposition after queen removal was observed three times: in a strong colony with virgin queens and males, and in two of the weak colonies. In the first two or three days of new queen oviposition, during which most of the eggs were eaten by the queen, worker oviposition preceded almost all provisioning and oviposition processes (POPs). After this period, worker oviposition decreased until it reached around 25% of the POPs. Daily oviposition rate of young queens decreased or was even interrupted by hatching of their first brood. PMID:16341425
Kleinert, A de M P
2005-12-02
233
While virtual community research has contributed to the understanding of the virtual community sustainability, a need for a systematic model exists. In this paper, we propose a model of sustainable virtual communities based on the sustainability properties of animal colonies in nature. The premise of our model is that if we manage to replicate the sustainability properties of colonial systems
Jaana Porra; Michael S. Parks
2006-01-01
234
Our aim was to test the existence of Gestalt colony odour in Camponotus fellah. We isolated individual workers to prevent trophallaxis, allogrooming and body contact. After 20 days, the cuticular hydrocarbon profile of the isolated ants diverged from that of the parent colony. Moreover, each isolated individual had its own specific blend. This procedure showed that after about 20 days
Raphael Boulay; Abraham Hefetz; Victoria Soroker; Alain Lenoir
2000-01-01
235
EPA Science Inventory
Colony surface area is a critical descriptor for biological and physical attributes of reef-building (scleractinian, stony) corals. The three-dimensional (3D) size and structure of corals are directly related to many ecosystem values and functions. Most methods to estimate colony...
236
Some worker honey bees respond to major disturbances of the colony by flying around the assailant and possibly stinging; they are a subset of the bees involved in colony defense. These defenders have an open-ended age distribution similar to that of foragers, but defensive behavior is initiated at a younger age than foraging is. Behavioral and genetic evidence shows that
Michael D. Breed; Gene E. Robinson; Robert E. Page
1990-01-01
237
ERIC Educational Resources Information Center
Jeremey Stoddard's article in this issue, "Toward a Virtual Field Trip Model for the Social Studies," describes his analysis of the Colonial Williamsburg Electronic Field Trip and a conceptual model for developing meaningful and successful electronic or virtual field trips. In an effort to contextualize the Colonial Williamsburg Electronic Field
Lee, John K.; Hicks, David
2009-01-01
238
Summary. We continue the investigation of P colonies introduced in (7), a class of abstract computing devices composed of independent agents, acting and evolving in a shared environment. We decrease the number of agents needed to computational completeness of P colonies with one and two objects inside each agent, respectively, owing some special restrictions to the type of programs. We
Ludek Cienciala; Lucie Ciencialov; Alica Kelemenov
2007-01-01
239
We study two very simple variants of P colonies: systems with only one object inside the cells, and systems with insertion-deletion programs, so called P colonies with senders and consumers. We show that both of these extremely simple types of systems are able to compute any recursively enumerable set of vectors of
Lucie Ciencialov; Erzsbet Csuhaj-Varj; Alica Kelemenov; Gyrgy Vaszil
2009-01-01
240
PubMed
The spectacular success of eusocial insects can be attributed to their sophisticated cooperation, yet cooperation is conspicuously absent during colony foundation when queens are alone. Selection against this solitary stage has led to a dramatically different strategy in thousands of eusocial insect species in which colonies are started by groups of nestmates and the benefits of sociality are retained continuously. Dependent colony foundation (DCF) evolved recurrently multiple times across the ants, bees, and wasps, though its prevalence in termites remains unclear. We review adaptations at both the colony level (reproductive investment shifts from sexuals to workers) and the individual level (wingless queens evolve in ants), and other consequences for life history (invasiveness, parasite transmission). Although few studies have focused on DCF, the accumulated data from anecdotal reports, supported by indirect information including morphology, population genetics, and colony demographics, make it clear that this strategy is more diverse and widespread than is usually recognized. PMID:22934981
Cronin, Adam L; Molet, Mathieu; Doums, Claudie; Monnin, Thibaud; Peeters, Christian
2012-08-29
241
SciTech Connect
In microbial ecology, accurate identification based on morphotype is often impossible, so the assumption is often made that colonies of the same morphotype represent the same species or biotype. This study examines the validity of using colony morphology as the selection criterion for calculating ecological indices of the diversity and equitability of recoverable microbial communities. Isolates within sets of microbial colonies were very similar in terms of colony morphology, microscopic appearance, resistance to metals, and response to API-rapid-NFT tests. Resistance to antibiotics was variable within sets. Fatty acid methyl ester (FAME) analysis distinguished between isolates of the same species or biotype. However, isolates belonging to the same biotype can be selected by morhotype. The researchers conclude colony morphology can provide an accurate basis on which to define recoverable diversity.
Haldeman, D.L.; Amy, P.S. (Univ. of Nevada, Las Vegas (United States))
1993-03-01
242
At the heart of most colonial states lay a contradiction. On the one hand, colonial state institutions defined themselves in opposition to indigenous networks of power associated with the pre-colonial period, whether based on ethnicity, tribal kinship or religious affiliation. On the other hand, few colonial states had sufficient bureaucratic substance to operate separately of indigenous society. This paper suggests
Martin Thomas
2005-01-01
243
National Technical Information Service (NTIS)
It is concluded that colony-forming cells derived from normal marrow are not capable of indefinite proliferation when they are subjected to the pressure of repeated transplantation. Cells with colony-forming ability found within spleen colonies cannot be ...
L. Siminovitch J. E. Till E. A. McCulloch
1964-01-01
244
Federal Register 2010, 2011, 2012, 2013
...OTS Nos. 04983, H-3879, and H-4714] Colonial Bankshares...Vineland, NJ; Approval of Conversion Application Notice is hereby...Colonial Bankshares, MHC, and Colonial Bank, Vineland, New...Washington, DC 20552, and the OTS Northeast Regional...
2010-05-21
245
PubMed
We re-investigated the behavior of hemocytes during the non-fusion (rejection) reaction between genetically incompatible colonies of the ascidian Botryllus schlosseri. In the course of the reaction, hemocytes - mainly morula cells - crowd inside the blind ends of marginal vascular vessels (known as ampullae) of the colonial leading edge (LE) facing the foreign colony which suggests the occurrence of chemotactic attraction of circulating hemocytes towards the ampullar lumen. Then, cells migrate, through the ampullar tips, into the partially fused tunics and contribute to the formation of the necrotic spots along the contact borders which characterize the reaction. Studies on histological sections clearly indicate that, although morula cell concentration is always higher in ampullae of the LE than in those of the lateral (L) part of the colony, their frequency significantly increases in LE ampullae of rejecting colonies with respect to LE ampullae of both fusing and isolated colonies. In addition, in vitro chemotaxis experiments demonstrated that blood plasma from incompatible colonies can stimulate morula cell migration through polycarbonate filters and this passage is inhibited by antibodies raised against mammalian pro-inflammatory cytokines. The possible nature and role of molecules recognized by anti-cytokine antibodies in hemocyte migration are discussed. PMID:16962802
Cima, Francesca; Sabbadin, Armando; Zaniolo, Giovanna; Ballarin, Loriano
2006-08-04
246
PubMed
Our aim was to test the existence of Gestalt colony odour in Camponotus fellah. We isolated individual workers to prevent trophallaxis, allogrooming and body contact. After 20 days, the cuticular hydrocarbon profile of the isolated ants diverged from that of the parent colony. Moreover, each isolated individual had its own specific blend. This procedure showed that after about 20 days of isolation there was a turnover of the colony odour, revealing the genetically expressed hydrocarbon profile of each individual. It also showed that the cuticular hydrocarbon profile is polymorphic, and that its homogeneity within a colony is maintained by frequent exchanges of hydrocarbons between workers. Behavioural observations of resident workers, in their nest, towards nestmates reintroduced after isolation indicated that a short isolation period (3-5 days), which induced a minor change in hydrocarbon profile, provoked frequent trophallactic solicitations. These were likely to permit the isolated ants to readjust their hydrocarbon profile to that of the ants in the mother colony. Longer isolation periods (20-40 days) induced a greater change in hydrocarbon profile and made the residents intolerant towards their introduced nestmates. Therefore, our results clearly support the existence of a Gestalt colony odour in C. fellah. They also show that since individual hydrocarbon production is dynamic, workers are obliged to exchange hydrocarbons continually (mainly by trophallaxis) in order to be in the Gestalt, and properly integrate into the colony. Copyright 2000 The Association for the Study of Animal Behaviour. PMID:10877891
Boulay; Hefetz; Soroker; Lenoir
2000-06-01
247
SciTech Connect
Ceramic shards found in Spanish Colonial missions in Texas consist of broken remnants of wares either brought from Mexico or manufactured locally by 18th century Native Americans. A few are thought to be of European or Asian manufacture, but these consist of only a few percent of the ceramic assemblages available for study now. Certain types of ceramics are consistently found in these sites, including local Native American wares and Mexican slipped or glazed wares. In addition, undecorated lead-glazed coarse earthenwares occur in great frequency, but their place of origin is unknown. Speculation has been that these lead-glazed wares, which range in color from yellow to olive-green and occur in both coiled and wheel-thrown constructions, were locally made by Native Americans using Spanish technology or that they were imported from Mexico. Compositional analysis of these wares was undertaken to clarify their source of manufacture. The sample included 102 ceramics from four Texas mission sites: Mission San Lorenzo de la Santa Cruz in Real County, Mission San Juan Capistrano in Bexar County, Mission Rosario in Goliad County, and Mission Dolores de los Ais in San Augustine County. A larger goal of the study was to examine the supply system to these well-dispersed mission sites and how it was affected by Spains economic climate during the l8th century.
James, W.D.; Carlson, S.B.; Carlson, D.L.
1994-12-31
248
PubMed Central
Evolutionary experiments with microbes are a powerful tool to study mutations and natural selection. These experiments, however, are often limited to the well-mixed environments of a test tube or a chemostat. Since spatial organization can significantly affect evolutionary dynamics, the need is growing for evolutionary experiments in spatially structured environments. The surface of a Petri dish provides such an environment, but a more detailed understanding of microbial growth on Petri dishes is necessary to interpret such experiments. We formulate a simple deterministic reaction-diffusion model, which successfully predicts the spatial patterns created by two competing species during colony expansion. We also derive the shape of these patterns analytically without relying on microscopic details of the model. In particular, we find that the relative fitness of two microbial strains can be estimated from the logarithmic spirals created by selective sweeps. The theory is tested with strains of the budding yeast Saccharomyces cerevisiae, for spatial competitions with different initial conditions and for a range of relative fitnesses. The reaction-diffusion model also connects the microscopic parameters like growth rates and diffusion constants with macroscopic spatial patterns and predicts the relationship between fitness in liquid cultures and on Petri dishes, which we confirmed experimentally. Spatial sector patterns therefore provide an alternative fitness assay to the commonly used liquid culture fitness assays.
Korolev, Kirill S; Muller, Melanie J I; Karahan, Nilay; Murray, Andrew W; Hallatschek, Oskar; Nelson, David R
2012-01-01
249
PubMed Central
Considerable progress in our understanding of the population genetic changes associated with biological invasions has been made over the past decade. Using selectively neutral loci, it has been established that reductions in genetic diversity, reflecting founder effects, have occurred during the establishment of some invasive populations. However, some colonial organisms may actually gain an ecological advantage from reduced genetic diversity because of the associated reduction in inter-colony conflict. Here we report population genetic analyses, along with colony fusion experiments, for a highly invasive colonial ascidian, Didemnum vexillum. Analyses based on mitochondrial cytochrome oxidase I (COI) partial coding sequences revealed two distinct D. vexillum clades. One COI clade appears to be restricted to the probable native region (i.e., north-west Pacific Ocean), while the other clade is present in widely dispersed temperate coastal waters around the world. This clade structure was supported by 18S ribosomal DNA (rDNA) sequence data, which revealed a one base-pair difference between the two clades. Recently established populations of D. vexillum in New Zealand displayed greatly reduced COI genetic diversity when compared with D. vexillum in Japan. In association with this reduction in genetic diversity was a significantly higher inter-colony fusion rate between randomly paired New Zealand D. vexillum colonies (80%, standard deviation 18%) when compared with colonies found in Japan (27%, standard deviation 15%). The results of this study add to growing evidence that for colonial organisms reductions in population level genetic diversity may alter colony interaction dynamics and enhance the invasive potential of newly colonizing species.
Smith, Kirsty F.; Stefaniak, Lauren; Saito, Yasunori; Gemmill, Chrissen E. C.; Cary, S. Craig; Fidler, Andrew E.
2012-01-01
250
Astronomical expeditions during the colonial period had a political and national significance also. Measuring the earth and mapping the sky were activities worthy of powerful and power- seeking nations. Such was the sanctity of global astronomical activity that many other agendas could be hidden under it. An early astronomy-related expedition turned out to be extremely beneficial, to botany. The expedition sent by the French Government in 1735 to South America under the leadership of Charles Marie de la Condamine (1701--1774) ostensibly for the measurement of an arc of the meridian at Quito in Ecuador surreptitiously collected data that enabled Linnaeus to describe the genus cinchona in 1742. When the pair of transits of Venus occurred in 1761 and 1769, France and England were engaged in a bitter rivalry for control of India. The observation of the transits became a part of the rivalry. A telescope presented by the British to a South Indian King as a decorative toy was borrowed back for actual use. Scientifically the transit observations were a wash out, but the exercise introduced Europe to details of living Indian tradition of eclipse calculations. More significantly, it led to the institutionalization of modern astronomy in India under the auspices of the English East India Company (1787). The transits of Venus of 1874 and 1882 were important not so much for the study of the events as for initiating systematic photography of the Sun. By this, Britain owned most of the world's sunshine, and was expected to help European solar physicists get data from its vast Empire on a regular basis. This and the then genuinely held belief that a study of the sun would help predict failure of monsoons led to the institutionalization of solar physics studies in India (1899). Of course, when the solar physicists learnt that solar activity did not quite determine rainfall in India, they forgot to inform the Government.
Kochhar, Rajesh
2012-09-01
251
PubMed
Development of forms in living organisms is complex and fascinating. Morphogenetic theories that investigate these shapes range from discrete to continuous models, from the variational elasticity to time-dependent fluid approach. Here a mixture model is chosen to describe the mass transport in a morphogenetic gradient: it gives a mathematical description of a mixture involving several constituents in mechanical interactions. This model, which is highly flexible can incorporate many biological processes but also complex interactions between cells as well as between cells and their environment. We use this model to derive a free-boundary problem easier to handle analytically. We solve it in the simplest geometry: an infinite linear front advancing with a constant velocity. In all the cases investigated here as the 3 D diffusion, the increase of mitotic activity at the border, nonlinear laws for the uptake of morphogens or for the mobility coefficient, a planar front exists above a critical threshold for the mobility coefficient but it becomes unstable just above the threshold at long wavelengths due to the existence of a Goldstone mode. This explains why sparsely bacteria exhibit dendritic patterns experimentally in opposition to other colonies such as biofilms and epithelia which are more compact. In the most unstable situation, where all the laws: diffusion, chemotaxis driving and chemoattractant uptake are linear, we show also that the system can recover a dynamic stability. A second threshold for the mobility exists which has a lower value as the ratio between diffusion coefficients decreases. Within the framework of this model where the biomass is treated mainly as a viscous and diffusive fluid, we show that the multiplicity of independent parameters in real biologic experimental set-up may explain varieties of observed patterns. PMID:23807468
Ben Amar, Martine
2013-06-27
252
National Technical Information Service (NTIS)
Ant colony optimization algorithms have long been touted as providing an effective and efficient means of generating high quality solutions to NP-hard optimization problems. Unfortunately, while the structure of the algorithm is easy to parallelize, the n...
A. A. De Freitas
2007-01-01
253
National Technical Information Service (NTIS)
This research merges the hierarchical reinforcement learning (HRL) domain and the ant colony optimization (ACO) domain. The merger produces a HRL ACO algorithm capable of generating solutions for both domains. This research also provides two specific impl...
E. Dries
2007-01-01
254
PubMed
Although reports on colony demographics for a variety of callitrichid species are available in the literature, to date there has not been a detailed examination of Wied's black tufted-ear marmoset (Callithrix kuhlii). The purpose of this study is to present colony demographics for C. kuhlii from the University of Nebraska at Omaha's Callitrichid Research Center from 1991 to 2002. C. kuhlii are currently held in a number of zoological parks in the United States and abroad; however, the University of Nebraska at Omaha held the only breeding colony in North America. Here we report data on lifespan, sex ratio, litter size, and interbirth interval (IBI) for that captive breeding colony. PMID:17177315
Ross, Corinna N; Fite, Jeffrey E; Jensen, Heather; French, Jeffrey A
2007-02-01
255
PubMed Central
Although reports on colony demographics for a variety of callitrichid species are available in the literature, to date there has not been a detailed examination of Wieds black tufted-ear marmoset (Callithrix kuhlii). The purpose of this study is to present colony demographics for C. kuhlii from the University of Nebraska at Omahas Callitrichid Research Center from 1991 to 2002. C. kuhlii are currently held in a number of zoological parks in the United States and abroad; however, the University of Nebraska at Omaha held the only breeding colony in North America. Here we report data on lifespan, sex ratio, litter size, and interbirth interval (IBI) for that captive breeding colony.
ROSS, CORINNA N.; FITE, JEFFREY E.; JENSEN, HEATHER; FRENCH, JEFFREY A.
2010-01-01
256
PubMed
Honeybee colony collapse is a sanitary and ecological worldwide problem. The features of this syndrome are an unexplained disappearance of adult bees, a lack of brood attention, reduced colony strength, and heavy winter mortality without any previous evident pathological disturbances. To date there has not been a consensus about its origins. This report describes the clinical features of two professional bee-keepers affecting by this syndrome. Anamnesis, clinical examination and analyses support that the depopulation in both cases was due to the infection by Nosema ceranae (Microsporidia), an emerging pathogen of Apis mellifera. No other significant pathogens or pesticides (neonicotinoids) were detected and the bees had not been foraging in corn or sunflower crops. The treatment with fumagillin avoided the loss of surviving weak colonies. This is the first case report of honeybee colony collapse due to N. ceranae in professional apiaries in field conditions reported worldwide. PMID:23765741
Higes, Mariano; Martn-Hernndez, Raquel; Garrido-Bailn, Encarna; Gonzlez-Porto, Amelia V; Garca-Palencia, Pilar; Meana, Aranzazu; Del Nozal, Mara J; Mayo, R; Bernal, Jos L
2009-02-16
257
PubMed
Although still often considered as simple unicellular organisms, in natural settings yeast cells tend to organize into intricate multicellular communities. Due to specific mechanisms only feasible at the population level, their capacity for social behavior is advantageous for their survival in a harmful environment. Feral Saccharomyces cerevisiae strains form complex structured colonies, which display many properties typical of natural biofilms causing (among others) serious infections in the human body. In our recent paper, we looked inside a growing colony using two-photon confocal microscopy. This allowed us to elucidate its three-dimensional colony architecture and some mechanisms responsible for community protection. Moreover, we showed how particular protective mechanisms complement each other during colony development and how each of them contributes to its defense against attacks from the environment. Our findings broaden current understanding of microbial multicellularity in general and also shed new light on the enormous resistance of yeast biofilms. PMID:22808334
S?ov?ek, Vratislav; Vchov, Libue; Palkov, Zdena
2012-03-01
258
PubMed Central
Although still often considered as simple unicellular organisms, in natural settings yeast cells tend to organize into intricate multicellular communities. Due to specific mechanisms only feasible at the population level, their capacity for social behavior is advantageous for their survival in a harmful environment. Feral Saccharomyces cerevisiae strains form complex structured colonies, which display many properties typical of natural biofilms causing (among others) serious infections in the human body. In our recent paper, we looked inside a growing colony using two-photon confocal microscopy. This allowed us to elucidate its three-dimensional colony architecture and some mechanisms responsible for community protection. Moreover, we showed how particular protective mechanisms complement each other during colony development and how each of them contributes to its defense against attacks from the environment. Our findings broaden current understanding of microbial multicellularity in general and also shed new light on the enormous resistance of yeast biofilms.
Stovicek, Vratislav; Vachova, Libuse; Palkova, Zdena
2012-01-01
259
In a study of seven massive, Caribbean corals, I have found major differences in reproductive behavior between species with large maximum colony sizes and species with smaller maximum colony sizes. Four species ( Diploria clivosa, D. strigosa, Montastrea cavernosa, Siderastrea siderea) which are large (<1000 cm2 in surface area) broadcast gametes during a short spawning season. Their puberty size is relatively large (>100 cm2, except M. cavernosa). In contrast, two small massive species (<100 cm2, Favia fragum and S. radians), and one medium-sized (100 1000 cm2, Porites astreoides) massive species, brood larvae during an extended season (year-round in Panama). The puberty size of the small species is only 2 4 cm2. Given these close associations between maximum colony sizes and a number of fundamental reproductive attributes, greater attention should be given to the colony size distributions of different species of reef corals in nature, since many important life history and population characters may be inferred.
Soong, Keryea
1993-07-01
260
In the Cape honey bee Apis mellifera capensis, workers lay female eggs without mating by thelytokous parthenogenesis. As a result, workers are as related to worker-laid eggs as they are to queen-laid eggs and therefore worker policing is expected to be lower, or even absent. This was tested by transferring worker- and queen-laid eggs into three queenright A. m. capensis discriminator colonies and monitoring their removal. Our results show that worker policing is variable in A. m. capensis and that in one colony worker-laid eggs were not removed. This is the first report of a non-policing queenright honey bee colony. DNA microsatellite and morphometric analysis suggests that the racial composition of the three discriminator colonies was different. The variation in policing rates could be explained by differences in degrees of hybridisation between A. m. capensis and A. m. scutellata, although a larger survey is needed to confirm this.
Beekman, Madeleine; Good, Gregory; Allsopp, Mike; Radloff, Sarah; Pirk, Chris; Ratnieks, Francis
2002-09-01
261
Code of Federal Regulations, 2013 CFR
...colonies counted is used in the diagnosis of disease as a measure of the degree of bacterial infection. (b) Classification. Class I (general controls). The device is exempt from the premarket notification procedures in subpart E of...
2013-04-01
262
Code of Federal Regulations, 2013 CFR
...colonies counted is used in the diagnosis of disease as a measure of the degree of bacterial infection. (b) Classification. Class I (general controls). The device is exempt from the premarket notification procedures in subpart E of...
2013-04-01
263
To explore the concept of identity in colonial Ecuador is to examine a multiplicity of ideas and ideologies. As a historical\\u000a archaeologist trained in North America I bring with me my training in Americanist anthropology and archaeology. As Eric Wolf\\u000a points out, the anthropologist works within a discipline that was forged in colonialism, and yet at the same time anthropology
Ross W. Jamieson
264
This work proposes an algorithm for data mining called Ant-Miner (Ant Colony-based Data Miner). The goal of Ant-Miner is to extract classification rules from data. The algorithm is inspired by both research on the behavior of real ant colonies and some data mining concepts and principles. We compare the performance of Ant-Miner with CN2, a well-known data mining algorithm for
Rafael S. Parpinelli; Heitor S. Lopes; Alex Alves Freitas
2002-01-01
265
PubMed Central
The Henry oblique transmitted-light viewing technique was modified to provide a more precise, convenient, and familiar manner with which to read (score) and recognize colonies of listeriae by their distinct bluish cast. The simplified technique involved illuminating each colony directly with a high-intensity lamp while viewing it with a hand lens at a precise angle in place of a scanning light microscope.
Lachica, R V
1990-01-01
266
.?Proteus mirabilis colonies display striking symmetry and periodicity. Based on experimental observations of cellular differentiation and group\\u000a motility, a kinetic model has been developed to describe the swarmer cell differentiation-dedifferentiation cycle and the\\u000a spatial evolution of swimmer and swarmer cells during Proteus mirabilis swarm colony development. A key element of the model is the age dependence of swarmer cell behaviour,
Sergei E. Esipov; J. A. Shapiro
1998-01-01
267
\\u000a This essay voices a de-colonial reading of peripheral Judaism. The de-colonial discourse reconfigures the racial, political,\\u000a and epistemological alliances that were put in place after the Holocaust. By departing from the limitations of one of the\\u000a most influential post-1945 European Jewish intellectuals, Emmanuel Levinas, I show the need to return to a narrative of Jewish\\u000a thought that neither reduces racial
Santiago E. Slabodsky
268
Honey bee colonies furnish their nests with two types of comb distinguished by cell size: large cells for rearing males (drone\\u000a comb) and small cells for rearing workers (worker comb). The bees actively regulate the relative quantity of each type, a\\u000a behavior likely to be important in setting a colony's sex ratio. Experimental analysis of the information pathways and control
Stephen C. Pratt
1998-01-01
269
We deal with an ant colony based routing model for wireless multi-hop networks. Our model adopts an elliptic curve equation, which is beneficial to design pheromone dynamics for load balancing and packet delivery robustness. Due to the attribute of an elliptic curve equation, our model prevents the over-utilization of a specific node, distinctively from conventional ant colony based schemes. Numerical simulations exhibit the characteristics of our model with respect to various parameters.
Jung, Sangsu; Kim, Daeyeoul; Singh, Dhananjay
2011-09-01
270
Marrow cells derived from C57BL\\/6 mice form many fewer splenic colonies in irradiated C57BL\\/6 C3H F1 hybrid recipients than in irradiated C57BL\\/6 recipients (repression of colony formation). This effect is reversed by treatment of the hybrid recipients with active antiserum to mouse thymocytes. The repression phenomenon cannot readily be explained in immunological terms; hence the effect of the antilymphocyte
J. E. Till; S. Wilson; E. A. McCulloch
1970-01-01
271
This paper examines the possible relationships between gender and nation in Irish culture, placing Ireland in the context of post?colonial theory and arguing that Gramsci's notion of the subaltern (later adapted by post?colonial theorists) offers a useful way in which to begin to understand how gender and Irishness co?exist. The paper argues that Gramsci's definition of the subaltern, when translated
Colin Graham
1996-01-01
272
This study examines the perceptions and treatment of older Native American adults in colonial New England (16201783). Social\\u000a scientists have found that varying degrees of persistence and change have historically characterized Indian attitudes toward\\u000a older adults in communities located in the central and western United States. In regards to northeastern North America, historians\\u000a have learned that, during the colonial period,
Jason Eden; Naomi Eden
2010-01-01
273
PubMed
Fourier transform infrared and Raman microspectroscopy are currently being developed as new methods for the rapid identification of clinically relevant microorganisms. These methods involve measuring spectra from microcolonies which have been cultured for as little as 6 h, followed by the nonsubjective identification of microorganisms through the use of multivariate statistical analyses. To examine the biological heterogeneity of microorganism growth which is reflected in the spectra, measurements were acquired from various positions within (micro)colonies cultured for 6, 12, and 24 h. The studies reveal that there is little spectral variance in 6-h microcolonies. In contrast, the 12- and 24-h cultures exhibited a significant amount of heterogeneity. Hierarchical cluster analysis of the spectra from the various positions and depths reveals the presence of different layers in the colonies. Further analysis indicates that spectra acquired from the surface of the colonies exhibit higher levels of glycogen than do the deeper layers of the colony. Additionally, the spectra from the deeper layers present with higher RNA levels than the surface layers. Therefore, the 6-h colonies with their limited heterogeneity are more suitable for inclusion in a spectral database to be used for classification purposes. These results also demonstrate that vibrational spectroscopic techniques can be useful tools for studying the nature of colony development and biofilm formation. PMID:11282591
Choo-Smith, L P; Maquelin, K; van Vreeswijk, T; Bruining, H A; Puppels, G J; Ngo Thi, N A; Kirschner, C; Naumann, D; Ami, D; Villa, A M; Orsini, F; Doglia, S M; Lamfarraj, H; Sockalingum, G D; Manfait, M; Allouch, P; Endtz, H P
2001-04-01
274
We apply the stochastic methods of statistical physics to analyse collective-decision making in social insect colonies, allowing us to derive the colony-level behaviour from an individual-level model. This contrasts with the traditional approach where a differential equation model, with or without arbitrary noise terms, is assumed. Social insect colonies vary in size from on the order 100 to 10,000,000 individuals, and such a statistical physics approach allows us explicitly to derive equations for both the average behaviour and the noise in the system, across this entire scale. We develop such a framework by building upon an existing stochastic model of opinion formation to model the decision-making processes in emigrating ant colonies. This new model is both driven by and evaluated against results from experiments with rock ants. This allows us to elucidate rigorously the role played by the individual-level phenomena of direct switching in the colony-level decision-making process, which optimality theory has predicted to be of crucial importance, and which we compare with our experimental results. This illustrates the power of the stochastic methods of statistical physics for understanding social insect colonies as complex systems.
Hogan, Patrick M.; Schlegel, Thomas; Franks, Nigel R.; Marshall, James A. R.
2011-03-01
275
The impact of drifting workers and drones on evaluating performance data of honeybee (Apis mellifera carnica) colonies was studied using DNA microsatellites. Colony size, honey yield and colony level of infestation with Varroa jacobsoniwere evaluated from 30 queenright colonies. Individuals (n = 1359 workers from 38 colonies, n = 449 drones from 14 colonies) were genotyped using four DNA microsatellite
Peter Neumann; Robin F. A. Moritz; Dieter Mautz
2000-01-01
276
PubMed Central
In vitro drug sensitivity testing, both by optical colony counting and by a [3H]-TdR incorporation assay, was performed on human tumour cells proliferating in soft agar cultures. Cells from two different human tumour cell lines, 5 different human tumour xenografts, and 94 different primary human tumour specimens of various histologic types were studied. Regression analysis comparing the results of the colony counting assay and the [3H]-TdR assay revealed good to excellent correlations between the two assay endpoints for quantitating the effect of in vitro anticancer drug exposure for a large number of different agents. The presence of pre-existing tumour cell aggregates complicates the performance of the optical colony counting assay. The [3H]-TdR incorporation assay is more sensitive and reproducible than the colony counting assay when performed on samples containing a large number of initially seeded tumour cell aggregates.
Jones, C. A.; Tsukamoto, T.; O'Brien, P. C.; Uhl, C. B.; Alley, M. C.; Lieber, M. M.
1985-01-01
277
Through a comparative study of India and Pakistan's national security discourses, this article explores the linkages between post-colonial India and Pakistan's nationalist\\/communalist identities, configurations of masculinities, and gendered representations underpinning their nuclear (in)securities. This paper contends that the colonial politics of place-making in the sub-continent has not only inscribed a process of othering between these states but has also facilitated
Runa Das
2010-01-01
278
Summary We examined the conditions necessary for performing a reliable erythropoietin (EPO) assay based on CFU-E colony formation in fetal mouse liver cell (FMLC) microcultures using 96-well microtiter plates. Both linearity of colony numbers with the number of cells plated and comparison among the colony ratios at various densities of seeding cells indicated that the colonies originated from a single
S. Sakata; Y. Enoki
1992-01-01
279
Little is known in general about how group size or ectoparasitism affect survival in colonial animals. We estimated daily within-season survival probabilities for nesting adult and recently fledged juvenile cliff swallows ( Petrochelidon pyrrhonota) at 239 colonies from 1983 to 2003 in southwestern Nebraska, USA. Some colonies had been fumigated to remove ectoparasites. We conducted mark-recapture at each colony site
Charles R. Brown; Mary Bomberger Brown
2004-01-01
280
In this study I examined how the paper wasp, Polistes fuscatus, defends a colony when faced with a vertebrate attack. I looked for a division of labour in defensive behaviour within a colony and examined whether this behaviour changes over the colony cycle. The colonies were presented with a model of an adult red-winged blackbird, Agelaius phoeniceus, and a speaker
Timothy M. Judd
2000-01-01
281
The polygyne form of the red imported re ant, Solenopsis invicta Buren, is thought to occur primarily in discrete populations embedded within areas composed of monogyne colonies. This distribution implies that polygyne colonies compete with monogyne colonies and subsequently create a population homogenous in social form. Because polygyne colonies produce mostly sterile males, opportunities for insemination of female alates might
G. N. Fritz; R. K. Vander Meer
2003-01-01
282
Thelohania solenopsae Knell, Allen, & Hazard is an entomopathogenic microsporidium that infects imported fire ants. We documented artificially initiated transmission of T. solenopsae among colonies of the red imported fire ant, Solenopsis invicta Buren. Microsporidian transmission was initiated by providing colonies with brood (mixture of eggs, larvae, and pupae) from infected S. invicta colonies. Inoculated laboratory colonies of S. invicta
DAVID F. WILLIAMS; DAVID H. OI; GREGORY J. KNUE
283
Three studies were conducted to assess the effects of the entomopathogen Thelohania solenopsae on polygynous, red imported re ant, Solenopsis invicta Buren, colonies. A total of 57 of 122 queens (46.7%) from nine, eld-collected, polygyne, S. invicta colonies, was infected with T. solenop- sae. Infection rate of queens for each colony ranged from 25 to 75%. Laboratory colonies of polygyne
David H. Oi; David F. Williams
2002-01-01
284
Colony size and worker polymorphism (headwidth) were determined for fire ant colonies ranging from incipient to 12 years of age. Colonies grew approximately logistically, reaching half size between 21\\/2 and 31\\/2 yr and reaching their maximum size of about 220000 workers after 4 to 6 yr. Colony size showed strong seasonal variation. There was some evidence that growth rate may
Walter R. Tschinkel
1988-01-01
285
We estimated survival and movement probabilities in relation to breeding-colony size in the sociable weaver (Philetairus socius) by using multistate statistical methods, in which survival and movement to time t + 1 is conditional on an individual's colony size at time t. The sociable weaver is a colonial, cooperatively breeding species that builds a massive communal nest, with colony size
Charles R. Brown; Rita Covas; Mark D. Anderson; Mary Bomberger Browna
2003-01-01
286
Ant colonies emigrate frequently from one nest site to another. Emigrations, however, are dangerous, particularly for colonies with a single queen. The queen is a ''vital organ'' of the colony, and emigrations expose her to grave peril. The optimal strategy for a monogynous ant colony, therefore, should be that the queen moves during the middle of the emigration so that
Nigel R. Franks; Ana B. Sendova-Franks
2000-01-01
287
Individually labeled freshly emerged honeybee workers (Apis mellifera) from three unre- lated source colonies were introduced into five host colonies. The location of the workers during their first eight days of life was monitored. Workers from the same source colony tended to be found more often in the same area of the comb than workers from a different source colony.
Robin F. A. Moritz; Robin M. Crewe; H. Randall Hepburn
2000-01-01
288
Colony number in many colony calculating experiments is counted by manual method at present, therefore it is difficult to get the result quickly and accurately when the number of experimental sample is large. A new automatic colony counting system was developed, which makes use of image-processing technology to feasibly count white bacterial colonies in clear plates according to the RGB
Shen Wei-zheng; Zhao Jie; Wu Ya-chun; Zheng Hui
2010-01-01
289
USGS Publications Warehouse
Sylvatic plague (Yersinia pestis) is an exotic pathogen that is highly virulent in black-tailed prairie dogs (Cynomys ludovicianus) and causes widespread colony losses and individual mortality rates >95%. We investigated colony spatial characteristics that may influence inter-colony transmission of plague at 3 prairie dog colony complexes in the Great Plains. The 4 spatial characteristics we considered include: colony size, Euclidean distance to nearest neighboring colony, colony proximity index, and distance to nearest drainage (dispersal) corridor. We used multi-state mark-recapture models to determine the relationship between these colony characteristics and probability of plague transmission among prairie dog colonies. Annual mapping of colonies and mark-recapture analyses of disease dynamics in natural colonies led to 4 main results: 1) plague outbreaks exhibited high spatial and temporal variation, 2) the site of initiation of epizootic plague may have substantially influenced the subsequent inter-colony spread of plague, 3) the long-term effect of plague on individual colonies differed among sites because of how individuals and colonies were distributed, and 4) colony spatial characteristics were related to the probability of infection at all sites although the relative importance and direction of relationships varied among sites. Our findings suggest that conventional prairie dog conservation management strategies, including promoting large, highly connected colonies, may need to be altered in the presence of plague. ?? 2011 The Wildlife Society.
Johnson, T. L.; Cully, Jr. , J. F.; Collinge, S. K.; Ray, C.; Frey, C. M.; Sandercock, B. K.
2011-01-01
290
Summary This study investigated the effects of colony growth and development, food storage, foraging activity and weather on the migration behavior of African honey bees in the Okavango River Delta, Botswana. Four observation colonies were studied during the honey bee migration season (NovemberMay), at which time the availability of blooming species was reduced. Two of the colonies (colonies 1 &
S. S. Schneider; L. C. McNally
1992-01-01
291
In colony collapse disorder (CCD), honey bee colonies inexplicably lose their workers. CCD has resulted in a loss of 50 to 90% of colonies in beekeeping operations across the United States. The observation that irradiated combs from affected colonies can be repopulated with naive bees suggests that infection may contribute to CCD. We used an unbiased metagenomic approach to survey
Diana L. Cox-Foster; Sean Conlan; Edward C. Holmes; Gustavo Palacios; Jay D. Evans; Nancy A. Moran; Phenix-Lan Quan; Thomas Briese; Mady Hornig; David M. Geiser; Vince Martinson; Dennis vanEngelsdorp; Abby L. Kalkstein; Andrew Drysdale; Jeffrey Hui; Junhui Zhai; Liwang Cui; Stephen K. Hutchison; Jan Fredrik Simons; Michael Egholm; Jeffery S. Pettis; W. Ian Lipkin
2007-01-01
292
It is known that some kinds of intelligent behavior can be realized by utilizing a model of an ant colony in which ants act by exchanging information with one another via virtual pheromone. This model is called ant colony model or ant colony optimization. The ant colony model often makes the ants generate routes that look like patterns similar to
Xin Yin; Tadahiro Fujimoto; Norishige Chiba
2005-01-01
293
Abstract The phenotypes ,of thirty queenright honeybee ,colonies with naturally mated ,queens ,were evaluated over a two years period. Colony size, honey yields and colony levels of infestation with Varroa jacobsoni were ,assessed. Worker samples were taken from each tested colony. Individual workers were genotyped at four DNA-microsatellite loci to determine the degree of polyandry. We found significant correlations between
PETER NEUMANN; ROBIN F. A. MORITZ
294
Peripheral blood mononuclear cells from patients with polycythemia vera or myelofibrosis with myeloid metaplasia were studied for their erythroid colony growth characteristics in plasma clot cultures. In both diseases, erythroid colonies formed early in culture in the absence of added erythropoietin (endogenous colonies). In no instance did early, endogenous colony formation occur with peripheral blood cells from normals or patients
John D. Lutton; Richard D. Levere
1979-01-01
295
SciTech Connect
Environmental monitoring of the US Department of Energy's (DOE) Colonie Interim Storage Site (CISS) and surrounding area began in 1984. CISS is part of the Formerly Utilized Sites Remedial Action Program (FUSRAP), a DOE program to decontaminate or otherwise control sties where residual radioactive materials remain from the early years of the nation's atomic energy program or from commercial operations causing conditions that Congress has authorized DOE to remedy. The routine environmental monitoring program at CISS includes sampling networks for external gamma radiation exposures and for radium-226, throium-232, an total uranium concentrations in surface water, sediment, and groundwater. Additionally, the nonradiological parameters volatile and semivolatile organics, pesticides/polychlorinated biphenyls (PCBs), metals, total organic carbon (TOC), total organic halides (TOX), specific conductivity, and pH are measured in groundwater. 14 refs., 20 figs., 25 tabs.
Not Available
1991-09-01
296
SciTech Connect
IN 1984, Congress assigned the cleanup of the National Lead (NL) Industries site in Colonie, New York, to the Department of Energy (DOE) as part of a decontamination research and development project under the 1984 Energy and Water Appropriations Act. DOE then included the site in the Formerly Utilized Sites Remedial Action Program (FUSRAP), an existing DOE program to decontaminate or otherwise control sites where residual radioactive materials remain for the early years of the nation's atomic energy program. DOE instituted an environmental monitoring program at the site in 1984. Results are presented annually in reports such as this. Under FUSRAP, the first environmental monitoring report for this site presented data for calendar year 1984. This report presents the findings of the environmental monitoring program conducted during calendar year 1989. 16 refs., 17 figs., 14 tabs.
Not Available
1990-05-01
297
PubMed
"This paper is part of a larger project investigating the production and regulation of North African immigrants in the greater Paris automobile industry. Its aims are twofold. First, to reverse the emphasis placed on immigrants in the receiving countries and to (re-)explore the historical production of Algerian emigration into metropolitan industry, more specifically within the automobile industry....Second, in adopting an articulation of modes of production' (AMOP) narrative as an alternative to other Eurocentric approaches, the first part of this paper emphasizes the contradictory layering of various modes which have produced an Algerian colonial diaspora. The latter half of the paper argues that the history of post-independence Algeria confirms that emigration was reinforced through a complex neocolonial relationship during a period of rapid acceleration of Algerian migration to France." PMID:12292879
Samers, M
1997-01-01
298
PubMed Central
Endosymbiotic dinoflagellates in the genus Symbiodinium are fundamentally important to the biology of scleractinian corals, as well as to a variety of other marine organisms. The genus Symbiodinium is genetically and functionally diverse and the taxonomic nature of the union between Symbiodinium and corals is implicated as a key trait determining the environmental tolerance of the symbiosis. Surprisingly, the question of how Symbiodinium diversity partitions within a species across spatial scales of meters to kilometers has received little attention, but is important to understanding the intrinsic biological scope of a given coral population and adaptations to the local environment. Here we address this gap by describing the Symbiodinium ITS2 sequence assemblages recovered from colonies of the reef building coral Montipora capitata sampled across K?ne'ohe Bay, Hawai'i. A total of 52 corals were sampled in a nested design of Coral Colony(Site(Region)) reflecting spatial scales of meters to kilometers. A diversity of Symbiodinium ITS2 sequences was recovered with the majority of variance partitioning at the level of the Coral Colony. To confirm this result, the Symbiodinium ITS2 sequence diversity in six M. capitata colonies were analyzed in much greater depth with 35 to 55 clones per colony. The ITS2 sequences and quantitative composition recovered from these colonies varied significantly, indicating that each coral hosted a different assemblage of Symbiodinium. The diversity of Symbiodinium ITS2 sequence assemblages retrieved from individual colonies of M. capitata here highlights the problems inherent in interpreting multi-copy and intra-genomically variable molecular markers, and serves as a context for discussing the utility and biological relevance of assigning species names based on Symbiodinium ITS2 genotyping.
Stat, Michael; Bird, Christopher E.; Pochon, Xavier; Chasqui, Luis; Chauka, Leonard J.; Concepcion, Gregory T.; Logan, Dan; Takabayashi, Misaki; Toonen, Robert J.; Gates, Ruth D.
2011-01-01
299
PubMed
Endosymbiotic dinoflagellates in the genus Symbiodinium are fundamentally important to the biology of scleractinian corals, as well as to a variety of other marine organisms. The genus Symbiodinium is genetically and functionally diverse and the taxonomic nature of the union between Symbiodinium and corals is implicated as a key trait determining the environmental tolerance of the symbiosis. Surprisingly, the question of how Symbiodinium diversity partitions within a species across spatial scales of meters to kilometers has received little attention, but is important to understanding the intrinsic biological scope of a given coral population and adaptations to the local environment. Here we address this gap by describing the Symbiodinium ITS2 sequence assemblages recovered from colonies of the reef building coral Montipora capitata sampled across K?ne'ohe Bay, Hawai'i. A total of 52 corals were sampled in a nested design of Coral Colony(Site(Region)) reflecting spatial scales of meters to kilometers. A diversity of Symbiodinium ITS2 sequences was recovered with the majority of variance partitioning at the level of the Coral Colony. To confirm this result, the Symbiodinium ITS2 sequence diversity in six M. capitata colonies were analyzed in much greater depth with 35 to 55 clones per colony. The ITS2 sequences and quantitative composition recovered from these colonies varied significantly, indicating that each coral hosted a different assemblage of Symbiodinium. The diversity of Symbiodinium ITS2 sequence assemblages retrieved from individual colonies of M. capitata here highlights the problems inherent in interpreting multi-copy and intra-genomically variable molecular markers, and serves as a context for discussing the utility and biological relevance of assigning species names based on Symbiodinium ITS2 genotyping. PMID:21246044
Stat, Michael; Bird, Christopher E; Pochon, Xavier; Chasqui, Luis; Chauka, Leonard J; Concepcion, Gregory T; Logan, Dan; Takabayashi, Misaki; Toonen, Robert J; Gates, Ruth D
2011-01-05
300
A potential benefit of living in a colony is that animals may gain information about the location of good foraging sites from other colony members1-3. The role of information transfer as a major benefit favouring the evolution of coloniality is, however, very poorly understood4. Information transfer has been demonstrated for only a few colonial vertebrate species5-7, but not all colonial
Erick Greene
1987-01-01
301
PubMed
In botryllid ascidians, allogeneic contacts between histoincompatible colonies lead to inflammatory rejection responses, which eventually separate the interacting colonies. In order to elucidate the molecular background of allogeneic rejection in the colonial ascidian Botryllus schlosseri, we performed microarray assays verified by qPCR, and employed bioinformatic analyses of the results, revealing disparate transcription profiles of the rejecting partners. While only minor expression changes were documented during rejection when both interacting genotypes were pooled together, analyses performed on each genotype separately portrayed disparate transcriptome responses. Allogeneic interacting genotypes that developed the morphological markers of rejection (points of rejection; PORs), termed 'rejected' genotypes, showed transcription inhibition of key functional gene groups, including protein biosynthesis, cell structure and motility and stress response genes. In contrast, the allogeneic partners that did not show PORs, termed 'rejecting' genotypes, showed minor expression changes that were different from those of the 'rejected' genotypes. This data demonstrates that the observed morphological changes in the 'rejected' genotypes are not due to active transcriptional response to the immune challenge but reflect transcription inhibition of response elements. Based on the morphological and molecular outcomes we suggest that the 'rejected' colony activates an injurious self-destructive mechanism in order to disconnect itself from its histoincompatible neighboring colony. PMID:20452026
Oren, Matan; Paz, Guy; Douek, Jacob; Rosner, Amalia; Fishelson, Zvi; Goulet, Tamar L; Henckel, Kolja; Rinkevich, Baruch
2010-05-07
302
PubMed
We investigate the relationship of incubation time and forward-scattering signature for bacterial colonies grown on solid nutrient surfaces. The aim of this research is to understand the colony growth characteristics and the corresponding evolution of the scattering patterns for a variety of pathogenic bacteria relevant to food safety. In particular, we characterized time-varying macroscopic and microscopic morphological properties of the growing colonies and modeled their optical properties in terms of two-dimensional (2-D) amplitude and phase modulation distributions. These distributions, in turn, serve as input to scalar diffraction theory, which is, in turn, used to predict forward-scattering signatures. For the present work, three different species of Listeria were considered: Listeria innocua, Listeria ivanovii, and Listeria monocytogenes. The baseline experiments involved the growth of cultures on brain heart infusion (BHI) agar and the capture of scatter images every 6 h over a total incubation period of 42 h. The micro- and macroscopic morphologies of the colonies were studied by phase contrast microscopy. Growth curves, represented by colony diameter as a function of time, were compared with the measured time-evolution of the scattering signatures. PMID:18315368
Bae, Euiwon; Banada, Padmapriya P; Huff, Karleigh; Bhunia, Arun K; Robinson, J Paul; Hirleman, E Daniel
303
PubMed
Intraspecific phenotypic diversification in social organisms often leads to formation of physical castes which are morphologically specialized for particular tasks within the colony. The optimal caste allocation theory argues that specialized morphological castes are efficient at specific tasks, and hence different caste ratios should affect the ergonomic efficiency, hence reproductive output of the colony. However, the reproductive output of different caste ratios has been documented in few species of insects with equivocal support for the theory. This study investigated whether the ratios of nonreproductive and reproductive morphs affect the reproductive output of a recently discovered social trematode, Philophthalmus sp., in which the nonreproductive members are hypothesized to be defensive specialists. A census of natural infections and a manipulative in vitro experiment demonstrated a positive association between the reproductive output of trematode colonies and the ratio of nonreproductive to reproductive morphs in the presence of an intra-host trematode competitor, Maritrema novaezealandensis. On the contrary, without the competitor, reproductive output was negatively associated with the proportion of nonreproductive castes in colonies. Our findings demonstrate for the first time a clear fitness benefit associated with the nonreproductive castes in the presence of a competitor while illustrating the cost of maintaining such morphs in noncompetitive situations. Although the proximate mechanisms controlling caste ratio remain unclear in this trematode system, this study supports the prediction that the fitness of colonies is influenced by the composition of specialized functional morphs in social organisms, suggesting a potential for adaptive shifts of caste ratios over evolutionary time. PMID:23252707
Kamiya, T; Poulin, R
2012-12-17
304
SciTech Connect
The Colonie site is a DOE Formerly Utilized Sites Remedial Action Program (FUSRAP) site located in the Town of Colonie, New York, and consisting of an interim storage site and several vicinity properties. The Colonie Interim Storage Site (CISS) is the former National Lead (NL) Industries plant located at 1130 Central Avenue. There are 11 vicinity properties that received remedial action in 1984: 7 located south of the site on Yardboro and Palmer Avenues just across the Colonie-Albany town limits in Albany, and 4 located northwest of the site along Central Avenue in Colonie. Of these properties, nine are residences and two are commercial properties. This document describes the engineering design, construction, and associated plans for remedial action on the vicinity properties and the interim storage site. These plans include both radiological and chemical work. Radiological work includes: excavating the above-guideline radioactive wastes on the vicinity properties; designing required facilities for the interim storage site; preparing the interim storage site to receive these contaminated materials; transporting the contaminated materials to the interim waste storage stockpile; and preparing necessary schedules for accomplishing the remedial actions. Chemical work involves: developing the Resource Conservation and Recovery Act (RCRA) closure plans; neutralizing chemical hazards associated with plating solutions; inventorying on-site chemicals; and disposal of chemicals and/or residues. 17 refs., 5 figs., 1 tab.
Not Available
1985-08-01
305
NSDL National Science Digital Library
This valuable Website offers a wealth of documentary materials from the original Plymouth Colony settlement. The archive presents an extensive collection of searchable, online texts, including "court records, Colony laws, biographical profiles of selected colonists, probate inventories, wills," and analyses of these primary materials. The Website also has photographs and a description of the ongoing archaeological and reconstruction work at the settlement site, historical illustrations from the 1911 text by Albert Christopher Addison, The Romantic Story of the Mayflower Pilgrims, a walking tour of the colony courtesy of a link to ArchNet at the University of Connecticut, and a list of links to a number of related Websites. Researchers will be happy to know the Archive is searchable.
Deetz, Patricia S.; Deetz, James F.
1998-01-01
306
USGS Publications Warehouse
Red foxes (Vulpes fulva) and raccoons (Procyon lotor) released at colonies of herring gulls (Larus argentatus) on islands off the Massachusetts coast effectively eliminated the production of young gulls. Annual predator introductions for 2-4 years caused major reductions in colony size and occasionally total abandonment of the island as a colony site. Observations of the experimental islands for 2 years after cessation of predator introductions showed slow repopulation of the islands and lower breeding success than on control islands. The size of the regional population was reduced largely because of the movements of gulls off the experimental islands. The introduced predators are, in most cases, difficult to maintain on the islands; this restricts their utility in population management.
1971-01-01
307
We study colonies of nonmotile, rod-shaped bacteria growing on solid substrates. In our model, bacteria interact purely mechanically, by pushing each other away as they grow, and consume a diffusing nutrient. We show that mechanical interactions control the velocity and shape of the advancing front, which leads to features that cannot be captured by established Fisher-Kolmogorov models. In particular, we find that the velocity depends on the elastic modulus of bacteria or their stickiness to the surface. Interestingly, we predict that the radius of an incompressible, strictly two-dimensional colony cannot grow linearly in time, unless it develops branches. Importantly, mechanical interactions can also account for the nonequilibrium transition between circular and branching colonies, often observed in the lab.
Farrell, F. D. C.; Hallatschek, O.; Marenduzzo, D.; Waclaw, B.
2013-10-01
308
PubMed Central
The apparent subunit sizes for pili of gonococci (Gc) have been visualized by using either Iodogen 125I-labeled whole Gc or immunoblotting with antipilus antiserum. These methods permitted definition of pilus subunit sizes for Gc of a given strain that had undergone changes either in piliation phenotype or in colonial opacity/protein II phenotype. The results indicate that pilus subunit size does not change coincident with changes in colony opacity/protein II phenotypes; but change in pilus subunit size is seen after a change in piliation phenotype (P+ leads to P++, and vice versa). Marked diversity in pilus subunit sizes is found for Gc of individual strains when P+ derivatives of P- colonies are compared. This diversity extends to pilus subunits of Gc found in single colonies; two distinct pilus forms were demonstrated for Gc residing in several single colonies. These findings show that Gc of a given strain are able to express any of a number of different pilus subunit size forms.
1983-01-01
309
PubMed
Many dynamical networks, such as the ones that produce the collective behavior of social insects, operate without any central control, instead arising from local interactions among individuals. A well-studied example is the formation of recruitment trails in ant colonies, but many ant species do not use pheromone trails. We present a model of the regulation of foraging by harvester ant (Pogonomyrmex barbatus) colonies. This species forages for scattered seeds that one ant can retrieve on its own, so there is no need for spatial information such as pheromone trails that lead ants to specific locations. Previous work shows that colony foraging activity, the rate at which ants go out to search individually for seeds, is regulated in response to current food availability throughout the colony's foraging area. Ants use the rate of brief antennal contacts inside the nest between foragers returning with food and outgoing foragers available to leave the nest on the next foraging trip. Here we present a feedback-based algorithm that captures the main features of data from field experiments in which the rate of returning foragers was manipulated. The algorithm draws on our finding that the distribution of intervals between successive ants returning to the nest is a Poisson process. We fitted the parameter that estimates the effect of each returning forager on the rate at which outgoing foragers leave the nest. We found that correlations between observed rates of returning foragers and simulated rates of outgoing foragers, using our model, were similar to those in the data. Our simple stochastic model shows how the regulation of ant colony foraging can operate without spatial information, describing a process at the level of individual ants that predicts the overall foraging activity of the colony. PMID:22927811
Prabhakar, Balaji; Dektar, Katherine N; Gordon, Deborah M
2012-08-23
310
Science education in Papua New Guinea has been influenced by neo-colonial practices that have significantly contributed to the silencing of the Papua New Guinea voice. This silencing has led to the production of science curriculum documents that are irrelevant to the students for whom they are written. To avoid being caught up in neo-colonial practices, Western science educators ought to consider the notion of cultural mediators. This position, I argue, infers an obligation to take responsibility for their actions and to consider postcolonial discourses as a way of understanding the relationships and dialogue between different ways of knowing.
Ryan, Ann
2008-09-01
311
We study the growth of colonies of the yeast Pichia membranaefaciens on agarose film. The growth conditions are controlled in a setup where nutrients are supplied through an agarose film suspended over a solution of nutrients. As the thickness of the agarose film is varied, the morphology of the front of the colony changes. The growth of the front is modeled by coupling it to a diffusive field of inhibitory metabolites. Qualitative agreement with experiments suggests that such a coupling is responsible for the observed instability of the front.
Sams, Thomas; Sneppen, Kim; Jensen, Mogens H.; Ellegaard, Clive; Christensen, Bjrn Eggert; Thrane, Ulf
1997-07-01
312
PubMed
Fungal colonies are able to exhibit different morphologies depending on the environmental conditions. This allows them to cope with and adapt to external changes. When grown in solid or semisolid media the bulk of the colony is compact and several morphological transitions have been reported to occur as the external conditions are varied. Here we show how a unified simple mathematical model, which includes the effect of the accumulation of toxic metabolites, can account for the morphological changes observed. Our numerical results are in excellent agreement with experiments carried out with the fungus Aspergillus oryzae on solid agar. PMID:11863559
Lpez, Juan M; Jensen, Henrik J
2002-01-14
313
Statistical properties and patterns of bacterial colony formed by the twitching motility are studied from the viewpoint of both computer simulations and experimental examinations. Models of four kinds of bacterial motion are proposed and the growing bacterial colonies due to the models are simulated by means of Monte Carlo method. Macroscopic patterns of the bacterial colonies and orientational order parameters of the bacteria are analyzed. By comparing the simulation results with the colony pattern formed by Thermus thermophilus, we suggest that wriggling edge of the colony is caused by slingshot-like motions of bacteria.
Morikawa, Ryota; Miyakawa, Takeshi; Tamakoshi, Masatada; Takasu, Masako
2013-02-01
314
PubMed
In this study I examined how the paper wasp, Polistes fuscatus, defends a colony when faced with a vertebrate attack. I looked for a division of labour in defensive behaviour within a colony and examined whether this behaviour changes over the colony cycle. The colonies were presented with a model of an adult red-winged blackbird, Agelaius phoeniceus, and a speaker that vibrated the comb. There was a pronounced division of labour in the defence against vertebrate predators within a colony. The queen was consistently the most aggressive individual in the colony. The subordinate foundresses and workers both became more aggressive towards a vertebrate predator as they aged. Gynes and males did not participate in colony defence. The level of aggression in colony members of P. fuscatus appears to be related to the reproductive investment of the colony. Copyright 2000 The Association for the Study of Animal Behaviour. PMID:10924203
Judd
2000-07-01
315
ERIC Educational Resources Information Center
|In constructing a framework for the participation and inclusion in political life of subjects, the Enlightenment also produced a series of systematic exclusions for those who did not qualify: including "idiots" and "primitive races". "Idiocy" emerged as part of wider strategies of governance in Europe and its colonies. This opened up the
Simpson, Murray K.
2007-01-01
316
ERIC Educational Resources Information Center
|A history of primary school curriculum in Guyana, a former British colony, points out social determinates of curriculum. Ruling groups emphasized agriculture and manual arts in public education to maintain class distinctions while the masses fought for academic education as a key to financial and social success. (JH)|
Bacus, M. Kazim
1974-01-01
317
Using cross-country data for about 70 countries and regional data for about 180 African provinces, we show that competition between Protestant and Catholic missionaries increased schooling in former colonies. Our evidence implies that Protestant missionaries increased schooling in Catholic countries by more than Catholic missionaries, but we cannot reject the hypothesis that the e ect of Protestant and Catholic missionaries
Francisco Gallego; Robert Woodberry
2008-01-01
318
Artificial Bee Colony (ABC) algorithm is one of the most recently introduced swarm-based algorithms. ABC simulates the intelligent foraging behaviour of a honeybee swarm. In this work, ABC is used for optimizing a large set of numerical test functions and the results produced by ABC algorithm are compared with the results obtained by genetic algorithm, particle swarm optimization algorithm, differential
Dervis Karaboga; Bahriye Akay
2009-01-01
319
Ant Colony Optimization (ACO) is a meta- heuristic introduced by Dorigo et al. (9) which uses ideas from nature to find solutions to instances of the Travelling Salesman Problem (TSP) and other combinatorial optimisation problems. In this paper we analyse the parameter settings of the ACO algo- rithm. These determine the behaviour of each ant and are critical for fast
Dorian Gaertner; Keith L. Clark
2005-01-01
320
Within the Linguistic Modeling eld, one of the most important applications of Fuzzy Rule-Based Systems, the automatic learning from numerical data of the fuzzy linguistic rules composing these systems is an important task. In this paper we introduce a novel way of addressing the problem making use of Ant Colony Optimization (ACO) algorithms. To do so, the learning task will
Jorge Casillas; Oscar Cordon; Francisco Herrera
2000-01-01
321
In this paper, we investigate the performance of the fuzzy entropy approach when it is applied to the segmentation of infrared objects. Through a number of examples, the performance is compared with those using existing entropy-based object segmentation approaches and the superiority of the fuzzy entropy method is demonstrated. In addition, the ant colony optimization (ACO) is used to obtain
Wenbing Tao; Hai Jin; Liman Liu
2007-01-01
322
The Vehicle Routing Problem (VRP) requires the determination of an optimal set of routes for a set of vehicles to serve a set of customers. We deal here with the Capacitated Vehicle Routing Problem (CVRP) where there is a maximum weight or volume that each vehicle can load. We developed an Ant Colony algorithm (ACO) for the CVRP based on
Silvia Mazzeo; Irene Loiseau
2004-01-01
323
Artificial bee colony (ABC) algorithm is an optimization algorithm based on a particular intelligent behaviour of honeybee swarms. This work compares the performance of ABC algorithm with that of differential evolution (DE), particle swarm optimization (PSO) and evolutionary algorithm (EA) for multi-dimensional numeric problems. The simulation results show that the performance of ABC algorithm is comparable to those of the
Dervis Karaboga; Bahriye Basturk
2008-01-01
324
The field of ACO algorithms is very lively, as testified, for example, by the successful biannual workshop (ANTSFrom Ant Colonies to Artificial Ants: A Series of International Workshops on Ant Algorithms; http:\\/\\/iridia.ulb.ac.be\\/~ants\\/) where researchers meet to discuss the properties of ACO and other ant algorithms, both theoretically and experimentally.
Marco Dorigo; Thomas Sttzle
325
An ant colony algorithm-based approach to assembly sequence generation and optimization of mechanical products is presented in this article. For diverse assemblies, the approach generates different amount of ants cooperating to find optimal solutions with the least reorientations during assembly processes. Based on assembly by disassembly philosophy, a candidate list composed by feasible and reasonable disassembly operations that are derived
J. F. Wang; J. H. Liu; Y. F. Zhong
2005-01-01
326
Artificial Bee Colony (ABC) algorithm which is one of the most recently introduced optimization algorithms, simulates the intelligent foraging behavior of a honey bee swarm. Clustering analysis, used in many disciplines and applications, is an important tool and a descriptive task seeking to identify homogeneous groups of objects based on the values of their attributes. In this work, ABC is
Dervis Karaboga; Celal Ozturk
2011-01-01
327
Ant Colony Optimization (ACO) has become quite popular in recent years. In contrast to many successful applications, the theoretical founda- tion of this randomized search heuristic is rather weak. Building up such a theory is demanded to understand how these heuristics work as well as to come up with better algorithms for certain problems. Up to now, only convergence results
Frank Neumann; Carsten Witt
2006-01-01
328
We deal with the application of ant colony optimization to group shop scheduling, which is a general shop scheduling problem that includes, among others, the open shop scheduling problem and the job shop scheduling problem as special cases. The contributions of this paper are twofold. First, we propose a neighborhood structure for this problem by extending the well-known neighborhood structure
Christian Blum; Michael Sampels
2004-01-01
329
Ant Colony Optimisation (ACO) is a constructive metaheuristic that uses an analogue of ant trail pheromones to learn about good features of solutions. Critically, the phero- mone representation for a particular problem is usually chosen intuitively rather than by following any systematic process. In some representations, distinct solutions appear mul- tiple times, increasing the eective size of the search space
James Montgomery; Marcus Randall; Tim Hendtlass
2005-01-01
330
The conventional approaches to routing and bandwidth allocation, the two major components of traffic engineering, have proved insufficient to address QoS requirements of flows while optimizing utilization for complex communication networks. In this paper we consider ant colony algorithms to address this problem. Our studies show that the ant-based routing models are sensitive to initial parameters settings. Only careful adjustments
Ali Tizghadam; Massoud Hashemi; Alberto Leon-Garcia
2009-01-01
331
A new UAV path planning method based on ant colony optimization (ACO) is presented. The target position is considered as the food source which the ants are going to find. The enemy defense region is considered as the searching area of the ants and is divided into equally spaced grids. The ants move to the destination node through several nodes
Chao Zhang; Ziyang Zhen; Daobo Wang; Meng Li
2010-01-01
332
Information is presented which updates current seabird breeding colony locations in the Lesser An- tilles. No evidence of breeding was found for Black-capped Petrels (Pterodroma hasitata) in Dominica. Audu- bon's Shearwater (Puffinus lherminieri) was found nesting on the St. Martin islet of Tintamarre. Incubating Red- billed Tropicbirds (Phaethon aethereus) were recorded in Anguilla and St. Martin. White-tailed Tropicbird (Phaethon lepturus)
NATALIA COLLIER; ADAM C. BROWN; MICHELLE HESTER
333
PubMed Central
The combination of coloniality and symbiosis in Scleractinia is thought to confer competitive advantage over other benthic invertebrates, and it is likely the key factor for the dominance of corals in tropical reefs. However, the extant Scleractinia are evenly split between zooxanthellate and azooxanthellate species. Most azooxanthellate species are solitary and nearly absent from reefs, but have much wider geographic and bathymetric distributions than reef corals. Molecular phylogenetic analyses have repeatedly recovered clades formed by colonial/zooxanthellate and solitary/azooxanthellate taxa, suggesting that coloniality and symbiosis were repeatedly acquired and/or lost throughout the history of the Scleractinia. Using Bayesian ancestral state reconstruction, we found that symbiosis was lost at least three times and coloniality lost at least six times, and at least two instances in which both characters were lost. All of the azooxanthellate lineages originated from ancestors that were reconstructed as symbiotic, corroborating the onshoreoffshore diversification trend recorded in marine taxa. Symbiotic sister taxa of two of these descendant lineages are extant in Caribbean reefs but disappeared from the Mediterranean before the end of the Miocene, whereas extant azooxanthellate lineages have trans-Atlantic distributions. Thus, the phyletic link between reef and nonreef communities may have played an important role in the dynamics of extinction and recovery that marks the evolutionary history of scleractinians, and some reef lineages may have escaped local extinction by diversifying into offshore environments. However, this macroevolutionary mechanism offers no hope of mitigating the effects of climate change on coral reefs in the next century.
Barbeitos, Marcos S.; Romano, Sandra L.; Lasker, Howard R.
2010-01-01
334
ERIC Educational Resources Information Center
Provides a review of literature published on slavery in colonial North America, focusing on how this literature has changed over the years. Includes literature in topical areas, such as the Atlantic slave trade, African American culture, and race. Includes a bibliography. (CMK)
Wright, Donald R.
2003-01-01
335
ERIC Educational Resources Information Center
|The social, economic, and political regulation of Canada's First Nations was codified in the Indian Act. Rooted in colonialism and paternalism, the Indian Act was created by the government of Canada to fulfill three functions: (1) to define who was and was not an Indian; (2) to civilize the Indian; and (3) to manage the Indian people and their
Voyageur, Cora J.
2011-01-01
336
White stork,Ciconia ciconia, chicks were observed to abandon their natal nests prior to independence and to be adopted by neighbouring foster parents in approximately 40% of broods at three breeding colonies. Nest switching coincided with a decrease in feeding rates by parents and an increase in aggression by siblings triggered by the flight exercises of nestmates, and mainly affected the
TOMAS REDONDO; FRANCISCO S. TORTOSA; LUIS ARIAS deREYNA
1995-01-01
337
A study of Canadian Indigenous fathers' involvement conceptualized a temporal horizon within which to situate challenges and opportunities for caring for children following decades of colonial interventions that have diminished men's roles. Through five community-university partnerships, conversational interviews were held with eighty First Nations and Mtis fathers in British Columbia, Canada. Using a grounded theory approach, a conceptual model was
Jessica Ball
2009-01-01
338
From the first English settlement in colonial America to the beginning of the Revolution, the legal status of account books evolved. During this period, there was a scarcity of hard currency which made commercial transactions largely dependent upon a credit based, barter based economic system. Business transactions often were represented by book debt. As merchants brought legal actions over book
Charles W. Wootton; Mary Virginia Moore
2000-01-01
339
Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey
6. AERIAL OBLIQUE FROM EAST, SHOWING QUONSET POINT SUMMER COLONY IN FOREGROUND, NEUTRALITY PATROL HANGAR (BLDG. 2) ON LEFT, RHODE ISLAND NATIONAL GUARD FACILITIES IN CENTER. NATIONAL GUARD DISPENSARY SURVIVES AS BLDG. 435. USN PHOTO, C. MARCH, 1940. - Quonset Point Naval Air Station, Roger Williams Way, North Kingstown, Washington County, RI
340
Contextualization In the nineteenth century Mori masculine physicality was, like the untamed countryside, something to be conquered and civilized; in the twentieth century it was something to be harnessed to provide manual labor for New Zealands developing colonial nation; in the twenty-first century it has become a spectacle played out by the overachievement of tne (Mori men) on the sports
Brendan Hokowhitu
2004-01-01
341
PubMed
In the present study, yeast colony development serves as a model system to study growth of fungal populations with negligible nutrient and signal transport within the mycelium. Mathematical simulations address the question whether colony development is governed by diffusional limitation of nutrients. A hybrid one-dimensional cellular automaton model was developed that describes growth of discrete cells based upon microscopic interaction rules in a continuous field of nutrient and messenger. The model is scaled for the geometry of the experimental setup, cell size, growth- and substrate uptake rates. Therefore, calculated cell density profiles and nutrient distributions can be compared to experimental results and the model assumptions can be verified. In the physiologically relevant parameter range, simulations show an exponentially declining cell density along the median axis of the colonies in case of a diffusion limited growth scenario. These results are in good agreement with cell density profiles obtained in cultivations of the yeast Candida boidinii with glucose as the limiting carbon source but stand in contrast to the constant cell density profile estimated for Yarrowia lipolytica grown under the same conditions. While from the comparison of experimental results and simulations a diffusion limited growth mechanism is proposed for glucose limited C. boidinii colonies, this hypothesis is rejected for the growth of Y. lipolytica. As an alternative, a quorum sensing model was developed that can explain the evolution of constant cell density profiles based on the effect of a not further characterized unstable or volatile messenger. PMID:15234200
Walther, Th; Reinsch, H; Grosse, A; Ostermann, K; Deutsch, A; Bley, Th
2004-08-01
342
With the emergence of many environmentalisms, the terms of discourse in the green public sphere are changing, particularly now to take account of international, transnational and global contexts. As it expands in scope, the green public sphere encounters a planet divided not only in regard to rich and poor countries, but also in relation to the legacy of colonialism. Examining
Douglas Torgerson
2006-01-01
343
Astronomy played a unique role in Australia in the movement from a non- scientific society (Phase 1 of Basalla's model) through colonial science (Phase 2) to independent science (Phase 3) and was thus an important element, arguably the most important, in the country's liberation from the scientific imperialism of Britain. In parallel with their attempts to colonise and reconstruct the
R. F. Haynes; R. D. Haynes
1995-01-01
344
The distribution of Calyptogena phaseoliformis colonies in right-stepping en echelon patterns was observed by the Japanese submersible Shinkai 6500 at the foot of the landward escarpment of the northern Japan Trench at around 6437 6274 m depth. The north-south trending Sanriku Escarpment has a thrust origin and is subparallel to the trench axis along which the Pacific plate is being subducted beneath the North America or Okhotsk plate at about 300 at a rate of about 7.8 to 8.3 cm/yr. The trends of colonies are concentrated at 250, 300, and 330: each trend matches either an antithetic riedel shear, extension fracture, or synthetic riedel shear, respectively, within a left-lateral shear regime caused by the oblique subduction. Methane- and hydrogen sulfide bearing fluid advection from depth occurs essentially along the thrust fault, but finally seeps along the fractures at the sea floor. This supplies energy to the food chain through bacteria utilizing hydrogen sulfide, then eventually sustains the Calyptogena colonies. Because the clams select the best places to survive, the geometric arrangement of the clam colonies provides a kinematic indicator of relative plate motions.
Ogawa, Yujiro; Fujioka, Kantaro; Fujikura, Katsunori; Iwabuchi, Yo
1996-09-01
345
Summary The genetic profile of the Varroa destructor mite infesting Apis mellifera iberiensis colonies located in the Iberian Peninsula and also on Canarian and Balearic islands was determined through standard molecular assays (RFLP of the mitochondrial cox1 fragment). The V. destructor Korea haplotype was found in all of the 575 samples analyzed except in one, confirming the worldwide expansion of
Irene Muoz; Encarna Garrido-Bailn; Raquel Martn-Hernndez; Aranzazu Meana; Mariano Higes; Pilar De la Ra
2008-01-01
346
Summary In recent years, honeybees (Apis mellifera) have been strangely disappearing from their hives, and strong colonies have suddenly become weak and died. The precise aetiology underlying the disappearance of the bees remains a mystery. However, during the same period, Nosema ceranae, a microsporidium of the Asian bee Apis cerana, seems to have colonized A. mellifera, and it's now frequently
Mariano Higes; Raquel Martn-Hernndez; Cristina Botas; Encarna Garrido Bailn; Amelia V. Gonzlez-Porto; Laura Barrios; M. Jess del Nozal; Jos L. Bernal; Juan J. Jimnez; Pilar Garca Palencia; Arnzazu Meana
2008-01-01
347
PubMed
Hematopoietic stem cells (HSCs) present in small numbers in adult bone marrow (BM), peripheral blood (PB) and umbilical cord blood (CB) produce a heterogeneous pool of progenitors that can be detected in vitro using colony forming cell (CFC) assays. Hematopoietic progenitor cells proliferate and differentiate to produce colonies of maturing cells when cultured in a semisolid methylcellulose-based medium that is supplemented with suitable growth factors and other supplements. The colonies are then classified and enumerated in situ by light microscopy or an automated imaging instrument. CFC assays are important tools in basic hematology research but are also used by clinical cell processing laboratories to measure the progenitor cell content of BM, CB and mobilized PB (MPB) preparations used for cell transplantation. Standard CFC assays for human progenitor cells require a culture period of at least 14 days to enable optimal outgrowth and differentiation of the maximum number of CFCs in a cell preparation. In this chapter protocols are described for the detection and enumeration of myeloid multipotential progenitors and committed progenitors of the erythroid, monocyte, and granulocyte lineages in samples from human PB, MPB, BM, and CB. In addition protocols are described for a modified version of the CFC-assay that allows accurate enumeration of total CFC numbers in CB or MPB after a culture period of only 7 days, but without distinction of colony types. PMID:23179838
Wognum, Bert; Yuan, Ning; Lai, Becky; Miller, Cindy L
2013-01-01
348
In this article, I attempt to articulate a new understanding of the colonial encounter between the Sikhs and the British by arguing that the modern political sovereignty of the West is founded not only on the control and disciplining of bodies, but also on a theft of bodies. I read the extraordinary agonies and torments suffered by Maharani Jindan and
Prabhsharanbir Singh
2009-01-01
349
ERIC Educational Resources Information Center
|The author fantasizes that at some point in the distant past England was a Spanish colony. He supports his thesis by revealing fantastic etymologies of some English place names showing the influence of Spanish on English, for example "Surrey" comes from "su rey." (Text is in Spanish.) (TL)|
Til, Brianes
1975-01-01
350
The paper reflects on the tension that the process of sensing a nation brings to the formation of a post-colony in Southeast Asia. The aesthetic in this context creates forms of sensibility of the national, rendering it present in the world and endowing it with certain identity-effects. On the other hand, it also posits an exceptional singularity, at once discriminating
Patrick D. Flores
2011-01-01
351
Ant colony framework is illustrated by considering dynamic optimization of six important bench marking examples. This new computational tool is simple to implement and can tackle problems with state as well as terminal constraints in a straightforward fashion. It requires fewer grid points to reach the global optimum at relatively very low computational effort. The examples with varying degree of
J. Rajesh; Kapil Gupta; Hari Shankar Kusumakar; Vaidyanathan K. Jayaraman; Bhaskar D. Kulkarni
2001-01-01
352
EPA Science Inventory
Cordylophora caspia, a colonial hydrozoan native to the Ponto-Caspian region, has become a common invader of both fresh and brackish water ecosystems of North America and Europe. Here we describe 11 polymorphic microsatellite loci for this species. Preliminary analyses indicate ...
353
Newly mated queens of the fire ant, Solenopsis invicta, found colonies either alone (haplometrosis) or by joining with other newly mated queens (pleometrosis). Surveys after mating flights showed that nests and queens were usually aggregated in space, that queens were aggregated among occupied nest chambers, and that the occurrence and degree of pleometrosis was related to the mean queen density.
Walter R. Tschinkel; Dennis F. Howard
1983-01-01
354
ERIC Educational Resources Information Center
Introduces this volume of the journal, which focuses on language in education in post-colonial Hong Kong. Before Hong Kong was returned to China, Cantonese and English were the predominate languages; since the change of sovereignty, the status of Mandarin has increased tremendously. (Author/VWL)
Lai, Mee-Ling
1999-01-01
355
This paper draws on the work of Homi Bhabha to mount an explanation for a facet of (post)colonial racism, the 'paradox of otherness' as exemplified in the racial stereotype. The paradox in question operates at the levels of discourse and identification alike. As a mode of discourse the stereotype functions to exaggerate difference of the other, whilst nevertheless attempting to
Derek Hook
2005-01-01
356
PubMed
Low thermotolerance in entomopathogenic fungi is the main impediment to their industrialization. This research, for the first time, describes the generation of a thermotolerant colony by pairing and subculturing (cycling) two Beauveria bassiana isolates without sexual reproduction. A mixture of B.bassiana ERL1578 and ERL1576 was inoculated on quarter-strength Sabouraud dextrose agar with yeast extract (SDAY). The paired culture (ERL1578+1576) was cycled three times to increase the frequency of possible hyphal fusion at the first cycle (c.5/5נ10(5) conidia), followed by a heat treatment as a selection pressure. Two non-paired isolates served as controls. Two morphologically different colonies (BbHet1 and BbHet2) were isolated from the pairing. BbHet1 colony had the highest conidial yield. BbHet2 had the most rapid mycelial growth and produced sponge-like mycelial masses (the others were flat), and its conidia were darker than the non-paired colonies under a microscope (400). BbHet2 conidia had 60.7% germination after exposure to 45C for 60min (the others had <15%) without significant loss of virulence against Western flower thrips, Frankliniella occidentalis; however, there was a slight decrease in conidial yield. The new phenotypes formed suggested that a genetic variation happened as a result of heterokaryosis and/or recombination, more than environmental adaptation, when mixing different conidia. This methodology seems to be very useful for enhancing thermotolerance in fungi. PMID:22092818
Kim, Jae Su; Skinner, Margaret; Gouli, Svetlana; Parker, Bruce L
2011-09-26
357
An Ants System is an artificial system based on the behavior of real ant colonies, which is used to solve combinatorial problems. This is a distributed algorithm composed by a set of cooperating agents called ants which cooperate among them to find good solutions to combinatorial optimization problems. The cooperation follows the behavior of real ants using an indirect form
Jose Aguilar
2001-01-01
358
Ant Colony Optimization (ACO) is a metaheuristic that is inspired by the shortest path searching behavior of various ant species [1,2]. The initial work of Dorigo, Maniezzo and Colorni [3,4] who proposed the first ACO algorithm called Ant System, has stimulated a still strongly increasing number of researchers to develop more sophisticated and better performing ACO algorithms that are used
Oscar Cordn Garca; Francisco Herrera Triguero; Thomas Sttzle
1970-01-01
359
This article examines how a gendered discourse of taste was formulated in colonial Bengal by the Bengali Hindu middle classes, which in its turn facilitated the self-fashioning of Bengali bhadralok. This discourse of taste was articulated specifically through the culture of food. The middle-class Bengali Hindus constituted a new rhetoric of cuisine that enabled them to distance themselves from their
Utsa Ray
2009-01-01
360
Data mining is a process that uses technology to bridge the gap between data and logical decision-making. The jargon itself offers a promising view of organized data manipulation for extracting valuable information and knowledge from high volume of data. Copious techniques are developed to fulfill this aspiration. This paper outlines an ant colony optimization algorithm which is used newly in
R. Tiwari; M. Husain; S. Gupta; A. Srivastava
2010-01-01
361
ERIC Educational Resources Information Center
|This article explores two attempts to envisage a new global world, one created by the West, and to create new colonial subjects. One of these attempts was in Sierra Leone in the 1790s, the other in India in the 1830s. The two case studies are seen through the lens of a father and son, Zachary and Thomas Babington Macaulay, each a representative
Hall, Catherine
2008-01-01
362
Discriminating nestmates from alien conspecifics via chemical cues is recognized as a critical element in maintaining the integrity of insect societies. We determined, in laboratory experiments, that nestmate recognition in an introduced population of the Argentine ant, Linepithema humile, is modified by hydrocarbons acquired from insect prey, and that workers from spatially isolated colony fragments, each provided with prey that
J. Silverman; D. Liang
2001-01-01
363
The use of science to validate biblical accounts or prove the existence of God began in the United States with the publication of Cotton Mather's The Christian Philosopher. Cotton Mather is generally remembered for his role in the Salem Witch Trials but his contribution in bringing science to Colonial America is not well known. Mather had an extensive library, was
Bruce Kirk Oldfield
364
This article examines settler attitudes toward the law and the legal system in early colonial Kenya. Settlers believed that English law was the culmination of centuries of evolution and was unsurpassed for its justice and logic. Nonetheless, they insisted English law and legal procedure were supremely ill-suited for the African context. When courts released Africans on technicalities it only encouraged
2010-01-01
365
ERIC Educational Resources Information Center
|Transcribing and footnoting some 186 family letters and documents which revolve around social life at Antioch College (Ohio) in the 1870s and everyday life during the same period allowed a professor to examine a metaphor for personal relationships used at the time: colonialism. His great grandmother, a young widow with three minor children, moved
Chamberlain, William
366
ERIC Educational Resources Information Center
This paper narrates the life of Ezekiel Cheever, the most famous colonial New England Latin grammar teacher of his time. Cheever came from middle class Puritan roots in England, receiving a classical education before emigrating to Boston (Massachusetts). His remarkably long teaching career of 70 years in four New England towns and the esteem shown
Parker, Franklin; Parker, Betty J.
367
SciTech Connect
Integrating the governing chemistry with the genomics and phenotypes of microbial colonies has been a "holy grail" in microbiology. This work describes a highly sensitive, broadly applicable, and costeffective approach that allows metabolic profiling of live microbial colonies directly from a Petri dish without any sample preparation. Nanospray desorption electrospray ionization mass spectrometry (MS), combined with alignment of MS data and molecular networking, enabled monitoring of metabolite production from live microbial colonies from diverse bacterial genera, including Bacillus subtilis, Streptomyces coelicolor, Mycobacterium smegmatis, and Pseudomonas aeruginosa. This work demonstrates that, by using these tools to visualize small molecular changes within bacterial interactions, insights can be gained into bacterial developmental processes as a result of the improved organization of MS/MS data. To validate this experimental platform, metabolic profiling was performed on Pseudomonas sp. SH-C52, which protects sugar beet plants from infections by specific soil-borne fungi [R. Mendes et al. (2011) Science 332:10971100]. The antifungal effect of strain SHC52 was attributed to thanamycin, a predicted lipopeptide encoded by a nonribosomal peptide synthetase gene cluster. Our technology, in combination with our recently developed peptidogenomics strategy, enabled the detection and partial characterization of thanamycin and showed that it is amonochlorinated lipopeptide that belongs to the syringomycin family of antifungal agents. In conclusion, the platform presented here provides a significant advancement in our ability to understand the spatiotemporal dynamics of metabolite production in live microbial colonies and communities.
Watrous, Jeramie D.; Roach, Patrick J.; Alexandrov, Theodore; Heath, Brandi S.; Yang, Jane Y.; Kersten, Roland; vander Voort, Menno; Pogliano, Kit; Gross, Harald; Raaijmakers, Jos M.; Moore, Bradley S.; Laskin, Julia; Bandeira, Nuno; Dorrestein, Pieter C.
2012-06-26
368
In 11 Apis mellifera colonies with laying queens, about 0.12% of the males produced derived from eggs laid by workers. This result requires explanation both of why workers produce any males, and, since they do, why they produce so few. Workers may maximize their inclusive fitness by forgoing reproduction, or their sterility may be due to to enforcement of the
P. Kirk Visscher
1989-01-01
369
ERIC Educational Resources Information Center
The article presents hands-on classroom projects to teach elementary students about colonial American history. Students make their own natural dyes, cook blueberry slump, and play cup-and-ball the way the colonists did. The activities integrate science, math, history, art, and language arts. (SM)
Hennessey, Gail Skroback
1994-01-01
370
ERIC Educational Resources Information Center
Considerable amounts of money already come into the cities and the black communities, but go right out as payments to absentee landlords, exploitative merchants, credit gougers, and loan sharks, as well as in support of the colonial management system. (Author/JM)
Hamilton, Charles V.
1972-01-01
371
The 'benefits of philopatry' hypothesis states that helpers in cooperatively breeding species derive higher benefits from remaining home, instead of dispersing and attempting to breed independently. We tested experimentally whether dispersal options influence dispersal propensity in the cooperatively breeding Lake Tanganyika cichlids Neolamprologus pulcher and N. savoryi. Cooperative groups of these fishes breed in densely packed colonies, surrounded by unoccupied,
D. Heg; Z. Heg-Bachar; L. Brouwer; M. Taborsky
2007-01-01
372
National Technical Information Service (NTIS)
Mandated by the 2008 Farm Bill (Section 7204 (h) (4)), this second annual report on Honey Bee Colony Collapse Disorder (CCD) research progress represents the work of a large number of scientists from 8 Federal agencies, 2 state departments of agriculture,...
2010-01-01
373
Many cultural and ethnic minorities have extensive experiences of being oppressed, which they may eventually internalize. However, psychology has yet to actively incorporate various forms of internalized oppression (e.g., colonial mentality [CM]) into the etiological conceptualizations of psychopathology. Using a sample of 248 Filipino Americans, the author tested a more complete and sociopolitically informed cultural model of depression symptoms. Results
E. J. R. David
2008-01-01
374
In the 1930s, as literature and films representing the British empire were disseminated in Britain, the United States and colonial India, the narratives were transformed through reception and adaptation. The genre of pro-imperial or empire films produced by British studios celebrated the continued international relevance of the British empire at a time of contestation by nationalist movements. American film adaptations
Babli Sinha
2011-01-01
375
Users can have access to resources and obtain services at anytime and anywhere in ubiquitous computing environment. By virtue of behavior experience in human society, according to dynamic evolution discipline of the contradiction between the lag of trust and the anteriority of service, and the self-organization, distributed computing and regenerative feedback characteristics of ant colony algorithm, cascade service selection model
F. U. ZhengFang
2010-01-01
376
Based on Markowitz' theory of asset portfolio, a multiple-goal optimization model of portfolio investment was set up considering both risk and return. Then applying ant colony optimization algorithm to solve the model, we got a better result than that of using Lingo.
Zhou Jianguo; Zhang Hui; Tian Jiming
2007-01-01
377
3-D object segmentation is an important and challenging topic in computer vision that could be tackled with artificial life models. A Channeler Ant Model (CAM), based on the natural ant capabilities of dealing with 3-D environments through self-organization and emergent behaviours, is proposed. Ant colonies, defined in terms of moving, pheromone laying, reproduction, death and deviating behaviours rules, is able
Piergiorgio Cerello; Sorin Christian Cheran; Francesco Bagagli; Stefano Bagnasco; Roberto Bellotti; Lourdes Bolanos; Ezio Catanzariti; Giorgio De Nunzio; Elisa Fiorina; Gianfranco Gargano; Gianluca Gemme; Ernesto Lopez Torres; Gian Luca Masala; Cristiana Peroni; Matteo Santoro
2008-01-01
378
PubMed Central
During their development and aging on solid substrates, yeast giant colonies produce ammonia, which acts as a quorum sensing molecule. Ammonia production is connected with alkalization of the surrounding medium and with extensive reprogramming of cell metabolism. In addition, ammonia signaling is important for both horizontal (colony centre versus colony margin) and vertical (upper versus lower cell layers) colony differentiations. The centre of an aging differentiated giant colony is thus composed of two major cell subpopulations, the subpopulation of long-living, metabolically active and stress-resistant cells that form the upper layers of the colony and the subpopulation of stress-sensitive starving cells in the colony interior. Here, we show that microcolonies originating from one cell pass through similar developmental phases as giant colonies. Microcolony differentiation is linked to ammonia signaling, and cells similar to the upper and lower cells of aged giant colonies are formed even in relatively young microcolonies. A comparison of the properties of these cells revealed a number of features that are similar in microcolonies and giant colonies as well as a few that are only typical of chronologically aged giant colonies. These findings show that colony age per se is not crucial for colony differentiation.
Vachova, Libuse; Hatakova, Ladislava; Cap, Michal; Pokorna, Michaela; Palkova, Zdena
2013-01-01
379
PubMed
A microfabricated platform was developed for highly parallel and efficient colony picking, splitting, and clone identification. A pallet array provided patterned cell colonies which mated to a second printing array composed of bridging microstructures formed by a supporting base and attached post. The posts enabled mammalian cells from colonies initially cultured on the pallet array to migrate to corresponding sites on the printing array. Separation of the arrays simultaneously split the colonies, creating a patterned replica. Optimization of array elements provided transfer efficiencies greater than 90% using bridging posts of 30 ?m diameter and 100 ?m length and total colony numbers of 3000. Studies using five mammalian cell lines demonstrated that a variety of adherent cell types could be cultured and effectively split with printing efficiencies of 78-92%. To demonstrate the technique's utility, clonal cell lines with siRNA knockdown of Coronin 1B were generated using the arrays and compared to a traditional FACS/Western Blotting-based approach. Identification of target clones required a destructive assay to identify cells with an absence of Coronin 1B brought about by the successful infection of interfering shRNA construct. By virtue of miniaturization and its parallel format, the platform enabled the identification and generation of 12 target clones from a starting sample of only 3900 cells and required only 5 man hours over 11 days. In contrast, the traditional method required 500,000 cells and generated only 5 target clones with 34 man hours expended over 47 days. These data support the considerable reduction in time, manpower, and reagents using the miniaturized platform for clonal selection by destructive assay versus conventional approaches. PMID:23153031
Gach, Philip C; Xu, Wei; King, Samantha J; Sims, Christopher E; Bear, James; Allbritton, Nancy L
2012-11-29
380
SciTech Connect
Not Available
1992-09-01
381
PubMed
During June and July of 2009, sudden deaths, tremulous movements and population declines of adult honey bees were reported by the beekeepers in the region of Peloponnesus (Mt. Mainalo), Greece. A preliminary study was carried out to investigate these unexplained phenomena in this region. In total, 37 bee samples, two brood frames containing honey bee brood of various ages, eight sugar samples and four sugar patties were collected from the affected colonies. The samples were tested for a range of pests, pathogens and pesticides. Symptomatic adult honey bees tested positive for Varroa destructor, Nosema ceranae, Chronic bee paralysis virus (CBPV), Acute paralysis virus (ABPV), Deformed wing virus (DWV), Sacbrood virus (SBV) and Black queen cell virus (BQCV), but negative for Acarapis woodi. American Foulbrood was absent from the brood samples. Chemical analysis revealed that amitraz, thiametoxan, clothianidin and acetamiprid were all absent from symptomatic adult bees, sugar and sugar patty samples. However, some bee samples, were contaminated with imidacloprid in concentrations between 14 ng/g and 39 ng/g tissue. We present: the infection of Greek honey bees by multiple viruses; the presence of N. ceranae in Greek honey bees and the first record of imidacloprid (neonicotonoid) residues in Greek honey bee tissues. The presence of multiple pathogens and pesticides made it difficult to associate a single specific cause to the depopulation phenomena observed in Greece, although we believe that viruses and N. ceranae synergistically played the most important role. A follow-up in-depth survey across all Greek regions is required to provide context to these preliminary findings. PMID:20804765
Bacandritsos, N; Granato, A; Budge, G; Papanastasiou, I; Roinioti, E; Caldon, M; Falcaro, C; Gallina, A; Mutinelli, F
2010-09-24
382
National Technical Information Service (NTIS)
Bird use of dredged material islands in five areas of Florida was studied. The use of these islands by birds, particularly by colonial nesting sea and wading birds, was documented with two visits to each of 40 selected islands in five study areas in 1977....
R. W. Schreiber E. A. Schreiber
1978-01-01
383
To compare the social structure of primitively social wasps with that of communal breeding vertebrates, we used a new technique based on micro videocameras applied to the nest envelope to study the organization of behavior in Malaysian colonies of the stenogastrine wasp Eustenogaster fraterna. The reproductive division of labor in this species appears to be different from that reported so
Elisabetta Francescato; Alessandro Massolo; Monica Landi; Letizia Gerace; Rosli Hashim; Stefano Turillazzi
2002-01-01
384
Temporal and spatial analyses are seldom utilized in the study of colony genetic structure, but they are potentially powerful methods which can yield novel insights into the mechan- isms underlying variation in breeding systems. Here we present the results of a study which incorporated both of these dimensions in an examination of genetic structure of sub- terranean termites in the
CHRISTOPHER J. D EHEER; EDWARD L. V ARGO
385
SciTech Connect
Residual radioactive material guidelines for uranium in soil were derived for the Colonie site located in Colonie, New York. This site has been designated for remedial action under the Formerly Utilized Sites Remedial Action Program (FUSRAP) of the U.S. Department of Energy (DOE). The site became contaminated with radioactive material as a result of operations conducted by National Lead (NL) Industries from 1958 to 1984; these activities included brass foundry operations, electroplating of metal products, machining of various components using depleted uranium, and limited work with small amounts of enriched uranium and thorium. The Colonie site comprises the former NL Industries property, now designated the Colonie Interim Storage Site (CISS), and 56 vicinity properties contaminated by fallout from airborne emissions; 53 of the vicinity properties were previously remediated between 1984 and 1988. In 1984, DOE accepted ownership of the CISS property from NL Industries. Residual radioactive material guidelines for individual radionuclides and total uranium were derived on the basis of the requirement that the 50-year committed effective dose equivalent to a hypothetical individual who lives or works in the immediate vicinity of the site should not exceed a dose of 30 mrem/yr following remedial action for the current use and likely future use scenarios or a dose of 100 mrem/yr for less likely future use scenarios. The DOE residual radioactive material guideline computer code, RESRAD, was used in this evaluation; RESRAD implements the methodology described in the DOE manual for establishing residual radioactive material guidelines.
Dunning, D.
1996-05-01
386
PubMed Central
Environmental conditions and physical constraints both influence an animal's behavior. We investigate whether behavioral variation among colonies of the black harvester ant, Messor andrei, remains consistent across foraging and disturbance situations and ask whether consistent colony behavior is affected by nest site and weather. We examined variation among colonies in responsiveness to food baits and to disturbance, measured as a change in numbers of active ants, and in the speed with which colonies retrieved food and removed debris. Colonies differed consistently, across foraging and disturbance situations, in both responsiveness and speed. Increased activity in response to food was associated with a smaller decrease in response to alarm. Speed of retrieving food was correlated with speed of removing debris. In all colonies, speed was greater in dry conditions, reducing the amount of time ants spent outside the nest. While a colony occupied a certain nest site, its responsiveness was consistent in both foraging and disturbance situations, suggesting that nest structure influences colony personality.
Gordon, Deborah M.; Holmes, Susan
2012-01-01
387
USGS Publications Warehouse
In an investigation of the factors leading to geographic structuring among Ade??lie Penguin (Pygoscelis adeliae) populations, we studied the size and overlap of colony-specific foraging areas within an isolated cluster of colonies. The study area, in the southwestern Ross Sea, included one large and three smaller colonies, ranging in size from 3900 to 135000 nesting pairs, clustered on Ross and Beaufort Islands. We used triangulation of radio signals from transmitters attached to breeding penguins to determine foraging locations and to define colony-specific foraging areas during the chick-provisioning period of four breeding seasons, 1997-2000. Colony populations (nesting pairs) were determined using aerial photography just after egg-laying; reproductive success was estimated by comparing ground counts of chicks fledged to the number of breeding pairs apparent in aerial photos. Foraging-trip duration, meal size, and adult body mass were estimated using RFID (radio frequency identification) tags and an automated reader and weighbridge. Chick growth was assessed by weekly weighing. We related the following variables to colony size: foraging distance, area, and duration; reproductive success; chick meal size and growth rate; and seasonal variation in adult body mass. We found that penguins foraged closest to their respective colonies, particularly at the smaller colonies. However, as the season progressed, foraging distance, duration, and area increased noticeably, especially at the largest colony. The foraging areas of the smaller colonies overlapped broadly, but very little foraging area overlap existed between the large colony and the smaller colonies, even though the foraging area of the large colony was well within range of the smaller colonies. Instead, the foraging areas of the smaller colonies shifted as that of the large colony grew. Colony size was not related to chick meal size, chick growth, or parental body mass. This differed from the year previous to the study, when foraging trips of the large colony were very long, parents lost mass, and chick meals were smaller. In light of existing data on prey abundance in neritic waters in Antarctica suggesting that krill are relatively evenly distributed and in high abundance in the Southern Ross Sea, we conclude that penguins depleted or changed the availability of their prey, that the degree of alteration was a function of colony size, and that the large colony affected the location (and perhaps ultimately the size) of foraging areas for the smaller colonies. It appears, therefore, that foraging dynamics play a role in the geographic structuring of colonies in this species. ?? 2004 by the Ecological Society of America.
Ainley, D. G.; Ribic, C. A.; Ballard, G.; Heath, S.; Gaffney, I.; Karl, B. J.; Barton, K. J.; Wilson, P. R.; Webb, S.
2004-01-01
388
National Technical Information Service (NTIS)
The authors located and surveyed 7 active seabird colonies in northeast Prince William Sound (Port Gravina to Nelson Bay), including 3 colonies not previously reported. Additionally at 2 historic colonies, Redhead and Hanks Island, the authors were not ab...
M. A. Bishop
1999-01-01
389
Colonial web-building spiders respond to trade-offs between selective forces relative to spatial position within colonies and thus provide support for the selfish herd theory. The size distribution of spiders within colonies of Metepeira incrassata, a colonial orb-weaver (Araneae: Araneidae) from tropical Mexico is nonrandom; larger (mature) spiders and females guarding eggsacs are more prevalent in the center, whereas more small
Linda S. Rayor; George W. Uetz
1990-01-01
390
Morphological characteristics of an edible terrestrial cyanobacteriumNostoc flagelliforme in liquid suspension cultures under photoautotrophic conditions are presented. Different cell forms alternated in a regular\\u000a manner during the experimentation period (30 d).N. flagelliforme exhibited a very complex life cycle in terms of colony morphology, including mainly 4 different colony morphological forms,viz. hormogonia, filaments, seriate colonies and aseriate colonies. Under laboratory conditions
X.-J. Liu; F. Chen
2003-01-01
391
The small hive beetle (SHB) is a parasite and scavenger of honeybee colonies. Here we provide the first comprehensive systematic\\u000a data on colony infestation levels with adult SHB for 226 colonies at 31 apiaries in South Africa, Australia, Florida and Maryland.\\u000a Inside colonies, SHB distribution was influenced by the presence of bees with more SHB in the brood nest in
Sebastian Spiewok; Jeff S. Pettis; Michael Duncan; Robert Spooner-Hart; David Westervelt; Peter Neumann
2007-01-01
392
PubMed
The growth of macroscopic hemopoietic colonies was observed during postradiation regeneration in the spleen of dwarf hamsters (as well as of mice). The erythroid, granulocyte and megakaryocyte colonies were morphologically identified. The ratio between the erythroid and granulocyte colonies amounts to approximately 11. The formation of macroscopic spleen colonies and their morphology can be used for the functional characterization of hemopoietic microenvironment in the dwarf hamster. PMID:6646616
Starostin, V I
393
FIDELITY to a previously used nesting area has been demonstrated or hypothesized for many bird species (see Greenwood 1980 for partial review). In colonially nesting birds, the area to which a bird returns from one breeding season to the next may be as large, and rela- tively imprecise, as a colony site (colony-site tenacity) or as precise as a specific
394
The consumption of alcohol among Indians of southeastern North America is examined in this thesis. I discuss and compare the colonial strategies of the Spaniards in La Florida and the English in Carolina. The Spanish colonial strategy focused on converting Indians while English colonial strategy focused on exploiting Indians for economic gain. These differing strategies led to the very different
Sarah Thomson
2010-01-01
395
This work proposes a multi-objective artificial bee colony (MOABC) for optimizing problems with multiple objectives. We have adapted the original Artificial Bee Colony (ABC) algorithm to multi objective problems with a grid-based approach for maintaining and adaptively assessing the Pareto front. The Pareto set is used to control the flying behaviours of the individuals and structuring the bee colony. The
2010-01-01
396
ERIC Educational Resources Information Center
|From the perspective of German colonial supporters and authorities, appropriate white education in the settler colony of Southwest Africa (SWA) was essential for maintaining German hegemony in the territory. In order to reach this objective, the German colonial administration in SWA, with assistance from pedagogues and institutions in Germany,
Walther, Daniel Joseph
2013-01-01
397
Summary Of 38 animal colonies serologically examined for Encephalitozoon cuniculi, 1 mouse, 2 rat and 4 guineapig colonies were positive. A further survey showed that the prevalence within mouse, rat, guinea- pig and rabbit colonies varied between 25 and 95%. Guineapigs housed with infected rabbits are at a greater risk of being infected than those housed separately. Nephritis was a
J. Gannon
1980-01-01
398
Technology Transfer Automated Retrieval System (TEKTRAN)
Sylvatic plague is a major factor influencing prairie dog colony dynamics in the western Great Plains. We studied the nesting response of the mountain plover (Charadrius montanus), a grassland bird that nests on prairie dog colonies, to plague-driven dynamics of prairie dog colonies at three sites i...
399
The ant colony algorithm is a new class of population basic algorithm. The path planning is realized by the use of ant colony algorithm when the plane executes the low altitude penetration, which provides a new method for the path planning. In the paper the traditional ant colony algorithm is improved, and measures of keeping optimization, adaptively selecting and adaptively
Wen YE; Deng-wu MA; Hong-da FAN
2005-01-01
400
Ant Colony Optimization (ACO) is a meta-heuristic approach inspired by the study of the behavior of real ant colonies when finding the shortest path from their nest to food source. ACO has been used for solving approximately NP-hard problems and its elite effects has been proved by the experiments. Currently, two famous ACO algorithms are Ant Colony System (ACS) and
Dinh Quang Huy; Do Duc Dong; Hoang Xuan Huan
2006-01-01
401
Scholars of Indian history suggest that the main deterrent to entrepreneurial activity in colonial India was the absolute shortage of capital. A large body of theoretical and empirical research suggests that the key to mobilizing capital is a well functioning financial market. Using various bank records of the colonial state, I determine that the credit markets which supported colonial era
Susan Wolcott
402
Before the First World War, Belgium participated in a global wave of foreign direct investment. After the war, a shift towards the Belgian colony of the Congo was observed. With regard to these investments, it is commonly argued that higher (expected) profit rates were a strong incentive, although others propose that the colonial powers lost money on their colonial possessions.
FRANS BUELENS; STEFAAN MARYSSE
2009-01-01
403
National Technical Information Service (NTIS)
Variations in susceptibility to acute oxygen toxicity were observed among animals from the same colony as well as between two different colonies of Sprague-Dawley rats. Animals from Colony I survived, on the average, 6.7 days in 100 per cent oxygen, while...
R. D. Paegle W. N. Bernhard
1973-01-01
404
A revolutionary new concept for the early establishment of robust, self-sustaining Martian colonies is described. The colonies would be located on the North Polar Cap of Mars and utilize readily available water ice and the CO2 Martian atmosphere as raw materials to produce all of the propellants, fuel, air, water, plastics, food, and other supplies needed by the colony. The
James Powell; George Maise; John Paniagua
2001-01-01
405
Summary Special features facilitate the admission of new members, such as neonates, to otherwise closed animal societies. In eusocial insects, such as honeybees and paper wasps, young adults acquire a colony recognition phenotype from other colony members or nesting materials. Older adults must exempt them from expulsion during the acquisition period. Newly emerged adult honeybees gain tolerance in their colony
M. D. Breed; S. Perry; L. B. Bjostad
2004-01-01
406
This is a retrospective study of the eradication of mouse hepatitis virus (MHV) from two mouse colonies. A breeding colony of SENCAR mice was maintaied in a modified barrier facility. Serum from these mice tested positive for antibodies to MHV and Sendai virus. The colony was reduced to a minimum number, the breeders were separated and all young killed. All
Bingham
1986-01-01
407
Summary An adenine requiring strain ofCandida albicans, WC-7, forms large smooth colonies. When grown at 37 C under conditions of severe adenine deprivation, WC-7 cultures accumulate variant cells (MR variants) which produce minute, rough colonies. The variants are stable in that they persist upon repeated selective subculturing. However, they do exhibit high rates of reversion to their large, smooth colony
Rosalee Ireland; Alvin Sarachek
1969-01-01
408
Recently, it has been proposed that the one of the main determinants of complex societies in Hymenoptera is colony size, since the existence of large colonies reduces the direct reproductive success of an average individual, given a decreased chance of being part of the reproductive caste. In this study, we evaluate colony size evolution in corbiculate bees and their relationship
Enrique Rodriguez-Serrano; Oscar Inostroza-Michael; Jorge Avaria-Llautureo; Cristian E. Hernandez
2012-01-01
409
A survey of the temporal pattern of population structure and feeding activity of the seabird tick Ixodesuriae was conducted for the first time in two host species colonies: King penguin (Aptenodytespatagonicushalli) and Macaroni penguin (Eudypteschrysolophuschrysolophus). The life cycle of the tick was investigated over 3 years in a King penguin colony and 2 years in a Macaroni penguin colony at
Y. Frenot; E. de Oliveira; M. Gauthier-Clerc; J. Deunff; A. Bellido; P. Vernon
2001-01-01
410
The rich prehistoric archaeological record in Andean South America has obscured the importance of post-conquest historic sites in the region. Archaeologists researching the former Spanish colonies have long turned to the US Borderlands and the Caribbean for models defining the archaeology of Spanish colonialism. Recently, however, Andean archaeologists have begun to create new emphases on the archaeology of colonialism and
Ross W Jamieson
2005-01-01
411
European prostitutes occupied an important intermediary status in colonial Bombays racially stratified sexual order. In this article, the author offers a transnational feminist analysis of how the colonial state managed its racial and spatial location. The colonial state individuated, fostered, and monitored European prostitutes much more closely than others involved in the sex trade, and coercive protection by the police
Ashwini Tambe
2005-01-01
412
We assessed the genetic and morphological differences between the two largest breeding colonies of Audouin's Gull Larus audouinii , an endemic seabird species of the Mediterranean region. The two colonies comprise c. 75% of the total world population and are 655 km apart. The Ebro Delta colony was formed recently and, after dramatic growth mainly due to high rates of
Meritxell Genovart; Daniel Oro; Francois Bonhomme
2003-01-01
413
Social insect societies are outstanding examples of cooperation and conflict. Individuals work together, yet seek to increase their inclusive fitness at each others' expense. One such conflict is over colony inheritance, when a queen inherits the colony following the death of the previous queen. Colony inheritance is common in the social wasp Polistes dominulus, and it can have dramatic fitness
Thibaud Monnin; Alessandro Cini; Vincent Lecat; Pierre Federici; Claudie Doums
2009-01-01
414
To what extent do colonial public investments continue to influence current regional inequalities in French-speaking West Africa? Using a new database and the spatial discontinuities of colonial investment policy, this paper gives evidence that early colonial investments had large and persistent effects on current outcomes. The nature of investments also matters. Current educational outcomes have been more specifically determined by
Elise Huillery
2009-01-01
415
The majority of nation-states experienced colonial rule at some point during the last two centuries, with well-studied economic, political, and social consequences after decolonization. This study examines a different form of the colonial legacy, involving the stability of the territorial status quo after independence. We present and test three competing expectations about the colonial legacy, focused around the legitimacy of
Paul R. Hensel; Michael E. Allison; Ahmed Khanani
416
Actinobacillus actinomycetemcomitans, a gram-negative bacterium isolated from the human mouth, has been implicated in the pathogenesis of early-onset periodontitis. Primary isolates cultured from subgingival plaque exhibit an adherent, rough colony phenotype which spontaneously converts to a nonadherent, smooth pheno- type upon in vitro subculture. The rough colony variant produces abundant fimbriae and autoaggregates, while the smooth colony variant is planktonic
ELAINE M. HAASE; JOYCE L. ZMUDA; FRANK A. SCANNAPIECO
1999-01-01
417
A method has been developed whereby a very large number of colonies of Escherichia coli carrying different hybrid plasmids can be rapidly screened to determine which hybrid plasmids contain a specified DNA sequence or genes. The colonies to be screened are formed on nitrocellulose filters, and, after a reference set of these colonies has been prepared by replica plating, are
Michael Grunstein; David S. Hogness
1975-01-01
418
The paper argues that the post-colonial crisis of citizenship demands a rethinking of the paradigm of viewing colonialism simply as a system of economic exploitation to viewing colonialism as a political project that is anchored in law. The paper provides a historical and post-referendum analysis of the political division between North and South Sudan. As South Sudan seeks to build
Christopher Zambakari
2012-01-01
419
Technology Transfer Automated Retrieval System (TEKTRAN)
Increasing acreage of almonds in California has increased the demand for honey bee colonies for pollination. Since 2005, domestic U.S. colonies have been supplemented with colonies started from package bees imported from Australia. The need for almond pollination in late winter in California fits we...
420
Summary Queens ofLasius flavus (F.) andL. niger (L.) were observed to choose sunlit bare areas for colony foundation and shading was found to reduce their success in founding colonies. Large colonies of these species killed queens of the opposite species first thus favouring the co-existence brought about by their habitat selection.
A. J. Pontin
1960-01-01
421
The lifestyle of wild and laboratory yeast strains significantly differs. In contrast to the smooth colonies of laboratory strains, wild Saccharomyces cerevisiae strains form biofilm-like, strikingly structured colonies possessing distinctive traits enabling them to better survive in hostile environments in the wild. Here, comparing three sets of strains forming differently structured colonies (fluffy, semi-fluffy and smooth), each derived from ancestors
Vratislav tov?ek; Libue Vchov; Martin Kuthan; Zdena Palkov
2010-01-01
422
Summary 1. Simulations of a stochastic, individual-based predictive model were used to invest- igate the ecological processes relating to the formation and growth of colonies (local populations) of Audouin's Gull ( Larus audouinii Payraudeau). A colony was established in 1981 at the Ebro Delta (in the north-western Mediterranean) and since then, the colony has grown dramatically at an average rate
Daniel Oro; Graeme D. Ruxton
2001-01-01
423
Summary. A shift in colony founding behaviour from single queen (haplometrosis) to multiple queens (pleometrosis) was observed locally in the obligate plant-ant Crematogaster (Decacrema) morphospecies 2, which is associated with Macaranga trees in Borneo. In addition, about a quarter of all mature colonies (27 of 95 trees examined) were found to be multiple queen colonies. They arose either directly from
H. Feldhaar; B. Fiala; J. Gadau
2005-01-01
424
This study examined the impact on a colony's honey production of providing it with a nat- ural amount (20%) of drone comb. Over 3 summers, for the period mid May to late August, I mea- sured the weight gains of 10 colonies, 5 with drone comb and 5 without it. Colonies with drone comb gained only 25.2 16.0 kg
Thomas D. Seeley
2002-01-01
425
We investigated the relative contribution of the queen and workers to colony nestmate recognition cues and on colony insularity in the Carpenter ant Camponotus fellah . Workers were either individually isolated, preventing contact with both queen and workers (colonial deprived, CD), kept in queenless groups, allowing only worker- worker interactions (queen deprived, QD) or in queenright (QR) groups. Two weeks
Raphael Boulay; Tamar Katzav-Gozansky; Robert K. Vander Meer; Abraham Hefetz
2003-01-01
426
This contribution critically investigates the ideas underpinning the armed struggle of colonial subjects against colonial states in the middle decades of the 20th century. It focuses in particular on two of the most influential texts that inspired and guided violent anti-colonial resistance, The Wretched of the Earth by Frantz Fanon and On Guerrilla Warfare by Mao Zedong. Both Fanon and
Sebastian Kaempf
2009-01-01
427
A honey bee colony operates as a tightly integrated unit of behavioral action. One manifestation of this in the context of foraging is a colony's ability to adjust its selectivity among nectar sources in relation to its nutritional status. When a colony's food situation is good, it exploits only highly profitable patches of flowers, but when its situation is poor,
Thomas D. Seeley
1989-01-01
428
A honey bee colony can skillfully choose among nectar sources. It will selectively exploit the most profitable source in an array and will rapidly shift its foraging efforts following changes in the array. How does this colony-level ability emerge from the behavior of individual bees? The answer lies in understanding how bees modulate their colony's rates of recruitment and abandonment
Thomas D. Seeley; Scott Camazine; James Sneyd
1991-01-01
429
Feeding pollen substitutes to honey bee (Apis mellifera) colonies in kiwifruit (Actinidia deliciosa) orchards had no significant effect on the amount of kiwifruit pollen collected, but caused a decline in the amount of pollen collected from other sources. Pollen substitutes had no significant effect on honey production from colonies used for kiwifruit pollination or colonies managed solely for honey production.
R. M. Goodwin; A. Ten Houten; J. H. Perry
1994-01-01
430
Field observations and laboratory experiments demonstrate that in the Australian meat ant, Iridomyrmex purpureus, the modes of colony founding are remarkably diverse. New colonies can originate from single foundresses (haplometrosis), or foundress associations (pleometrosis), or by colony budding, or the adoption of newly-mated queens that dig founding chambers next to mature nests (probably their natal nests, as workers protect them
Bert Hlldobler; Norman F. Carlin
1985-01-01
431
In spite of the tremendous public interest in the recent large honeybee losses attributed to colony collapse disorder, there is still no definitive explanation for the phenomenon. With the hypothesis that nutritional stress due to habitat loss has played an important role in honeybee colony collapse, I analyze the land use data in United States to show that the colony
Dhruba Naug
2009-01-01
432
The worldwide decline in honeybee colonies during the past 50 years has often been linked to the spread of the parasitic mite Varroa destructor and its interaction with certain honeybee viruses. Recently in the United States, dramatic honeybee losses (colony collapse disorder) have been reported; however, there remains no clear explanation for these colony losses, with parasitic mites, viruses, bacteria,
Andrea C. Highfield; Aliya El Nagar; Luke C. M. Mackinder; Laure M.-L. J. Noel; Matthew J. Hall; Stephen J. Martin; Declan C. Schroeder
2009-01-01
433
Technology Transfer Automated Retrieval System (TEKTRAN)
A mathematical model of population interactions between Varroa destructor and a honey bee colony is described. The program bases colony population growth on weather conditions, time of year, initial colony population size, queen fecundity, and worker longevity. Varroa population growth is predicte...
434
The ant colony algorithm of routing technology in a communication network had a broad of applications. The usage of ant colony algorithm to exchange data for distributed databases had not been studied deeply yet. On the purple of solving the dynamic, real-time data exchange problems, the ant colony algorithm model with multi Constraints for routing a data packet was discussed
Yue Gong; Zhuo Wang; Haoling Li; Hang Wu
2012-01-01
435
Inspired by related mechanisms of ant colony and idiotypic network hypothesis, a model of ant colony and immune network is proposed to solve the problem of path planning in a complex environment. The mechanism of stimulation and suppression between antigen and antibody is used to find the path, which solves the complex environment modeling of ant colony algorithm, and improves
Mingxin Yuan; Sunan Wang; Pengkun Li
2008-01-01
436
Technology Transfer Automated Retrieval System (TEKTRAN)
Multiple mating by honey bee queens results in colonies of genotypically diverse workers. Recent studies have demonstrated that increased genetic diversity within a honey bee colony increases the variation in the frequency of tasks performed by workers. We show that genotypically diverse colonies, ...
437
PubMed
How organisms allocate limited resources to reproduction is critical to their fitness. The size and number of offspring produced have been the focus of many studies. Offspring size affects survival and growth and determines offspring number in the many species where there is a trade-off between size and number. Many social insects reproduce by colony fission, whereby young queens and accompanying workers split off from a colony to form new colonies. The size of a new colony (number of workers) is set at the time of the split, and this may allow fine tuning size to local conditions. Despite the prevalence of colony fission and the ecological importance of social insects, little is known of colony fission except in honey bees. We studied colony fission in the ant Cataglyphis cursor. For clarity, "colony" and "nest" refer to colonies before and after colony fission, respectively (i.e., each colony fissions into several nests). The reproductive effort of colonies was highly variable: Colonies that fissioned varied markedly in size, and many colonies that did not fission were as large as some of the fissioning colonies. The mother queen was replaced in half of the fissioning colonies, which produced 4.0 +/- 1.3 (mean +/- SD) nests of markedly varied size. Larger fissioning colonies produced larger nests but did not produce more nests, and resource allocation among nests was highly biased. When a colony produced several nests and the mother queen was not replaced, the nest containing the mother queen was larger than nests with a young queen. These results show that the pattern of resource allocation differs between C. cursor and honey bees. They also suggest that C. cursor may follow a bet-hedging strategy with regard to both the colony size at which fission occurs and the partitioning of resources among nests. In addition, colony fission may be influenced by the age and/or condition of the mother queen, and the fact that workers allocating resources among nests have incomplete knowledge of the size and number of nests produced. These results show that the process of colony fission is more diverse than currently acknowledged and that studies of additional species are needed. PMID:21870619
Chron, Blandine; Cronin, Adam L; Doums, Claudie; Fdrici, Pierre; Haussy, Claudy; Tirard, Claire; Monnin, Thibaud
2011-07-01
438
USGS Publications Warehouse
Feeding flights of Snowy Egrets (Egretta thula), Tricolored Herons (E. tricolor), Little Blue Herons (E. caerulea), and Cattle Egrets (Bubulcus ibis) were monitored at a small nesting colony near Chincoteague, Virginia during late May and June 1979. All four species varied their flight directions over a series of days. Cattle Egrets oriented in a different direction (toward uplands) from the other three wetland-feeding species, which oriented toward Spartina marsh areas. None of the species showed a tendency to form groups while departing from or arriving at the colony. Tide level had little influence on flight directions used. Comparisons are made between these results and those from a similar study in coastal North Carolina.
Erwin, R.M.
1984-01-01
439
SciTech Connect
A systemic and quantitative study was performed to examine whether different levels of mitotic activities, assessed by the percentage of S-phase cells at any given time point, existed at different physical regions of human embryonic stem (hES) cell colonies at 2, 4, 6 days after cell passaging. Mitotically active cells were identified by the positive incorporation of 5-bromo-2-deoxyuridine (BrdU) within their newly synthesized DNA. Our data indicated that mitotically active cells were often distributed as clusters randomly across the colonies within the examined growth period, presumably resulting from local deposition of newly divided cells. This latter notion was further demonstrated by the confined growth of enhanced green florescence protein (EGFP) expressing cells amongst non-GFP expressing cells. Furthermore, the overall percentage of mitotically active cells remained constantly at about 50% throughout the 6-day culture period, indicating mitotic activities of hES cell cultures were time-independent under current growth conditions.
Jin, Q.; Duggan, R.; Dasa, S.; Li, F.; Chen, L. (Biosciences Division)
2010-08-01
440
NSDL National Science Digital Library
Based at the University of Virginia Department of Economics, the Leslie Brock Center for the Study of Colonial Currency makes the controversial work of the late Leslie V. Brock (1903-1985), Professor of History, College of Idaho, available for study. Fundamental sources of Brock's inquiries into colonial paper money practices, such as Ben Franklin's "Modest Enquiry into the Nature and Necessity of a Paper Currency" (1729) and Douglass's "Discourse on the Currencies of the American Plantations" (1740), are included in full text, as are current articles on American monetary history. Useful links to other monetary history chronologies, sites, bibliographies, and currency calculators are maintained by Roy Davies, Science Librarian at the University of Exeter, England.
1997-01-01
441
PubMed
Microcystis is a toxic colony-forming cyanobacterium, which can bloom in a wide range of freshwater ecosystems. Despite the ecological advantage of the colonial form, few studies have paid attention to the size of Microcystis colonies in the field. With the aim of evaluating the impact of a fluctuating physical environment on the colony size, the genotypic composition and the toxic potential of a Microcystis population, we investigated five different colony size classes of a Microcystis bloom in the Grangent reservoir (France). By sequencing the internal transcribed spacer of the ribosomal operon, we evidenced changes in the genetic structure among size classes in response to environmental change. While similar genotypes were seen in every size class in stable conditions, new dominant genotypes appeared in the smallest colonies (colonies in response to disturbances. Moreover, these small colonies played a major role in microcystin production during this bloom, since very high microcystin contents (>?1?pg.cell.(-1)) were found in their cells. These findings indicate that the colony size distribution of a Microcystis population in response to disturbance could be an adaptive strategy that may explain its ecological success in freshwater ecosystems. PMID:24115626
Sabart, Marion; Misson, Benjamin; Descroix, Aurlie; Duffaud, Emilie; Combourieu, Bruno; Salenon, Marie-Jos; Latour, Delphine
2013-07-16
442
The paper presents an ant colony search algorithm (ACSA)-based approach to solve the unit commitment (UC) problem. This ACSA algorithm is a relatively new meta-heuristic for solving hard combinatorial optimization problems. It is a population-based approach that uses exploitation of positive feedback, distributed computation as well as a constructive greedy heuristic. Positive feedback is for fast discovery of good solutions,
N. S. Sisworahardjo; A. A. El-Keib
2002-01-01
443
The ant colony optimization (ACO) algorithm is a fast suboptimal meta-heuristic based on the behavior of a set of ants that\\u000a communicate through the deposit of pheromone. It involves a node choice probability which is a function of pheromone strength\\u000a and inter-node distance to construct a path through a node-arc graph. The algorithm allows fast near optimal solutions to\\u000a be
Bud Fox; Wei Xiang; Heow Pueh Lee
2007-01-01
444
Ant Colony Optimization (ACO) has become quite popular in recent years. In contrast to many successful applications, the theoretical\\u000a foundation of this randomized search heuristic is rather weak. Building up such a theory is demanded to understand how these\\u000a heuristics work as well as to come up with better algorithms for certain problems. Up to now, only convergence results have
Frank Neumann; Carsten Witt
2009-01-01
445
This paper introduces ant colony system (ACS), a distributed algorithm that is applied to the Stable Marriage Problem (SM).\\u000a The stable marriage problem is an extensively-studied combinatorial problem with many practical applications. It is well known\\u000a that at least one stable matching exists for every stable marriage instance. However, the classical Gale-Shapley [2] algorithm\\u000a produces a marriage that greatly favors
Ngo Anh Vien; Nguyen Hoang Viet; Hyun Kim; SeungGwan Lee; TaeChoong Chung
446
In the 5 years since granulocyte-macrophage colony-stimulating factor (GM-CSF) was first tested clinically, a number of different strategies for its use have been evaluated in patients with malignant disease. These include using GM-CSF to support standard and high-dose chemotherapy, to accelerate myeloid reconstitution following marrow transplantation, to mobilize peripheral blood progenitor cells into the circulation for harvesting and transplantation, and
J. S. Cebon; G. J. Lieschke
1994-01-01
447
PubMed
Abstract Small colony variants (SCVs) are subpopulations of a bacterial strain that differ in morphology, growth rate, metabolism, and antibiotic sensitivity from the parent line. They are associated with chronic and difficult-to-treat infections. SCV endocarditis is very rare and usually associated with intracardiac devices. Herein, we report a case of endocarditis caused by SCV-forming Enterococcus faecalis that affected the native heart without any known predisposition. PMID:23808721
Benes, Jiri; Dzupova, Olga; Setina, Marek; Feuereisl, Rudolf; Svec, Pavel; Pantucek, Roman
2013-07-01
448
Feature selection is an important step in many pattern recognition systems that aims to overcome the so-called curse of dimensionality\\u000a problem. Although Ant Colony Optimization (ACO) proved to be a powerful technique in different optimization problems, but\\u000a it still needs some improvements when applied to the feature selection problem. This is due to the fact that it builds its\\u000a solutions
Rami N. Khushaba; Ahmed Al-ani; Akram Alsukker; Adel Al-jumaily
2008-01-01
449
PubMed
The first permanent European settlers of Australia arrived in 1788 to establish a penal colony at Sydney, New South Wales (NSW). As the colony grew and wool production increased, more free settlers and emancipists developed farming in inland Australia. During the 1840s veterinarians commenced arriving in small numbers but they were not closely associated with the development and execution of disease control programs, which was left to lay inspectors of stock. The arrival of William Tyson Kendall and coordinated action with Graham Mitchell led to the establishment of a private veterinary college following the passage of veterinary surgeons legislation in Victoria. From this time, veterinarians came to be appointed to positions formerly occupied by lay inspectors and the veterinary profession was able to take up the role of planning and executing government-led disease control programs. From a colony relying on wool for export to the UK, technical advancements in meat freezing and pasture improvement widened the range and increased the quantity of exported products. Before the advent of veterinary advances, sheep scab was eradicated, a vaccine was developed for anthrax and glanders infection of horses was prevented entry to Australia. Graduates from the Melbourne Veterinary College spread across Australia and in this period a conservative quarantine policy was developed following inaction to control an outbreak of contagious bovine pleuropneumonia (CBPP) and the escape of rabbits to form a plague across the continent. Coordinated control of CBPP had to await the next century and advancement of technology increased our understanding of bacteriology and immunity of infectious diseases. Veterinary services were provided to the militia sent by the colonies to the Boer Wars in South Africa 1987-1901 and the veterinarians from Victoria were led by an Australian trained veterinarian. PMID:21696369
Turner, A J
2011-07-01
450
The flow of jelly from 100 nurse bees to the members of two normal-sized colonies was measured during one night. To follow the flow, nurses were injected with 14C-phenylalanine. They incorporated this label into the protein of their hypopharyngeal (brood food) glands and their own body protein. When they were allowed trophallactic contacts during the investigation period a loss of
Karl Crailsheim; Karl Franzens
1992-01-01
451
Honeybee nurses (8 days old) were injected with 14C-phenylalanine. These bees then dispensed the 14C-labelled protein-rich products of their hypopharyngeal glands to the queen and the brood, and also to young drones and workers of all age classes. In small colonies containing 400800 bees, nearly one-quarter of the radioactivity which could not be recovered in the nurses was fed by
Karl Crailsheim
1991-01-01
452
PubMed
Germ cell sequestering in Animalia is enlightened by either, launching true germ line along epigenetic or preformistic modes of development, or by somatic embryogenesis, where no true germ line is set aside. The research on germ line-somatic tissue segregation is of special relevancy to colonial organisms like botryllid ascidians that reconstruct, on a weekly basis, completely new sets of male and female gonads in newly formed somatic tissues. By sequencing and evaluating expression patterns of BS-Vasa, the Botryllus schlosseri orthologue of Vasa, in sexually mature and asexual colonies during blastogenesis, we have demonstrated that the BS-Vasa mRNA and protein are not expressed exclusively in germ cell lineages, but appeared in cells repeatedly emerging de novo in the colony, independently of its sexual state. In addition, we recorded an immediate Vasa response to cellular stress (UV irradiation) indicating additional functions to its germ line assignments. To confirm germ lineage exclusivity, we examined the expression of three more stem cell markers (BS-Pl10, Bl-piwi and Oct4). Vasa co-expression with Pl10 and Oct4 was detected in germ line derivatives and with Bl-piwi in somatic tissues. Presumptive primordial germ cells (PGC-like cells), that are Vasa(+)/Pl10(+)/Oct4(+) and 6-12 microm in diameter, were first detected in wrapped-tail embryos, in oozooids, in sexual/asexual colonies, within a newly identified PGC niche termed as 'budlet niche', and in circulating blood borne cells, indicating epigenetic embryogenesis. Alternatively, BS-Vasa co-expression with piwi orthologue, an omnipresent bona fide stemness flag, in non germ line cell populations, may indicate germ cell neogenesis (somatic embryogenesis) in B. schlosseri. Both alternatives are not necessarily mutually exclusive. PMID:19406116
Rosner, Amalia; Moiseeva, Elizabeth; Rinkevich, Yuval; Lapidot, Ziva; Rinkevich, Baruch
2009-05-03
453
Just after the Emancipation Proclamation went into effect (1 Jan 1863) Abraham Lincoln signed a contract with two New York capitalists to transport 500 newly-freed ex-slaves to Ile-a-Vache, Haiti, where they would, under company supervision, found and maintain a colony. From the start, little went right. Failure was due largely to mismanagement and chicanery on the part of the company.
Robert Bray
2012-01-01
454
The $$\\\\epsilon$$-Depth ANT Explorer ($$\\\\epsilon$$-\\u000a DANTE\\u000a ) algorithm applied to a multiple objective optimization problem is presented in this paper. This method is a hybridization\\u000a of the ant colony optimization algorithm with a depth search procedure, putting together an oriented\\/limited depth search.\\u000a A particular design of the pheromone set of rules is suggested for these kinds of optimization problems, which
Pedro Cardoso; Mrio Jesus; Alberto Mrquez
2011-01-01
455
PubMed Central
Microfermentation tests for members of the family Enterobacteriaceae were devised by using agar solutions in disposable, multi-welled, plastic trays. The tests could be made directly from isolated colonies picked from agar plates and represented a considerable saving in time, labor, and materials over the conventional methods. Tests were formulated for determining carbohydrate fermentations, citrate utilization, motility, amino acid decarboxylation, and production of H2S, indole, urease, and acetyl-methyl-carbinol.
Huhtanen, C. N.; Naghski, J.; Dellamonica, E. S.
1972-01-01
456
The Canadian Official Method MFO-15 for aerobic colony counts of bottled waters and ice requires pour plating with plate count agar (PCA) tempered to 4045C and incubating 48 h at 35C. The performance of hydrophobic grid membrane filters (HGMF), counted by computerized counter after 48 h incubation on various media, was compared against MFO-15 for 31 water samples collected across
L. J Parrington; A. N Sharpe
1998-01-01
457
Routes planning is one of the most important aspects in emergency evacuation planning. A multi-objective emergency evacuation model using ant colony optimization was proposed for routes planning in complex multi-exit evacuation environment. The two objectives of the model are to minimize the total evacuation time of all evacuees and to minimize the total path crowding degree respectively. A multi-objective ant
Xinlu Zong; Shengwu Xiong; Zhixiang Fang; Wanru Lin
2010-01-01
458
1.Worker honeybees contacting a queen can transport the queen's inhibitory signal, queen substance, to other workers unable to contact the queen. Airborne dispersal of queen substance is at most a minor mechanism for queen substance transmission.2.This worker transport of queen substance is an important supplement to queen substance dispersal by direct queen-worker contacts. For although colonies lose their inhibition against
Thomas D. Sceley
1979-01-01
459
In addition to honeybee workers, drones also contribute to colonial thermoregulation. We show the drones contribution to\\u000a thermoregulation at 5 different experimental temperatures ranging from 15 34 C. The frequency and the degree of endothermy\\u000a depended on the drones local ambient temperature and age. Location on brood or non-brood areas had no influence. The frequency\\u000a of endothermic drones and the
Helmut Kovac; Anton Stabentheiner; Robert Brodschneider
2009-01-01
460
Ant Colony Optimisation (ACO) is an effective population-based meta-heuristic\\u000afor the solution of a wide variety of problems. As a population-based\\u000aalgorithm, its computation is intrinsically massively parallel, and it is\\u000athere- fore theoretically well-suited for implementation on Graphics Processing\\u000aUnits (GPUs). The ACO algorithm comprises two main stages: Tour construction\\u000aand Pheromone update. The former has been previously implemented
Jos M. Cecilia; Jos M. Garca; Manuel Ujaldon; Andy Nisbet; Martyn Amos
2011-01-01
461
The microorganisms capable of producing opportunist infections include the yeast-like organisms of the genus Candida, and\\u000a the unicellular algae of the genus Prototheca, which share common features and can, therefore, lead to confusion. Their colonies\\u000a are almost identical and they grow in the same culture media used routinely in mycology.\\u000a \\u000a CHROMagar Candida is a new chromogenic differential isolation medium that
Manuel Casal; Mara Jos Linares; Francisco Sols; Fernando C. Rodrguez
1997-01-01
462
The benefits of philopatry hypothesis states that helpers in cooperatively breeding species derive higher benefits from\\u000a remaining home, instead of dispersing and attempting to breed independently. We tested experimentally whether dispersal options\\u000a influence dispersal propensity in the cooperatively breeding Lake Tanganyika cichlids Neolamprologus pulcher and N. savoryi. Cooperative groups of these fishes breed in densely packed colonies, surrounded by unoccupied,
D. Heg; Z. Heg-Bachar; L. Brouwer; M. Taborsky
2008-01-01
463
Ant colony optimisation is a constructive metaheuristic that successively builds solutions from problem-specic components. A pa- rameterised model known as pheromone|an analogue of the trail phero- mones used by real ants|is used to learn which components should be combined to produce good solutions. In the majority of the algorithm's applications a single parameter from the model is used to inuence
James Montgomery
2006-01-01
464
The Ant Colony Optimization (ACO) algorithms are being applied successfully to a wide range of problems. ACO algorithms could\\u000a be good alternatives to existing algorithms for hard combinatorial optimization problems (COPs). In this paper we investigate\\u000a the influence of the probabilistic model in model-based search as ACO. We present the effect of four different probabilistic\\u000a models for ACO algorithms to
Stefka Fidanova; G. Bonchev
2007-01-01
465
The mechanisms operating in the formation and maintenance of colony odor in the ponerine ant Pachycondyla apicalis were studied using radioactive tracers. Using [l-14C]acetate as a precursor, the de novo biosynthesis and distribution of pentane-extractable lipids within the ant's body were followed. Twenty-four hours after injection, newly synthesized alkanes, alkenes, as well as more polar lipids were found in the
Victoria Soroker; Dominique Fresneau; Abraham Hefetz
1998-01-01
466
The common sense of empire is increasingly embedded in local, national, and international epistemologies. Counter-hegemonic\\u000a discourse must increasingly confront and challenge dominant paradigms, research, policy, and practice. To do so requires a\\u000a perspective that recognizes current discourses of difference and resistance. Across much of the planet in disparate sites,\\u000a ground-up resistance is in motion. As colonial relations are variegated, extended,
Arlo Kempf
467
PubMed
This paper situates the current abortion practice and policy in Puerto Rico within the historical, political, and economic context of the colonial domination of the United States (US) over Puerto Rico. In particular, we pay attention to the hurdles that women face to obtain abortion services in Puerto Rico as a result of its colonial legality. Of particular significance is the overall low abortion ratio, and differential abortion ratio and access issues faced by women when grouped by an age-ethnicity category: unmarried teenagers, adult Puerto Rican women and, adult immigrant women from the Dominican Republic. The present hurdles to abortion access--related to information, abortion providers, economic situation, and government policies--are discussed within the colonial legality of abortion based on the US Supreme Court decision Roe v. Wade. Puerto Rico's case is situated within its broader history of population policies developed by the State since the 1930's. Of particular relevance is the antagonism that State managers have had towards abortion in spite of its legality. In this sense, abortion in Puerto Rico continues to be an unfinished business, in spite of its legality. PMID:9642718
Azize-Vargas, Y; Avils, L A
1998-03-01
468
PubMed Central
The AOAC International official action procedure for performing aerobic colony counts on hydrophobic grid membrane filters (HGMFs) uses Trypticase soy-fast green FCF agar (FGA) incubated for 48 h. Microbial growths are various shades of green on a pale green background, which can cause problems for automated as well as manual counting. HGMFs which had been incubated 24 or 48 h at 35C on Trypticase soy agar were flooded underneath with 1 to 2 ml of 0.1% triphenyltetrazolium chloride (TTC) solution by simply lifting one corner of the filter while it was still on the agar and adding the reagent. Microbial growths on HGMFs were counted after color had been allowed to develop for 15 min at room temperature. With representative foods, virtually all colonies stained pink to red. Automated electronic counts made by using the MI-100 HGMF Interpreter were easier and more reliable than control HGMF counts made by the AOAC International official action procedure. Manual counting was easier as well because of increased visibility of the microbial growths. Except in the case of dairy products, 24-h TTC counts did not differ significantly from 48-h FGA counts, whereas the FGA counts at 24 h were always significantly lower, indicating that for many food products the HGMF TTC flooding method permits aerobic colony counts to be made after 24 h.
Parrington, Lorna J.; Sharpe, Anthony N.; Peterkin, Pearl I.
1993-01-01
469
PubMed
Studies of avian host-parasite interactions rarely include consequences of relationships among hosts for either the host or parasite species. In this study, we examine the ectoparasitic burden of adult and nestling European bee-eaters (Merops apiaster) and rock sparrows (Petronia petronia) in a mixed colony. We found that (1) each bird species had its own species of lice; (2) hematophagous mites parasitized both adults and nestlings of both bird species; (3) Carnus hemapterus, a common parasite of nestling bee-eaters, also infested rock sparrow nestlings, a species not previously described as a host for this dipteran; and (4) whereas C. hemapterus did not show high host specificity within the colony, the emergence of adult flies was synchronized with the start of hatching in bee-eater nests. We suggest that coexistence of these 2 bird species results in parasite exchange, bee-eaters obtaining mites from sparrows and sparrows becoming infested by C. hemapterus. Differences in the detrimental effects of parasite transfer for each host species may result in a process of apparent competition mediated by shared parasites. Interspecific parasite exchange is an important aspect of host-parasite relationships in mixed colonies, which requires further attention. PMID:12760636
Valera, Francisco; Casas-Crivill, Alejandro; Hoi, Herbert
2003-04-01
470
PubMed Central
The enteric bacterium Proteus mirabilis, which is a pathogen that forms biofilms in vivo, can swarm over hard surfaces and form a variety of spatial patterns in colonies. Colony formation involves two distinct cell types: swarmer cells that dominate near the surface and the leading edge, and swimmer cells that prefer a less viscous medium, but the mechanisms underlying pattern formation are not understood. New experimental investigations reported here show that swimmer cells in the center of the colony stream inward toward the inoculation site and in the process form many complex patterns, including radial and spiral streams, in addition to previously-reported concentric rings. These new observations suggest that swimmers are motile and that indirect interactions between them are essential in the pattern formation. To explain these observations we develop a hybrid model comprising cell-based and continuum components that incorporates a chemotactic response of swimmers to a chemical they produce. The model predicts that formation of radial streams can be explained as the modulation of the local attractant concentration by the cells, and that the chirality of the spiral streams results from a swimming bias of the cells near the surface of the substrate. The spatial patterns generated from the model are in qualitative agreement with the experimental observations.
Xue, Chuan; Budrene, Elena O.; Othmer, Hans G.
2011-01-01
471
PubMed
Organisms should invest more in gathering information when the pay-off from finding a profitable resource is likely to be greater. Here, we ask whether animal societies put more effort in scouting for a new nest when their current one is of low quality. We measured the scouting behaviour of Temnothorax albipennis ant colonies when they inhabit nest-sites with different combinations of desirable attributes. We show that the average probability of an ant scouting decreases significantly with an increase in the quality of the nest in which the colony currently resides. This means that the greater the potential gain from finding a new nest, the more effort a colony puts into gathering information regarding new nest-sites. Our results show, for the first time to our knowledge, the ability of animal societies to respond collectively to the quality of a resource they currently have at their disposal (e.g. current nest-site) and regulate appropriately their information gathering efforts for finding an alternative (e.g. a potentially better nest-site). PMID:24088565
Doran, Carolina; Pearce, Tom; Connor, Aaron; Schlegel, Thomas; Franklin, Elizabeth; Sendova-Franks, Ana B; Franks, Nigel R
2013-10-02
472
In the province of Chaco, Argentina, there is a very unique dispersion of metallic meteorites called Campo del Cielo''. One of the meteoric fragments of this dispersion, the meteorite called El Chaco'', consisting of 37 tons, is the second heaviest in the world. These meteorites are of great importance to the worldview of the Moqoit, aboriginal people that inhabit this region. For the local Creole population the meteorites are also relevant, that's why they have being cited in numerous documents and reports since the colonial period. During the first months of 2012, two Argentine artists and the Artistic Director of the German contemporary art exhibition called dOCUMENTA (13) tried to move `El Chaco'' meteorite to Germany in order to exhibit it as an artistic object. Due to the fact that moving the meteorite could have a negative impact according to the Moqoit cosmology and that they were not able to participate in the decision they begun a manifestation against the movement of El Chaco. The opposition made by aboriginal communities and experts in cultural astronomy was able to stop the transfer. The whole process and its impact on the local community have promoted a deep discussion about art, science and cultural colonialism. In this paper we aim to address this debate and its consequences. This will allow us to think about contemporary forms of colonialism that are hidden in many scientific and artistic projects. Furthermore, we aim to debate about the most effective ways of protecting astronomical heritage in the Third World.
Lpez, Alejandro Martn; Altman, Agustina
2012-09-01
473
PubMed
The colony and population structure of the carpenter ant, Camponotus floridanus, were investigated by multilocus DNA fingerprinting using simple repeat motifs as probes [e.g. (GATA)4]. The mating frequency of 15 queens was determined by comparing the fingerprint patterns of the queen and 17-33 of her progeny workers. C. floridanus queens are most probably singly mated, i.e. this species is monandrous and monogynous (one queen per colony). C. floridanus occurs in all counties of mainland Florida and also inhabits most of the Key islands in the southern part of Florida. We tested whether the two mainland populations and the island populations are genetically isolated. Wright's FST and Nei's D-value of genetic distance were calculated from intercolonial bandsharing-coefficients. The population of C. floridanus is substructured (FST = 0.19 +/- 0.09) and the highest degree of genetic distance was found between one of the mainland populations and the island populations (D = 0.35). Our fingerprinting technique could successfully be transferred to 12 other Camponotus species and here also revealed sufficient variability to analyse the genetic structure. In three of these species (C. ligniperdus, C. herculeanus and C. gigas) we could determine the mating frequency of the queen in one or two colonies, respectively. PMID:8981768
Gadau, J; Heinze, J; Hlldobler, B; Schmid, M
1996-12-01
474
PubMed
Recent work has demonstrated considerable benefits of intracolonial genetic diversity for the productivity of honeybee colonies: single-patriline colonies have depressed foraging rates, smaller food stores and slower weight gain relative to multiple-patriline colonies. We explored whether differences in the use of foraging-related communication behaviour (waggle dances and shaking signals) underlie differences in foraging effort of genetically diverse and genetically uniform colonies. We created three pairs of colonies; each pair had one colony headed by a multiply mated queen (inseminated by 15 drones) and one colony headed by a singly mated queen. For each pair, we monitored the production of foraging-related signals over the course of 3 days. Foragers in genetically diverse colonies had substantially more information available to them about food resources than foragers in uniform colonies. On average, in genetically diverse colonies compared with genetically uniform colonies, 36% more waggle dances were identified daily, dancers performed 62% more waggle runs per dance, foragers reported food discoveries that were farther from the nest and 91% more shaking signals were exchanged among workers each morning prior to foraging. Extreme polyandry by honeybee queens enhances the production of worker-worker communication signals that facilitate the swift discovery and exploitation of food resources. PMID:18198143
Mattila, Heather R; Burke, Kelly M; Seeley, Thomas D
2008-04-01
475
The sub-discipline of Historical Archaeology continues to push out its borders from its origins as the archaeology of British\\u000a colonial settlement in North America. This review article evaluates the contribution of a set of papers presented at the Society\\u000a of Historical Archaeology meeting in Albuquerque New Mexico in early 2008, and shows how new theoretical formulations are\\u000a taking shape.
Martin Hall
2009-01-01
476
PubMed
We describe a case of a spontaneously established mixed colony of two species of stingless bees. The host colony of Scaptotrigona depilis, an aggressive bee that forms large colonies, was invaded by workers of Nannotrigona testaceicornis, a smaller bee that forms small colonies. The host colony and the invading species colony were maintained in next boxes about 1.5 m apart. The N. testaceicornis colony had been recently divided. Observations were made daily for 10 min, and every two weeks the colony was opened for observations within the nest. Initially the host colony bees repulsed the invading species, but as their numbers built up, they were no longer able to defend the entrance. An estimated 60-90 N. testaceicornis workers lived integrated into the colony of S. depilis for 58 days. During this period, they reconstructed and maintained the entrance tube, changing it to an entrance typical of N. testaceicornis. They also collected food and building material for the host colony. Nannotrigona testaceicornis tolerated transit of S. depilis through the entrance, but did not allow the host species to remain within the tube, though the attacks never resulted in bee mortality. Aggression was limited to biting the wings; when the bees fell to the ground they immediately separated and flew back. There have been very few reports of spontaneously occurring mixed stingless bee colonies. It is difficult to determine what caused the association that we found; probably workers of N. testaceicornis got lost when we split their colony, and then they invaded the colony of S. depilis. PMID:19551639
Menezes, C; Hrncir, M; Kerr, W E
2009-05-12
477
This study tested the hypothesis that corals of the same species, but of varying size and shape, may respond differently to thermal stress because of different mass transfer capacities. High mass transfer rates are an advantage under thermal stress, and mass transfer rates are assumed to scale with size. Yet large, corymbose Acropora colonies are more vulnerable to thermal stress than small corymbose Acropora colonies. We took a two-tiered approach to examine the differences in the susceptibility of different coral morphologies to thermal stress. Firstly, the response of several coral species of different sizes and shapes were measured in the field through a thermal stress event. Secondly, diffusion experiments were conducted using gypsum-coral models of different morphologies to estimate mass transfer rates, to test whether dissolution rates differed in accordance with colony morphology and colony size. Coral colonies with a high height to diameter ratio were subjected to more partial mortality than flat colonies. These results agree with mass transfer theory. The diffusion experiments showed that in a low-flow environment, small encrusting colonies had higher rates of dissolution than large flat or small branched colonies. These results, however, disagree with mass transfer theory. We show that the volume of space between colony branches predicts the response to thermal stress in the field. Small encrusting colonies were most likely to maintain mass transfer and were therefore more likely to survive thermal stress than large branched colonies. We predict that an increase in the frequency and intensity of thermal stresses may see a shift from large branched coral colonies to both small colonies, and flat-massive colonies with low aspect ratios.
van Woesik, R.; Irikawa, A.; Anzai, R.; Nakamura, T.
2012-09-01
478
PubMed Central
In the recent past, there has been a dramatic increase in the incidence of methicillin-resistant Staphylococcus aureus (MRSA) infections, especially community-associated methicillin-resistant S. aureus (CA-MRSA) infections. Many media descriptions of MRSA are sensational and focus on its potential for severe disease and contagiousness. Our objective is to describe psychological and social morbidity associated with MRSA infection via a case series of five patients with CA-MRSA infection. We also analyze the resulting stigmatization associated with being diagnosed with MRSA infection. We learned that patients describe a variety of stigmatization related to their diagnosis of MRSA, including being shunned at home and in the workplace. Patients describe being asked by family, colleagues, and clients to take extraordinary measures to prevent MRSA transmission. Consequences of MRSA diagnoses have included erosion or termination of key personal and business relationships. In conclusion, stigmatization resulting from the diagnosis of MRSA can have profound personal and social morbidity. Media and public health awareness of MRSA infection needs to be balanced with information about how MRSA transmission is usually preventable with simple hygienic measures.
Mozzillo, Kristin L.; Ortiz, Nancy; Miller, Loren G.
2009-01-01
479
We studied possible host finding and resistance mechanisms of host colonies in the context of social parasitism by Cape honeybee (Apis mellifera capensis) workers. Workers often join neighboring colonies by drifting, but long-range drifting (dispersal) to colonies far away from the maternal nests also rarely occurs. We tested the impact of queenstate and taxon of mother and host colonies on
Peter Neumann; Sarah E. Radloff; Robin F. A. Moritz; H. Randall Hepburn; Sacha L. Reecea
2001-01-01
480
PubMed Central
The study of hematopoietic colony-forming units using semisolid culture media has greatly advanced the knowledge of hematopoiesis. Here we report that similar methods can be used to study pancreatic colony-forming units. We have developed two pancreatic colony assays that enable quantitative and functional analyses of progenitor-like cells isolated from dissociated adult (24 mo old) murine pancreas. We find that a methylcellulose-based semisolid medium containing Matrigel allows growth of duct-like Ring/Dense colonies from a rare (?1%) population of total pancreatic single cells. With the addition of roof plate-specific spondin 1, a wingless-int agonist, Ring/Dense colony-forming cells can be expanded more than 100,000-fold when serially dissociated and replated in the presence of Matrigel. When cells grown in Matrigel are then transferred to a Matrigel-free semisolid medium with a unique laminin-based hydrogel, some cells grow and differentiate into another type of colony, which we name Endocrine/Acinar. These Endocrine/Acinar colonies are comprised mostly of endocrine- and acinar-like cells, as ascertained by RNA expression analysis, immunohistochemistry, and electron microscopy. Most Endocrine/Acinar colonies contain beta-like cells that secrete insulin/C-peptide in response to D-glucose and theophylline. These results demonstrate robust self-renewal and differentiation of adult Ring/Dense colony-forming units in vitro and suggest an approach to producing beta-like cells for cell replacement of type 1 diabetes. The methods described, which include microfluidic expression analysis of single cells and colonies, should also advance study of pancreas development and pancreatic progenitor cells.
Jin, Liang; Feng, Tao; Shih, Hung Ping; Zerda, Ricardo; Luo, Angela; Hsu, Jasper; Mahdavi, Alborz; Sander, Maike; Tirrell, David A.; Riggs, Arthur D.; Ku, Hsun Teresa
2013-01-01
481
PubMed
During cheese ripening, micro-organisms grow as immobilised colonies, metabolising substrates present in the matrix which generate products triggered by enzymatic reactions. Local limitation rates of diffusion, either in the matrix or within the bacterial colonies, can be responsible for modulation in the metabolic and enzymatic activities of micro-organisms during ripening. How bacterial colonies immobilised in cheese are porous to these diffusing solutes has never been explored. The objective of this study was to determine if fluorescent dextrans of different sizes (4.4, 70 and 155 kDa) are able to penetrate through colonies of Lactococcus lactis LD61 immobilised in solid media, either agar or model cheese. Confocal microscopic observations showed that lactococcus colonies immobilised in these two media were porous to dextrans from 4 kDa to 155 kDa. However, the rate of diffusion of the solutes was faster inside the colonies immobilised in ultrafiltered-cheese than in agar when large dextrans were considered (?70 kDa). The colonial shape of the lactococcus strain was also shown to be lenticular in agar and spherical in the model cheese, indicating that the physical pressure exerted on the colony by the surrounding casein network was probably isotropous in the UF-cheese but not in agar. In both cases, the fact that lactococcus colonies immobilised in solid media are porous to large dextran solutes suggests that substrates or enzymes are likely also to be able to migrate inside the colonies during cheese ripening. PMID:23558188
Floury, J; Jeanson, S; Madec, M-N; Lortal, S
2013-03-01
482
PubMed
Weaver ants (Oecophylla smaragdina) are dominant ants in open forests from India, Australia, China and Southeast Asia, whose leaf nests are held together with larval silk. The species, together with its sole congener O. longinoda, has been important in research on biological control, communication, territoriality and colony integration. Over most of the range, only one queen has been found per colony, but the occurrence of several queens per nest has been reported for the Australian Northern Territory. The number of males mating with each queen is little known. Here we report on the colony structure of O. smaragdina using published and new microsatellite markers. Worker genotype arrays reflect the occurrence of habitual polygyny (more than one queen per colony) in 18 colonies from Darwin, Northern Australia, with up to five queens inferred per colony. Monogyny (one queen per colony) with occasional polygyny was inferred for 14 colonies from Queensland, Australia, and 20 colonies from Java, Indonesia. Direct genotyping of the sperm carried by 77 Queensland queens and worker genotypic arrays of established colonies yielded similar results, indicating that less than half of the queens mate only once and some mate up to five times. Worker genotype arrays indicated that queens from Java and the Northern Territory also often mate with more than one male, but less often than those from Queensland. A strong isolation-by-distance effect was found for Queensland samples. The variation uncovered means that O. smaragdina is a more versatile study system than previously supposed. PMID:19076274
Schlns, E A; Wegener, B J; Schlns, H; Azuma, N; Robson, S K A; Crozier, R H
2008-12-08
483
A simple technique for determining hydrophobic-hydrophilic properties of bacterial colonies surface, which involves putting a drop of liquid with known properties (e.g. water, oil) on their surface, has been described. This technique allows quick estimate of wettability of bacterial colony surface, i.e. its hydrophobic-hydrophilic properties. The behaviour of water drops on colonies of bacteria Bacillus five strains (of different types) has been studied. It was revealed that 1) orientation in the Earth gravity field during bacterial growth can define the form of colonies with hydrophobic surface; 2) the form and size of the colony are dependent on the extention ability, most probably, of the hydrophobic layer; 3) the Earth gravity field (gravity) serves as a 'pump' providing and keeping water within the colony. We suppose that at growing colonies on agar media the inflow of water-soluble nutrient materials takes place both due to diffusion processes and directed water current produced by the gravity. The revealed effect probably should be taken into consideration while constructing the models of colonies growing on dense nutrient media. The easily determined hydrophobic properties of colonies surface can become a systematic feature after collecting more extensive data on the surface hydrophobic-hydrophilic properties of microorganism colonies of other types and species.
Puzyr, A. P.; Tirranen, L. K.; Krylova, T. Y.; Borodina, E. V.
484
PubMed
In September of 2010, Brewer's Bay reef, located in St. Thomas (U.S. Virgin Islands), was simultaneously affected by abnormally high temperatures and the passage of a hurricane that resulted in the mass bleaching and fragmentation of its coral community. An outbreak of a rapid tissue loss disease among coral colonies was associated with these two disturbances. Gross lesion signs and lesion progression rates indicated that the disease was most similar to the Caribbean coral disease white plague type 1. Experiments indicated that the disease was transmissible through direct contact between colonies, and five-meter radial transects showed a clustered spatial distribution of disease, with diseased colonies being concentrated within the first meter of other diseased colonies. Disease prevalence and the extent to which colonies were bleached were both significantly higher on unattached colony fragments than on attached colonies, and disease occurred primarily on fragments found in direct contact with sediment. In contrast to other recent studies, disease presence was not related to the extent of bleaching on colonies. The results of this study suggest that colony fragmentation and contact with sediment played primary roles in the initial appearance of disease, but that the disease was capable of spreading among colonies, which suggests secondary transmission is possible through some other, unidentified mechanism. PMID:23437335
Brandt, Marilyn E; Smith, Tyler B; Correa, Adrienne M S; Vega-Thurber, Rebecca
2013-02-20
485
PubMed
Two juvenile hormone analogs (JHAs), pyriproxyfen and S-methoprene, were impregnated into dried tuna fish and fed to colonies of Monomorium pharaonis (L.) at very low concentrations (1.0, 2.0, 3.0, 4.0, and 5.0 microg/ml). Its effects on the production of sexuals and colonial growth were observed. Colonies treated with pyriproxyfen yielded sexuals with physical abnormalities. Both female and male sexuals developed bulbous wings, decreased melanization, and died shortly after emergence. Sexuals emerged from colonies treated with S-methoprene did not possess anomalous characteristics. Both pyriproxyfen and S-methoprene did not have significant effects on colonial growth because of the low concentrations of the baits. A commercial bait containing 0.3% S-methoprene (Bioprene-BM) also was evaluated for its efficacy on Pharaoh's ant colonies. Results showed that Pharaoh's ant colonies succumbed to the lethal effects of S-methoprene. Colony members were reduced significantly. Production of queens also decreased significantly in treated colonies and treated queens were unable to lay eggs. JHAs are slow acting and eliminate ant colonies at a relatively slow rate. At low concentrations, pyriproxyfen recorded baffling results, i.e., bulbous wings and demelanized exoskeleton, and it is vital that further studies are initiated to solidify these findings. PMID:16539147
Lim, S P; Lee, C Y
2005-12-01
486
PubMed
Colonial policies and practices were very instrumental in the creation of the Luo Diaspora. This Diaspora extended far beyond the physical and cultural boundaries of Central Nyanza as was constituted by the colonial administration. To colonial officials, this Diaspora represented "detribalized natives" responsible for social decay and immorality in the colonial townships. Similarly, to the male elders in the rural areas, this Diaspora was an affront towards destabilizing tribal authority and sanctions, which governed Luo moral order, Luo marriage, and Luo identity as it existed prior to colonialism. This article uses patriarchy as an analytical framework to understand how male elders and colonial officials collaborated to assert control over young women under suspicion of prostitution. The article argues that the Ramogi African Welfare Association (RAWA) was a post-war patriarchal institution which was used by male elders, with the encouragement of the colonial officials, to intimidate, harass and repatriate young women seeking wage employment within the emerging colonial townships. In this article, I use archival and field data gathered from Central Nyanza between 1999 and 2002 to illustrate how institutionalized patriarchy threatened many women and young girls seeking to migrate to colonial towns in order to exploit the limited economic and social opportunities that colonialism provided. PMID:20976983
Okuro, Samwel Ong'wen
2010-01-01
487
PubMed
Human embryonic stem cells (hESCs) self-renew indefinitely as highly organized pluripotent colonies. Unlike mouse pluripotent stem cell colonies, human colonies form a uniform, flat, epithelium-like monolayer. Interestingly, it has been reported that colony morphology is closely correlated with the maintenance of pluripotency. However, the molecular mechanisms that underlie human pluripotent colony formation and organization are poorly understood. In this study, we used real-time imaging tools to examine the in vitro colony formation of enzymatically dissociated single hESCs under feeder-free conditions. We demonstrate that colony formation consists of 4 stages: attachment, migration, aggregation, and colony formation, which are facilitated in an intracellular, calcium-dependent manner. Moreover, we found that blocking G(i)-coupled G protein-coupled receptor (GPCR) signaling results in enhanced cell-cell interactions and plays an integral role in promoting the survival of hESCs in culture. From the imaging results, we identified the conditions required for colony formation, and we identified the importance of blocking G(i)-coupled GPCR by pertussis toxin in modulating hESC colony formation and organization. These results will likely be useful for engineering hESCs to further study the mechanisms involved in their function. PMID:23075100
Kim, Jung Mo; Moon, Sung-Hwan; Park, Soon-Jung; Lee, Ha Young; Hong, Ki-Sung; Seo, Joseph; Bae, Yoe-Sik; Chung, Hyung-Min
2012-12-03
488
PubMed
The lifestyle of wild and laboratory yeast strains significantly differs. In contrast to the smooth colonies of laboratory strains, wild Saccharomyces cerevisiae strains form biofilm-like, strikingly structured colonies possessing distinctive traits enabling them to better survive in hostile environments in the wild. Here, comparing three sets of strains forming differently structured colonies (fluffy, semi-fluffy and smooth), each derived from ancestors with distinct genetic backgrounds isolated from natural settings (BR-88, BR-99 and BR-103), we specified the factors essential for the formation of structured colonies, i.e. for the lifestyle most likely to be preferred in the wild. The ability to form an abundant extracellular matrix (ECM) is one of the features typical for structured colonies. ECM influences colony architecture and many other physiological properties, such as the capability to retain water in a 2-fold surplus to wet cell biomass. ECM composition, however, differs among distinct strains, depending on their particular genetic background. We further show that the expression of certain genes (AQY1, FLO11) is also strictly related to the particular colony morphology, being highest in the most structured colonies. Flo11p adhesin, important for cell-cell and cell-surface adhesion, is essential for the formation of fluffy colonies and thus significantly contributes to the phenotype variability of wild yeast strains. On the other hand, surprisingly, neither the cell shape nor budding pattern nor the ability to form pseudohyphae directly influences the formation of three-dimensional fluffy colony architecture. PMID:20728557
St'ov?ek, Vratislav; Vchov, Libue; Kuthan, Martin; Palkov, Zdena
2010-08-20
489
PubMed
The existence of altruism in social insects is commonly attributed to altruistic individuals gaining indirect fitness through kin selection. However, recent studies suggest that such individuals might also gain direct fitness through reproduction. Experimental studies on primitive wood-dwelling termites revealed that colony fusion often causes the death of primary reproductives (queen and king), allowing opportunities for workers to inherit the nest by developing into replacement reproductives (neotenics). Therefore, colony fusion has been proposed as an important factor that may have favoured sociality in termites. However, whether colony fusion occurs frequently in natural populations of wood-dwelling termites remains an open question. We analysed eleven colonies of the wood-dwelling termite Kalotermes flavicollis (Kalotermitidae), using two mitochondrial and five nuclear microsatellite markers. Nine of eleven colonies (82%) were mixed families, with offspring of three or more primary reproductives. To our knowledge, this result represents the highest frequency of mixed-family colonies ever reported in termites. Moreover, genetic mixing of colonies appeared extreme in two ways. First, the number of haplotypes per colony was exceptionally high (up to nine), indicating that colonies were composed of multiple queens' offspring. Second, some mixed-family colonies included individuals belonging to two highly divergent genetic lineages. F-statistics and relatedness values suggest that mixed-family colonies most likely result from colony fusion, giving support to the accelerated nest inheritance theory. These findings raise important questions about the mode of foundation of mixed-family colonies and the evolutionary forces that maintain them within populations. PMID:23710754
Luchetti, A; Dedeine, F; Velon, A; Mantovani, B
2013-05-25
490
PubMed
In ants, young queens can found new colonies independently (without the help of workers) or dependently (with the help of workers). It has been suggested that differences in the mode of colony founding strongly influence queen survival and colony development. This is because independent queens are constrained to produce a worker force rapidly, before they deplete their body reserves and to resist the intense intercolony competition during the founding stage. By contrast, queens that found colonies dependently remain with the workers, which probably results in a lower mortality rate and earlier production of reproductive offspring. Consequently, in species that found independently, queens of incipient colonies are expected to produce mostly worker brood by laying a lower fraction of haploid (male) eggs than queens in mature colonies; such a difference would not occur in species founding dependently. We compared the primary sex ratio (proportion of male-determined eggs) laid by queens in incipient and mature colonies of two ant species Lasius nigerLinepithema humile, showing independent and dependent modes of colony founding, respectively. As predicted L. niger queens of incipient colonies laid a lower proportion of haploid eggs than queens from mature colonies. By contrast, queens of L. humile laid a similar proportion of haploid eggs in both incipient and mature colonies. These results provide the first evidence that (1) the primary sex ratio varies according to the mode of colony foundation, and (2) queens can adjust the primary sex ratio according to the life history stage of the colony in ants. Copyright 1999 The Association for the Study of Animal Behaviour. PMID:10049471
Aron; Passera
1999-02-01
491
\\u000a This paper presents an improvement ant colony optimization algorithm for mining classification rule called ACO-Miner. The\\u000a goal of ACO-Miner is to effectively provide intelligible classification rules which have higher predictive accuracy and simpler\\u000a rule list based on Ant-Miner. Experiments on data sets from UCI data set repository were made to compare the performance of\\u000a ACO-Miner with Ant-Miner. The results show
Ziqiang Wang; Boqin Feng
2004-01-01
492
NSDL National Science Digital Library
Emslie, Steven
493
Résumé Pendant la période de domination coloniale française, les réactions disparates et souvent contradictoires des missionnaires catholiques et des autorités françaises face aux religions non-catholiques ont été source de conflit dans la poursuite de leurs visions respectives de la “mission civilisatrice.” Cet article explore l’effet de l’émergence du Protestantisme sur les relations Église-État dans le Vietnam colonial. Même si l’Église
Charles Keith
2012-01-01
494
PubMed
A new continuum model for the growth of a single species biofilm is proposed. The geometry of the biofilm is described by the interface between the biomass and the surrounding liquid. Nutrient transport is given by the solution of a semi-linear Poisson equation. In this model we study the morphology of a chemotactic bacterial colony, which grows in the direction of increasing nutrient concentration. Numerical simulations using the level set method and finite difference schemes are presented. The results show rich heterogeneous morphology. PMID:15303740
Alpkvist, E; Overgaard, N Chr; Gustafsson, S; Heyden, A
2004-01-01
495
A concept for development of second generation 10 MWe prototype lunar power plant utilizing a gas cooled fission reactor supplying heated helium working fluid to two parallel 5 MWe closed cycle gas turbines is presented. Such a power system is expected to supply the energy needs for an initial lunar colony with a crew of up to 50 persons engaged in mining and manufacturing activities. System performance and mass details were generated by an author developed code (BRMAPS). The proposed pilot power plant can be a model for future plants of the same capacity that could be tied to an evolutionary lunar power grid.
Juhasz, Albert J.
2006-12-01
496
PubMed
In 1862 His Honor, Justice Johnston, issued his instructions to the jury of the New Zealand Supreme Court for two simultaneous rape trials the alleged rape of a European woman by two M?ori men, and an alleged assault with intent to commit a rape of a M?ori woman by a European man. This article argues that those instructions should be read within an historiographical critique of British colonial expansion, print capitalism and violence. Drawing on feminist postcolonial theorizing the question posed here, is, What is the historical, ideological context for a newspaper reporting of the possible rape of a M?ori woman in 1862? PMID:22059253
Erai, Michelle
2011-01-01
497
Ant Colony Optimization algorithms are population-based Stochastic Local Search algorithms that mimic the behavior of ants, simulating pheromone trails to search for solutions to combinatorial optimization problems. This paper introduces Population Variance, a novel approach to ACO algorithms that allows parameters to vary across the population over time, leading to solution construction differences that are not strictly stochastic. The increased exploration appears to help the search escape from local optima, significantly improving the robustness of the algorithm with respect to suboptimal parameter settings.
Matthews, David C.; Sutton, Andrew M.; Hains, Doug; Whitley, L. Darrell
498
SciTech Connect
This paper presents a summary of accomplishments at the Colonie FUSRAP Site in Fiscal Year 2002. During this period several significant milestones were achieved and have set the stage for the project to be completed in a more comprehensive manner, ahead of schedule and at a lower cost than the original Remedial Plan inherited from the Dept of Energy in 1997. Discussion of the DOE and subsequent USACE remedial plans is included along with summary level discussions of the key site infrastructure and remedial elements.
Sheeran, A. R.; Dufek, K.; Moore, J.
2003-02-26
499
PubMed Central
Much like other microorganisms, wild yeasts preferentially form surface-associated communities, such as biofilms and colonies, that are well protected against hostile environments and, when growing as pathogens, against the host immune system. However, the molecular mechanisms underlying the spatiotemporal development and environmental resistance of biofilms and colonies remain largely unknown. In this paper, we show that a biofilm yeast colony is a finely tuned, complex multicellular organism in which specialized cells jointly execute multiple protection strategies. These include a Pdr1p-regulated mechanism whereby multidrug resistance transporters Pdr5p and Snq2p expel external compounds solely within the surface cell layers as well as developmentally regulated production by internal cells of a selectively permeable extracellular matrix. The two mechanisms act in concert during colony development, allowing growth of new cell generations in a well-protected internal cavity of the colony. Colony architecture is strengthened by intercellular fiber connections.
Stovicek, Vratislav; Hlavacek, Otakar; Chernyavskiy, Oleksandr; Stepanek, Ludek; Kubinova, Lucie
2011-01-01
500
PubMed Central
Background Ant colony algorithm has emerged recently as a new meta-heuristic method, which is inspired from the behaviours of real ants for solving NP-hard problems. However, the classical ant colony algorithm also has its defects of stagnation and premature. This paper aims at remedying these problems. Results In this paper, we propose an adaptive ant colony algorithm that simulates the behaviour of biological immune system. The solutions of the problem are much more diversified than traditional ant colony algorithms. Conclusion The proposed method for improving the performance of traditional ant colony algorithm takes into account the polarization of the colonies, and adaptively adjusts the distribution of the solutions obtained by the ants. This makes the solutions more diverse so as to avoid the stagnation and premature phenomena.
Qin, Ling; Pan, Yi; Chen, Ling; Chen, Yixin
2006-01-01 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.48724061250686646, "perplexity": 8140.496081184094}, "config": {"markdown_headings": true, "markdown_code": false, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223201753.19/warc/CC-MAIN-20140423032001-00312-ip-10-147-4-33.ec2.internal.warc.gz"} |
https://www.eevblog.com/forum/programming/missing-a-new-kind-of-programing/?nowap;PHPSESSID=6roo48h3ulnojmfnba5lfcoqb2 | ### Author Topic: Missing a new kind of programing (Read 1224 times)
0 Members and 1 Guest are viewing this topic.
#### RoGeorge
• Super Contributor
• Posts: 3496
• Country:
##### Missing a new kind of programing
« on: October 19, 2021, 02:33:00 pm »
As a non-software developer, the type of programing languages looks like this to me, from simple to complex:
- 1. Machine level, where one puts numbers into a machine's memory, then the machine interpret those numbers as instructions or data. Nobody does this any more.
- 2. Assembly level, where one can write text mnemonics to be translated one to one into machine level, by a helping program called assembler. Mnemonics are easier to use than putting numbers in a memory.
- 3. Higher level programming languages, where one can use certain English words as keywords of the given programming language. The keywords are broken down into mnemonics by a compiler interpreted, depending the language.
At this point I'm tempting to split point 3. into
- 3.a. Procedural programming
- 3.b. Object oriented programming
- 3.c. Functional programming (I have never tried this yet)
However, from the perspective of a non software-dev, I do not care at all about programming languages, or programming paradigms, or other things like that. I only care about solving the problem I need to solve, but with the help of a computer. I'll put this as
- 5. Natural language description of how to solve the given problem
To give an example, it's very easy to use level 5, the natural language, and write something like:
Water-meter logger program:
- place a webcam to watch the water-meter under the sink
- at every minute take a snapshot of the water-meter
- use image recognition to identify the numbers captured in each photo
- turn the OCR digits into a number
- attach the timestamp to the reading and log that in a file
In natural language (level 5) it looks trivial, but to convert this into a program (level 3), it's not trivial, in the sense that translating from level 5 to 3 will need a lot of tedious work of handling all the details, and then it will need a lot of programming skills to implement, test and debug it all for a reliable level 3 program. When something is tedious or repetitive, it also means it can be handled in an automated way, by a computer.
There is a need for a level 4 that right now is missing, something to help with the automated translation between the natural language (level 5) and the programming level (level 3).
For now, instead of a level 4 language, we have armies of software devs, but it looks like all this translation from level 5 to 3 should be possible to be done in an automated way, just like the other automated translations between higher and lower levels of detail.
From what I see, there is a current attempt to skip a level 4 "language" entirely by using machine learning. The pitfall about this is ML produces fuzzy results, they need piles of data and in the end they can still mistake too often.
- Are there any other attempts for a language in between the natural language (level 5) and the programming language (level 3)?
- If not, what to use, or how to solve the translation from natural language once and for all (without externalizing the task to somebody else)?
#### tszaboo
• Super Contributor
• Posts: 5772
• Country:
• Current job: ATEX certified product design
##### Re: Missing a new kind of programing
« Reply #1 on: October 19, 2021, 02:54:43 pm »
If you have all the underlying programs or subroutines, you can program this with BASH or BAT, and pipe the output of one program to another. Or use any scripting language to do that. The only issue is that you need to translate this to something that the computer understands. And that should be fine. If we create a natural computer language, it will be ambiguous. And open possibilities of not working properly, because the user will say:
"Yo, Computer do a picture with the webby and doodle up what the numbers on that means, you know what I'm sayin"
#### ejeffrey
• Super Contributor
• Posts: 2724
• Country:
##### Re: Missing a new kind of programing
« Reply #2 on: October 19, 2021, 03:55:55 pm »
I don't really thing your hierarchy of program level is particularly illuminating.
The thing that makes higher level languages higher level is not that they use more english words as keywords. It is that they allow expressing higher level concepts directly. For instance:
"decrement register cx and jump to the start of the loop block unless c is zero"
is still very low level akin to assembly langauge even though it is written in english.
Code: [Select]
for (idx=0; idx<N; idx++) {}
Is (very) slightly higher level despite having more syntax and less natural-language like. Registers are abstracted by variables and the structure of the loop body is supported by the language natively
Code: [Select]
foreach idx in [0..N-1];
Is higher level yet: the loop increment and comparison operators are no longer explicit/arbitrary code, but invoke the concept of an iterator: this implies some sort of range object that encapsulates the "get next element" and "I'm done" behaviors, and the foreach syntax can then use any iterator to perform a loop.
Higher level language constructs allow applying operations directly on containers instead of using a loop, such as numpy ndarray operations that are automatically broadcast to match size. In this sense, shell programming (bash / csh / zsh) is very high level because it allows composing operations on entire files or data streams. Another way to go higher level is with object oriented programming where you can apply a generic operation such as "convert to string" to an object or a collection of objects and it is done in a data dependent fashion.
So your proposed level 5 program can be looked at in different ways. I would tend to ignore the natural language part of that, I don't think that is actually important. You have outlined 5 basic procedural steps. If those steps themselves have existing implementations, then you can already write code like this today.
What I think you are getting at is that you don't want to go and locate existing implementations of "configure the camera driver", "take a snapshot with the camera", "run OCR", and "log to file" but you want the compiler to figure that out and fill in the details. That is, of course, exceedingly hard, and it is hard whether you write the program in natural language or not. You are asking the computer to fill in the details from context and prior experience -- exactly what expert systems try to do with ML. I don't really understand what you think it should be doing *other* than ML for this task? Can you give an example of how programming with a proposed L4 language would work without being equivalent to ML? I can't see how the result would be anything but "fuzzy" given the ambiguity of the input?
#### dferyance
• Regular Contributor
• Posts: 153
##### Re: Missing a new kind of programing
« Reply #3 on: October 19, 2021, 04:22:38 pm »
Where there is some mechanical types of tasks in programming, the vast majority of it is not mechanical. Mathematicians have been studying computation before electronic computers exist.
Natural language: computer, determine if the collatz conjecture is true.
Natural language: computer, given a list of cities and the distances between each pair of cities, what is the shortest possible route that visits each city exactly once and returns to the origin city?
Natural language: Give me a video editing program that is better than Adobe
Natural language: Give me a slack competitor that is easier to use
Most of programming is either engineering or math. No one has figured out how to automate this. While ML is incredible, ML doesn't do this either.
#### Nominal Animal
• Super Contributor
• Posts: 3223
• Country:
##### Re: Missing a new kind of programing
« Reply #4 on: October 19, 2021, 05:24:50 pm »
You want to work at the level of ideas.
Problem is, ideas are just the end result. All the art is in the implementation and logic. You want the end result, but not learn the art, because you don't think there is anything worth your effort there.
"Do what I want" is not a program. It is a desire. Even "Webcam, take a picture" is a nontrivial command, if you have multiple webcams connected to the same computer. And even with a single webcam, what resolution should the webcam use? What compression settings? Brightness, contrast? Should 50Hz/60Hz mains flicker filtering be enabled? Where should the image be saved?
Or should 640k of RAM the defaults suffice for everybody?
It saddens me that the true art, the beauty and art of crafting the structure and logic one can rely on, regardless of exact programming language or paradigm used, is so relegated to "useless stuff a computer should be able to handle" status. Seriously.
Also explains why most "programmers" today know nothing about software engineering, and are simply monkeys throwing spaghetti at the wall to see what sticks, leaving the end users to deal with the resulting mess. As long as it looks shiny and "artistic", they're happy.
Here, have a banana on me.
The following users thanked this post: george.b, Jan Audio
#### SiliconWizard
• Super Contributor
• Posts: 8297
• Country:
##### Re: Missing a new kind of programing
« Reply #5 on: October 19, 2021, 06:35:05 pm »
Agree with the above.
Code: [Select]
Water-meter logger program:- place a webcam to watch the water-meter under the sink- at every minute take a snapshot of the water-meter- use image recognition to identify the numbers captured in each photo- turn the OCR digits into a number- attach the timestamp to the reading and log that in a file
First issue there is that actually none of the points above even unambiguously means the same thing to two different people. Let alone to a machine.
The basic issue is that most of what seems "obvious" to each of us actually is only for each of us. Conveying even simple ideas to others without any ambiguity is hard enough, but imagining to be able to do just that to a machine and get the results we "want"? That's just unrealistic.
That said, that doesn't prevent some from trying. These days, of course, AI is on the top of the list for that. But that kind of workflow, even if it eventually half works, is likely going to be a very frustrating experience.
#### Siwastaja
• Super Contributor
• Posts: 4835
• Country:
##### Re: Missing a new kind of programing
« Reply #6 on: October 19, 2021, 07:07:37 pm »
The lack of "4" has been recognized and resulted in some disasters, such as UML.
In my opinion, any level that can be simply machine converted into "level 3", is unnecessary. If it seems necessary, there are a few possible root causes that could be fixed without introducing "level 4":
1) Developers of "level 3" are incompetent; or writers of "level 5" spec are incompetent; or both. In any of these cases, adding another level does not help the slightest.
2) Communication between "level 5" and "level 3" fails. Add another layer of abstraction and already bad communication completely stops.
3) "level 5" specification is so messed up it can't be implemented on "level 3". Adding "level 4" does not solve this,
4) Programming language/paradigms chosen on "level 3" are really too low level for the task, making it appear that "level 4" is needed. In reality, level 3 tools must be good enough to be usable for the team to translate "level 5" into code. (I don't think this happens very often although people are tempted to think in terms like "C is too low level to be usable on nearly any project".)
5) "Level 5" specification is too hand-wavy and abstract.
6) "Level 5" specification is too detailed and implementation-oriented and hard to translate into "level 3" code because the assumptions of how programming paradigms work are incorrect.
This isn't an easy problem but I'm almost sure adding another layer is rarely the right thing to do. Programmers ("level 3") must be trusted to understand the actual problem and work towards a good product, not just do mechanical translation; OTOH, specification ("level 5") must be perfectly understandable to said programmers, yet leave them enough room for implementation details. If you try to make the spec "directly translatable" to code, then you are just inventing yet another high-level language. It's not the purpose of high-level spec.
« Last Edit: October 19, 2021, 07:11:21 pm by Siwastaja »
#### Just_another_Dave
• Regular Contributor
• Posts: 184
• Country:
##### Re: Missing a new kind of programing
« Reply #7 on: October 19, 2021, 07:51:10 pm »
The lack of "4" has been recognized and resulted in some disasters, such as UML.
In my opinion, any level that can be simply machine converted into "level 3", is unnecessary. If it seems necessary, there are a few possible root causes that could be fixed without introducing "level 4":
1) Developers of "level 3" are incompetent; or writers of "level 5" spec are incompetent; or both. In any of these cases, adding another level does not help the slightest.
2) Communication between "level 5" and "level 3" fails. Add another layer of abstraction and already bad communication completely stops.
3) "level 5" specification is so messed up it can't be implemented on "level 3". Adding "level 4" does not solve this,
4) Programming language/paradigms chosen on "level 3" are really too low level for the task, making it appear that "level 4" is needed. In reality, level 3 tools must be good enough to be usable for the team to translate "level 5" into code. (I don't think this happens very often although people are tempted to think in terms like "C is too low level to be usable on nearly any project".)
5) "Level 5" specification is too hand-wavy and abstract.
6) "Level 5" specification is too detailed and implementation-oriented and hard to translate into "level 3" code because the assumptions of how programming paradigms work are incorrect.
This isn't an easy problem but I'm almost sure adding another layer is rarely the right thing to do. Programmers ("level 3") must be trusted to understand the actual problem and work towards a good product, not just do mechanical translation; OTOH, specification ("level 5") must be perfectly understandable to said programmers, yet leave them enough room for implementation details. If you try to make the spec "directly translatable" to code, then you are just inventing yet another high-level language. It's not the purpose of high-level spec.
UML is complex enough to have a significant probability of not being enough well understood by the specification writer or the programmer. I think that may be caused by its objective of being a general purpose specification standard, which leads to the need of many different diagram types. However, domain specific specification standards like Grafcet are more useful in my experience.
The same thing happens with graphical programming languages. They’re useful for describing signal processing algorithms or communications at a high level (for example, Simulink), but using them for relatively low level programming (as programming the insides of functions) can lead to a mess too quickly
#### golden_labels
• Frequent Contributor
• Posts: 469
• Country:
##### Re: Missing a new kind of programing
« Reply #8 on: October 19, 2021, 08:26:59 pm »
What if there is no level 4? Not “is not implemented”, but it is impossible for it to exist? There is no gap to fill between level 3 and level 5, if level 5 is not even in the sequence.
The presented picture suggests a progression, with “level 5” being merely a continuation of that series. But I don’t think it’s like that. What you have marked from 1 to 3 differs in how detailed the description is, but each of those levels is dealing with the same qualities. It’s all information about how different elements of a computing platform should operate together, in technical meaning, to obtain the result. “Level 5” on the other hand is conceptually different. It has little to do with computing. Instead, it describes a human-perceived outcome. The relevant sequence preceding “level 5” are not computer languages, but levels of progressively stricter natural language, going down to purely mathematical, abstract expressions.
What you are asking for is not a new level of detail, but a translator between two different domains. It’s not a translation between different ways of expressing the same thing, but finding mappings between different concepts. This is why that is being done by humans and not simple processors: such a translation requires fair bit of comprehension of both domains, along with intelligence and experience to find the proper solution. DSLs are providing primitive translation, but that’s because they already encapsulate expert knowledge placed there by a human. And recent AI-based solutions are trying to replicate humans’ task.
That is not different than problems you face in electronics. Imagine I asked you to design me a circuit that boosts bass. That request is not a high level description of an electronic system: in electronics you do not have the idea of bass sound. You first need to map that to the domain of signal processing, where you model the problem in the relevant terms. But that is still an abstract description, as electronic circuits do not work with signals either. So you must make another leap, throwing a bunch of electronic components together to achieve the equivalent effect. The sequence, which you have proposed, would in this case be moving between getting an equalizer IC, using a few op-amps and passives, or soldering together transistors and winding your own capacitors. The original question of boosting bass is by no means just a continuation of that sequence.
Dihydrogen monoxide was responsible for Fukushima, Chernobyl and TMI disasters
Worth watching: Calling Bullshit — protect your friends and yourself from bullshit!
#### rstofer
• Super Contributor
• Posts: 8821
• Country:
##### Re: Missing a new kind of programing
« Reply #9 on: October 19, 2021, 10:43:48 pm »
If you have all the underlying programs or subroutines, you can program this with BASH or BAT, and pipe the output of one program to another. Or use any scripting language to do that. The only issue is that you need to translate this to something that the computer understands. And that should be fine. If we create a natural computer language, it will be ambiguous. And open possibilities of not working properly, because the user will say:
"Yo, Computer do a picture with the webby and doodle up what the numbers on that means, you know what I'm sayin"
Or even something simple like "time flies". Which word is the noun and which is the verb?
The English language is ambiguous. I suspect the other spoken languages are as well.
#### DiTBho
• Super Contributor
• Posts: 1122
• Country:
##### Re: Missing a new kind of programing
« Reply #10 on: October 19, 2021, 10:49:40 pm »
"Programs must be written for people to read, and only incidentally for machines to execute.
but, talk is cheap. Show me the code
"
( )
#### Doctorandus_P
• Super Contributor
• Posts: 1872
• Country:
##### Re: Missing a new kind of programing
« Reply #11 on: October 29, 2021, 12:37:07 pm »
Time flies like an arrow.
Fruit flies like a banana.
#### jpanhalt
• Super Contributor
• Posts: 1442
• Country:
##### Re: Missing a new kind of programing
« Reply #12 on: October 29, 2021, 02:31:18 pm »
@RoGeorge
Are you looking for a graphical programming language? ( https://en.wikipedia.org/wiki/Visual_programming_language ). Flowcode is one, but there are others.
I have never used any of them. When something is complex, I may do a flowchart, then convert that to Assembly. Over the years, one accumulates their own libraries to make the conversion easier.
#### NorthGuy
• Super Contributor
• Posts: 2693
• Country:
##### Re: Missing a new kind of programing
« Reply #13 on: October 29, 2021, 04:15:36 pm »
Water-meter logger program:
- place a webcam to watch the water-meter under the sink
- at every minute take a snapshot of the water-meter
- use image recognition to identify the numbers captured in each photo
- turn the OCR digits into a number
- attach the timestamp to the reading and log that in a file
If you show this to an engineer he'll immediately tell you that you'd be better off installing your own computer-readable meter in series and use it for monitoring. This is because the engineer can think. The compiler cannot.
#### RoGeorge
• Super Contributor
• Posts: 3496
• Country:
##### Re: Missing a new kind of programing
« Reply #14 on: October 29, 2021, 04:33:53 pm »
Are you looking for a graphical programming language?
Not really, I consider graphical programming to be at the same level as text compilers (same for libraries, or dedicated software). Preferably would be to exist something of a much higher abstraction level, so to get rid of managing all the details a programming language is requiring now.
« Last Edit: October 29, 2021, 04:35:45 pm by RoGeorge »
#### Just_another_Dave
• Regular Contributor
• Posts: 184
• Country:
##### Re: Missing a new kind of programing
« Reply #15 on: October 29, 2021, 09:41:23 pm »
@RoGeorge
Are you looking for a graphical programming language? ( https://en.wikipedia.org/wiki/Visual_programming_language ). Flowcode is one, but there are others.
I have never used any of them. When something is complex, I may do a flowchart, then convert that to Assembly. Over the years, one accumulates their own libraries to make the conversion easier.
For high level signal processing programs graphical programming languages can be useful, as they are quite similar to a schematic, but for implementing low level routines they can be a nightmare to debug. In particular, Simulink is useful for programming regulators, but it is quite expensive
#### hli
• Regular Contributor
• Posts: 232
• Country:
##### Re: Missing a new kind of programing
« Reply #16 on: November 03, 2021, 07:42:22 pm »
The problem is, that even your 5th level (natural programming) is still _programming_. Which means it needs at least:
• decision support (IF/ELSE)
• loops (at least something like WHILE)
• storing data (variables or values of some kind)
• arithmetic
• input / output
• and for larger programs support for abstractions / structuring the logic (e.g. sub-routines)
I would say that most programming languages just differ in the last part - how they allow / support you how to structure your logic. Apart from that it does not really matter how you present that to the user - there will be the complexity of your actual problem, and you cannot make that go away.
One can simplify by reducing the capabilities presented to the user, e.g.
• removing control structures / structure support, and you get something like Excel
• provide only simple flows (e.g. business process notation)
• specialize to specific problem areas (e.g. statistics, such as R)
Using natural language adds the problem of not being specific enough - most of what you express in regular speach can have multiple meanings.
The following users thanked this post: Just_another_Dave
Smf | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3054512143135071, "perplexity": 2044.4566871819613}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303779.65/warc/CC-MAIN-20220122073422-20220122103422-00187.warc.gz"} |
https://rpg.stackexchange.com/questions/131771/can-i-choose-each-time-i-cast-a-rote-block-whether-the-effect-works-as-block-str | # Can I choose each time I cast a rote block whether the effect works as block strength, Armor, or a zone border?
As a wizard with Great (+4) Conviction and Discipline, I can have the following rote spell:
Type: Earth evocation, defensive block
Power: 4 shifts
Duration: One exchange
Can I choose each time I cast the spell whether the effect works as block strength, Armor, or a zone border (YS, p. 252)? A rote spell "always manifests in exactly the same way each time" (YS, p.257), but I'm not entirely sure what counts as "the parameters of the spell".
## How you spend Shifts, including if they're applied as a Block or Armor, constitute 'parameters'.
Your Rote must either be an earthen Armor or attempt to fully Block a type of action. You can always roll for the other, or establish a second Rote for the other effect.
Parameter isn't a defined game term, so defaulting to general English,
a numerical or other measurable factor forming one of a set that defines a system or sets the conditions of its operation
We can see that measuring your Block or Armor will change and as you noted (emphasis added),
Any change in the parameters of the spell disqualifies it from being a rote. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5874106287956238, "perplexity": 3256.848365531472}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540532624.3/warc/CC-MAIN-20191211184309-20191211212309-00060.warc.gz"} |
https://open.kattis.com/problems/luhnchecksum | Kattis
# Luhn's Checksum Algorithm
In 1954, Hans Peter Luhn, a researcher at IBM, filed a patent describing a simple checksum algorithm for numbers written as strings of base-$10$ digits. If a number is chosen according to Luhn’s technique, the algorithm provides a basic integrity check. This means that with reasonably high probability it can detect whether one or more digits have been accidentally modified. (On the other hand, it provides essentially no protection against intentional modifications.) Most credit card and bank card numbers can be validated using Luhn’s checksum algorithm, as can the national identification numbers of several countries (including Canada).
Given a number $n = d_ k d_{k-1} \ldots d_2 d_1$, where each $d_ i$ is a base-$10$ digit, here is how to apply Luhn’s checksum test:
1. Starting at the right end of $n$, transform every second digit $d_ i$ (i.e., $d_2, d_4, d_6, \ldots$) as follows:
• multiply $d_ i$ by $2$
• if $2 \cdot d_ i$ consists of more than one digit, i.e., is greater than 9, add these digits together; this will always produce a single-digit number
2. Add up all the digits of $n$ after the transformation step. If the resulting sum is divisible by $10$, $n$ passes the Luhn checksum test. Otherwise, $n$ fails the Luhn checksum test.
For example, consider the number $n = 1234567890123411$ from Sample Input 1. The first row of Figure 1 gives the original digits of $n$, and the second row contains the digits of $n$ after the transformation step, with transformed digits shown in bold. The sum of the digits in the second row is
$2+2+6+4+1+6+5+8+9+0+2+2+6+4+2+1=60$
and since $60$ is divisible by $10$, $n$ passes the Luhn checksum test.
$1$ $2$ $3$ $4$ $5$ $6$ $7$ $8$ $9$ $0$ $1$ $2$ $3$ $4$ $1$ $1$ $\mathbf{2}$ $2$ $\mathbf{6}$ $4$ $\mathbf{1}$ $6$ $\mathbf{5}$ $8$ $\mathbf{9}$ $0$ $\mathbf{2}$ $2$ $\mathbf{6}$ $4$ $\mathbf{2}$ $1$
Figure 1: Application of Luhn’s algorithm to $n = 1234567890123411$
## Input
The first line of input contains a single integer $T$ $(1 \leq T \leq 100)$, the number of test cases. Each of the following $T$ lines contains a single test case consisting of a number given as a string of base-$10$ digits (09). The length of each string is between $2$ and $50$, inclusive, and numbers may have leading (leftmost) zeros.
## Output
For each test case, output a single line containing “PASS” if the number passes the Luhn checksum test, or “FAIL” if the number fails the Luhn checksum test.
Sample Input 1 Sample Output 1
3
00554
999
1234567890123411
PASS
FAIL
PASS | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8434697985649109, "perplexity": 579.5285556176115}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00037.warc.gz"} |
https://www.atlantis-press.com/proceedings/amcce-18/25895709 | # Prediction of welding shrinkage deformation of bridge steel box girder based on Wavelet Neural Network
Authors
Yulong Tao, Yunshui Miao, Jiaqi Han, Feiyun Yan
Corresponding Author
Yulong Tao
Available Online May 2018.
DOI
https://doi.org/10.2991/amcce-18.2018.75How to use a DOI?
Keywords
Bridge Steel Box Girder, Wavelet Neural Network, Prediction Method
Abstract
Aiming at the low accuracy of traditional forecasting methods such as linear regression method, this paper presents a prediction method for predicting the relationship between bridge steel box girder and its displacement with wavelet neural network. Compared with traditional forecasting methods, this scheme has better local characteristics and learning ability, which greatly improves the prediction ability of deformation. Through analysis of the instance and found that after compared with the traditional prediction method based on wavelet neural network, the rigid beam deformation prediction accuracy is higher, and is superior to the BP neural network prediction results, conform to the actual demand of engineering design.
Open Access
Proceedings
2018 3rd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2018)
Part of series
Publication Date
May 2018
ISBN
978-94-6252-508-5
ISSN
2352-5401
DOI
https://doi.org/10.2991/amcce-18.2018.75How to use a DOI?
Open Access
TY - CONF
AU - Yulong Tao
AU - Yunshui Miao
AU - Jiaqi Han
AU - Feiyun Yan
PY - 2018/05
DA - 2018/05
TI - Prediction of welding shrinkage deformation of bridge steel box girder based on Wavelet Neural Network
BT - 2018 3rd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2018)
PB - Atlantis Press
SN - 2352-5401
UR - https://doi.org/10.2991/amcce-18.2018.75
DO - https://doi.org/10.2991/amcce-18.2018.75
ID - Tao2018/05
ER - | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.17848432064056396, "perplexity": 8349.191508531007}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510287.30/warc/CC-MAIN-20200403030659-20200403060659-00140.warc.gz"} |
https://www.physicsforums.com/threads/dynamic-suspension-emergency.256448/ | # Dynamic Suspension Emergency!
1. Sep 15, 2008
### blue-steel
Hi all,
(see the attached images)
working on a dynamics project about the suspension system in a bike, we have been given a 4 bar linkage - dynamic system, and im trying to find the velocity of POINT C and POINT F, but given in terms of the angular velocity of bar AB in the STATIC POSITION the solid grey position, the other 'shadow' image is the linkage at it's deflected image,
the 2 images attached show a diagram of the system, Point C represents the centre of the back wheel, all black circles are pivot points, the second gives the coordinates of the points in the two positions
what im workin on so far is the relative velocity relationship, Vc = Vb + Vc/b to find Vc, only problem is this (ultimately) involves omega_BC when the final value for Vc should only involve omega_AB
should look something like this
anyone familiar with similar problem or have any advice on how to go about it would greatly appreciate it
Cheers
blue steel
#### Attached Files:
File size:
30.1 KB
Views:
52
• ###### bicyclecoordinates.JPG
File size:
33.2 KB
Views:
46
2. Sep 16, 2008
### MikeLizzi
I suppose there are lots of ways to approach this problem. Here's mine.
I would start by redrawing the picture. Leave out the spring and E-G. Redraw B-C-D as a straight bar B-D. (You loose point C but that can be added later.) Now you have four unequal bars pined at their four corners. A-E is vertical. A-B is horizontal. Now consider a small rotation of bar A-B while holding A-E fixed. Can you calcualte the required rotation of E-D? Its messy geometry but you should be able to get that angule of E-D as a function of the angle of A-E.
Once you’ve done that you can calculate the angular velocity of E-D as a function of the angular velocity of A-E. Then you can calculate the linear velocity of any point in bar E-D. That gives you the velocity of point F and D.
Now replace bar B-D with the original B-C-D. You know the velocity at points B and D. Do you know how to use that info to calculate the velocity at C?
3. Sep 16, 2008
### blue-steel
Thanks a lot, the thing I was getting confused with most was the 'bent link' BCD but since all points on it travel with the same angular velocity the simplification BD worked
Cheers | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8353976011276245, "perplexity": 1393.200500880797}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823229.49/warc/CC-MAIN-20171019050401-20171019070401-00611.warc.gz"} |
https://bitbucket.org/unbit/pypy | pypy
Bitbucket is a code hosting site with unlimited public and private repositories. We're also free for small teams!
Close
PyPy: Python in Python Implementation
Welcome to PyPy!
PyPy is both an implementation of the Python programming language, and an extensive compiler framework for dynamic language implementations. You can build self-contained Python implementations which execute independently from CPython.
http://pypy.org/
If you want to help developing PyPy, this document might help you:
http://doc.pypy.org/
It will also point you to the rest of the documentation which is generated from files in the pypy/doc directory within the source repositories. Enjoy and send us feedback!
the pypy-dev team <[email protected]>
Building
build with:
rpython/bin/rpython -Ojit pypy/goal/targetpypystandalone.py
This ends up with pypy-c binary in the main pypy directory. We suggest to use virtualenv with the resulting pypy-c as the interpreter, you can find more details about various installation schemes here:
http://doc.pypy.org/en/latest/getting-started.html#installing-pypy
Recent activity
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.17108048498630524, "perplexity": 9782.6186338738}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609524259.30/warc/CC-MAIN-20140416005204-00647-ip-10-147-4-33.ec2.internal.warc.gz"} |
https://monica.com.au/t46xy/pycryptodome-rsa-encrypt-10dd5a | For instance, authenticity is also provided by Message Authentication Codes, and some can be built using digests, so they are included in the Crypto.Hash package (example: HMAC). This OID often indicates authentication (digital signature). socket transmission and encryption protocols. PyCryptodome; Features; Installation. If None (default), the behavior depends on format: Specifying a value for protection is only meaningful for PKCS#8 In certain cases, there is some overlap between these categories. Parameters: key (RSA key object) â The key object to use to encrypt or decrypt the message.Decryption is only possible with a private RSA key. e*d &\equiv 1 ( \text{mod lcm} [(p-1)(q-1)]) \\ first, and with that the rest of the file: # let's assume that the key is somehow available again, # Encrypt the session key with the public RSA key, # Encrypt the data with the AES session key, # Decrypt the session key with the private RSA key, # Decrypt the data with the AES session key. The cryptographic strength is primarily linked to the length of the RSA modulus n. Requires the PyCryptodome module but is imported as Crypto""" from hashlib import sha512 from Crypto.Cipher import PKCS1_OAEP from Crypto.Cipher import AES from Crypto.PublicKey import RSA from Crypto.Random import get_random_bytes def generate_keys(): """ Generates the rsa ⦠why not show a rsa signature. simplifying socket data stream cryptography using RSA public keys and AES data encryption, using PyCryptodome cryptographic primitives Specifying a value for protectionis only meaningful for PKCS#8(that is, pkcs=8) and only if a pass phrase is present too. Is it possible to encrypt a message with a private key in python using pycryptodome or any other library? The receiver has the private RSA key. RSA Encrypt / Decrypt - Examples. two non-strong probable primes. to sign you would create a digest and encrypt it using the private key using a padding scheme e.g. The encryption uses rsa but the signature example uses dsa without explaining dsa. The following formats are supported for an RSA public key: The following formats are supported for an RSA private key: For details about the PEM encoding, see RFC1421/RFC1423. Encryption algorithm¶. called mykey.pem, and then read it back: The algorithm closely follows NIST FIPS 186-4 in its For more information, withstood attacks for more than 30 years, and it is therefore considered Decryption is only possible if key is a private RSA key. If not specified, Crypto.Hash.SHA1 is used. Failure to do so may lead to security vulnerabilities. We use RSA with PKCS#1 OAEP for asymmetric encryption of an AES session key. PyCryptodome can be used as: 1. a … The modulus is the product of n_bin_size = 1024 e = 65537 key = RSA.generate(n_bin_size, None, e) # RsaKey object public_key = key.publickey().exportKey('PEM') print(str(len(public_key))) conn.send(public_key) The server gets the private key and uses it to encrypt a session key: reasonably secure for new designs. (PrivateKeyInfo). p*q &= n \\ Its security is based on the difficulty to solve discrete logarithms on the field defined by specific equations computed over a curve. The items come in the following order: ValueError â when the key being imported fails the most basic RSA validity checks. exported in the clear! As in the first example, we use the EAX mode to allow detection of unauthorized modifications. It is based on MD5 for key derivation, and Triple DES for encryption. Implement RSA cryptography (key generation, encryption, decryption) using any Python Cryptography Library. Encryption algorithm¶. You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example. Since we want to be able to encrypt an arbitrary amount of data, we use a hybrid encryption scheme. This page lists the low-level primitives that PyCryptodome provides. AES is very fast and secure, and it is the de facto standard for symmetric encryption. There are Python libraries that provide cryptography services: M2Crypto, PyCrypto, pyOpenSSL, python-nss, and Botan’s Python bindings. socket transmission and encryption protocols. You are expected to have a solid understanding of cryptography and security engineering to successfully use them. At the end, the code prints our the RSA public key in ASCII/PEM format: The following code reads the private RSA key back in, and then prints again the public key: The following code generates public key stored in receiver.pem and private key stored in private.pem. ; randfunc (callable) – Function that return random bytes.The default is Crypto.Random.get_random_bytes(). ValueError â when the format is unknown or when you try to encrypt a private hashAlgo (hash object) â The hash function to use.This can be a module under Crypto.Hash or an existing hash object created from any of such modules. Its keys are 64 bits long, even though 8 bits were used for integrity (now they are ignored) and do not contribute to security. The algorithm can be used for both confidentiality (encryption) and (For private keys only) The following code generates a new RSA key pair (secret) and saves it into a file, protected by a password. RSA public-key cryptography algorithm (signature and encryption). Sadly PyCrypto’s development stopping in 2012. The security of the ElGamal encryption scheme is based on the computational Diffie-Hellman problem ().Given a cyclic group, a generator g, and two integers a and b, it is difficult to find the element $$g^{ab}$$ when only $$g^a$$ and $$g^b$$ are known, and not a and b.. As before, the group is the largest multiplicative sub-group of the integers modulo p, with p prime. It is worth noting that signing and In case of a private key, the following equations must apply: A tuple of integers, with at least 2 and no RSA Encryption / Decryption - Examples in Python Now let's demonstrate how the RSA algorithms works by a simple example in Python. # encrypt the message using RSA-OAEP encryption scheme (RSA with PKCS#1 OAEP padding) with the RSA public key # msg = b'A message for encryption' f = open("plaintext.txt", "r") The following are 30 code examples for showing how to use rsa.encrypt().These examples are extracted from open source projects. Normally you’d sign and then encrypt anyway. ; Returns: A cipher object PKCS115_Cipher. A self-contained cryptographic library for Python. Object ID for the RSA encryption algorithm. simple PKCS#1 structure (RSAPrivateKey). Encrypt data with RSA¶ The following code encrypts a piece of data for a receiver we have the RSA public key of. see the most recent ECRYPT report. Contribute to Legrandin/pycryptodome development by creating an account on GitHub. Contribute to Legrandin/pycryptodome development by creating an account on GitHub. At the other end, the receiver can securely load the piece of data back (if they know the key!). For DER and PEM, an ASN.1 DER SubjectPublicKeyInfo The public exponent e must be odd and larger than 1. The … also this is a deprecated library as others have stated. serializing the key. The RSA public key is stored in a file called receiver.pem. Expert Answer . Use generate(), construct() or import_key() instead. I know that you are not supposed to encrypt with the private key and decrypt with the public key, but my purpose is to encrypt with the private one so the receiver could be sure that the message was send by the real author. If you donât provide a pass phrase, the private key will be The encrypted key is encoded according to PKCS#8. Parameters: ciphertext (byte string, long or a 2-item tuple as returned by encrypt) - The piece of data to decrypt with RSA.It may not be numerically larger than the RSA module (n).If a tuple, the first item is the actual ciphertext; the second item is ignored. Construct an RSA key from a tuple of valid RSA components. Decryption always takes place with blinding. Return type: bytes: Raises: ValueError – if the message is too long. passphrase (string) â In case of an encrypted private key, this is the pass phrase from which the decryption key is derived. decryption are significantly slower than verification and encryption. # python3: from Crypto. We use the EAX mode because it allows the receiver to detect any p*u &\equiv 1 ( \text{mod } q) more than 6 items. PublicKey import RSA: from sys import argv # usage: python3 encrypt.py "password" # output will be a file "rsa_key.bin" created in the same folder that you can keep in your application and use the decrypt function to authenticate password. We use the scrypt key derivation function to thwart dictionary attacks. a generic RSA key, even when such key will be actually used for digital For instance, if you use RSA 2048 and SHA-256, the longest message you can encrypt is 190 byte long. fork of PyCrypto that has been enhanced to add more implementations and fixes to the original PyCrypto library The below code will generate random RSA key-pair, will encrypt a short message and will decrypt it back to its original form, using the RSA-OAEP padding scheme. The following code encrypts a piece of data for a receiver we have the RSA public key of. with random bases and a single Lucas test. Decrypt a piece of data with RSA. A Mac is used as the client, while a Raspberry Pi is used as the server. sections B.3.1 and B.3.3. Create an RSA … These files will be used in the examples below. GitHub Gist: instantly share code, notes, and snippets. They will use it to decrypt the session key pkcs#2.1. With pkcs=1 (default), the private key is encoded in a Class defining an actual RSA key. encoding, there is an inner ASN.1 DER structure. simplifying socket data stream cryptography using RSA public keys and AES data encryption, using PyCryptodome cryptographic primitives. signatures. Both RSA ciphertexts and RSA signatures are as large as the RSA modulus n (256 RSA is the most widespread and used public key algorithm. The installation procedure depends on the package you want the library in. Contribute to Legrandin/pycryptodome development by creating an account on GitHub. using. We use RSA with PKCS#1 OAEP for asymmetric encryption of an AES session key. First, install the pycryptodome package, which is a powerful Python library of low-level cryptographic primitives … Let's demonstrate in practice the RSA sign / verify algorithm. In real applications, you always need to use proper cryptographic padding, and you should not directly encrypt data with this method. The below code will generate random RSA key-pair, will encrypt a short message and will decrypt it back to its original form, using the RSA-OAEP padding scheme. ... Object ID_ for the RSA encryption algorithm. def encrypt(self, plaintext, K): raise NotImplementedError("Use module Crypto.Cipher.PKCS1_OAEP instead") Note that the code generates a ValueError exception when tampering is detected. based on the difficulty of factoring large integers. PyCryptodome is a self-contained Python package of low-level cryptographic primitives. Pycryptodome is working alternative of it, but unfortunately it doesn't support plain RSA cryptography. Five criteria can be evaluated when you try to … Attention: this function performs the plain, primitive RSA encryption (textbook). The module Crypto.PublicKey.RSA provides facilities for generating new RSA keys, but that’s by the by. The following are 30 code examples for showing how to use Crypto.PublicKey.RSA.generate().These examples are extracted from open source projects. Since we want to be able to encrypt an arbitrary amount of data, we use a hybrid encryption scheme. AES¶. You must also be able to recognize that some primitives are obsolete (e.g. PyCryptodome is a fork of PyCrypto. Returns: an RSA key object (RsaKey, with private key). The RSA public key is stored in a file called receiver.pem. encryption modes like GCM, CCM or SIV). The algorithm has withstood attacks for 30 years, and it is therefore considered reasonably secure for new designs. Each prime passes a suitable number of Miller-Rabin tests The private key may be encrypted by means of a certain pass phrase either at the PEM level or at the PKCS#8 level. The security of the ElGamal encryption scheme is based on the computational Diffie-Hellman problem ().Given a cyclic group, a generator g, and two integers a and b, it is difficult to find the element $$g^{ab}$$ when only $$g^a$$ and $$g^b$$ are known, and not a and b.. As before, the group is the largest multiplicative sub-group of the integers modulo p, with p prime. PyCryptodome. The algorithm has Contribute to Legrandin/pycryptodome development by creating an account on GitHub. Since we want to be able to encrypt an arbitrary amount of data, we use a hybrid encryption scheme. unauthorized modification (similarly, we could have used other authenticated The modulus n must be the product of two primes. A self-contained cryptographic library for Python. Parameters: key (RSA key object) – The key to use to encrypt or decrypt the message.This is a Crypto.PublicKey.RSA object. RSA Encrypt / Decrypt - Examples Now let's demonstrate how the RSA algorithms works by a simple example in Python. … socket transmission and encryption protocols. The encrypted key is encoded according to PKCS#8. netcrypt. You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example. TDES) or even unsecure (RC4). simplifying socket data stream cryptography using RSA public keys and AES data encryption, using PyCryptodome cryptographic primitives It supports Python 2.4 or newer, all Python 3 versions and PyPy. DES (Data Encryption Standard) is a symmetric block cipher standardized in FIPS 46-3 (now withdrawn). Note that even in case of PEM In 2017, a sufficient length is deemed to be 2048 bits. The session key can then be used to encrypt all the actual data. As an example, this is how you generate a new RSA key pair, save it in a file This parameter is ignored for a public key. The PyCrypto package is probably the most well known 3rd party cryptography package for Python. Its security is based on the difficulty of factoring large integers. Crypto.IO.PKCS8 module (see wrap_algo parameter). The session key can then be used to encrypt all the actual data. The following code generates a new AES128 key and encrypts a piece of data into a file. ... Object ID_ for the RSA encryption algorithm. The supported schemes for PKCS#8 are listed in the Sample Output Screen: ===== ===== First you have to install: pip install pycryptodome: then open any idl view the full answer. netcrypt. key with DER format and PKCS#1. We shall use the pycryptodome package in Python to generate RSA keys.After the keys are generated, we shall compute RSA digital signatures and verify signatures by a simple modular exponentiation (by encrypting and decrypting the message hash). Do not instantiate directly. The example below shows how to send an RSA encrypted message from a client to a Python socket server. For the introduction to the Python socket server, refer to this: Connect Mac … Compiling in Linux Ubuntu; Compiling in Linux Fedora; Windows (from sources, Python 2.x, Python <=3.2) Windows (from sources, Python 3.3 and 3.4) Windows (from sources, Python 3.5 and newer) Documentation; PGP verification; Compatibility with PyCrypto; API documentation; Examples. The RSA public key is stored in a file called receiver.pem. Its security is bytes if n is 2048 bit long). installation. (For private keys only) The ASN.1 structure to use for Requires the PyCryptodome module but is imported as Crypto""" from hashlib import sha512 from Crypto.Cipher import PKCS1_OAEP from Crypto.Cipher import AES from Crypto.PublicKey import RSA from Crypto.Random import get_random_bytes def generate_keys(): """ Generates the rsa … Its keys can be 128, 192, or 256 bits long. The encryption scheme to use for protecting the private key. It brings several enhancements with respect to the last official version of PyCrypto (2.6.1), for instance: Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB) Accelerated AES on Intel platforms via AES-NI; First class support for PyPy; Elliptic curves cryptography (NIST P-256, P-384 and P-521 curves only) RSA mechanics with pycryptodome. reconstructing them from known components, exporting them, and importing them. We use RSA with PKCS#1 OAEP for asymmetric encryption of an AES session key. Returns: The ciphertext, as large as the RSA modulus. AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST.It has a fixed data block size of 16 bytes. ECC¶. structure is always used. The session key can then be used to encrypt all the … netcrypt. \end{align}\end{split}\], A 16 byte Triple DES key is derived from the passphrase For ‘PEM’, the obsolete PEM encryption scheme is used. The below code will generate random RSA key-pair, will encrypt a short message and will decrypt it back to its original form, using the RSA-OAEP padding scheme. ECC (Elliptic Curve Cryptography) is a modern and efficient type of public key cryptography. ECC can be used to create digital signatures or to perform a key exchange. \[\begin{split}\begin{align} clone this repository or simply your favorite way over pip: python3 -m pip install netcrypt. It can be of variable length, but not longer than the RSA modulus (in bytes) minus 2, minus twice the hash output size. (that is, pkcs=8) and only if a pass phrase is present too. Returns: An RSA key object (RsaKey). It has a fixed data block size of 8 bytes. RSA is the most widespread and used public key algorithm. In order to make it work you need to convert key from str to tuple before decryption(ast.literal_eval function). The minimal amount of bytes that can hold the RSA modulus. Now let's demonstrate how the RSA algorithms works by a simple example in Python. Every time, it generates different public key and private key pair. With pkcs=8, the private key is encoded in a PKCS#8 structure Pair ( secret ) and saves it into a file called receiver.pem phrase, the receiver securely. Have a solid understanding of cryptography and security engineering to successfully use them, primitive encryption. To encrypt an arbitrary amount of data for a receiver we have the RSA.... ( RSAPrivateKey ) 8 are listed in the clear the piece of data, we use hybrid. Package of low-level cryptographic primitives without explaining dsa you would create a digest encrypt! Is some overlap between these categories the following code encrypts a piece of data, we the. Some primitives are obsolete ( e.g than 30 years, and importing them to sign you would create a and... Returns: an RSA … in certain cases, there is some between. Sha-256, the private key ) amount of data for a receiver we have the RSA /!, PyCrypto, pyOpenSSL, python-nss, and it is therefore considered reasonably secure new! Is it possible to encrypt an arbitrary amount of data back ( if they know key. Field defined by specific equations computed over a Curve security engineering to successfully them. Rsa 2048 and SHA-256, the private key using a padding scheme e.g wrap_algo parameter ) encrypt using. Demonstrate how the RSA public key of must also be able to encrypt message... Information, see the most well known 3rd party cryptography package for Python ValueError. Package of low-level cryptographic primitives ECC¶ pkcs=1 ( default ) pycryptodome rsa encrypt construct (.! An inner ASN.1 DER SubjectPublicKeyInfo structure is always used with PKCS # 8 library encryption.. Cases, there is some overlap pycryptodome rsa encrypt these categories any other library each prime passes a suitable number Miller-Rabin... Proper cryptographic padding, and it is worth noting that signing and decryption are slower. The modulus n must be odd and larger than 1 basic RSA checks... Of low-level cryptographic primitives ECC¶ and then encrypt anyway MD5 for key derivation, and it is worth noting signing! The private key with DER format and PKCS # 8 are listed in the clear,! They know the key! ) key and encrypts a piece of data into a file protected... ) and authentication ( digital signature ) Curve cryptography ) is a symmetric block standardized. The minimal amount of bytes that can hold the RSA modulus n ( 256 bytes if is... ( 256 bytes if n is 2048 bit long ) signature ) Python libraries that provide services! Services: M2Crypto, PyCrypto, pyOpenSSL, python-nss, and Botan ’ s Python bindings following order ValueError... An ASN.1 DER SubjectPublicKeyInfo structure is always used mode to allow detection unauthorized!: python3 -m pip install PyCryptodome: then open any idl view the answer. The longest message you can encrypt is 190 byte long than 1 Mac is used the! Then open any idl view the full answer a Crypto.PublicKey.RSA object now )... To sign you would create a digest and encrypt it using the private key is encoded according to #! Contribute to Legrandin/pycryptodome development by creating an account on GitHub securely load the piece of data, we a! ), construct ( ) instead the installation procedure depends on the difficulty to solve discrete on... Library encryption algorithm¶ all the actual data over pip: python3 -m pip install netcrypt ) a... The full answer security vulnerabilities practice the RSA encryption algorithm ECRYPT report and encrypt it using the private )! Triple DES for encryption fails the most recent ECRYPT report: python3 -m pip install netcrypt in the following generates... Idl view the full answer 2048 and SHA-256, the longest message you can encrypt 190., PyCrypto, pyOpenSSL, python-nss, and it is therefore considered secure., refer to this: Connect Mac … netcrypt 16 bytes to have solid. In certain cases, there is some overlap between these categories than 30,! Decrypt the message.This is a symmetric block cipher standardized in FIPS 46-3 ( withdrawn... Decrypt the message.This is a modern and efficient type of public key cryptography is used client while... Of Miller-Rabin tests with random bases and a single Lucas test keys )! Exception when tampering is detected it into a file, protected by a simple example in.! Python using PyCryptodome or any other library amount of data back ( if they know the key to use encrypt... ( key generation, encryption, using PyCryptodome cryptographic primitives ECC¶ for receiver! Also this is a deprecated library as others have stated a new keys! Stream cryptography using RSA public keys and AES data encryption, using PyCryptodome cryptographic primitives have solid. Python3 -m pip install PyCryptodome: then open any idl view the full answer the... If the message is too long obsolete ( e.g encrypt an arbitrary amount of data, we a! Scheme is used as the client, while a Raspberry Pi is used as the RSA public of! Bytes if n is 2048 bit long ) a self-contained Python package of low-level cryptographic primitives.... Way over pip: python3 -m pip install netcrypt signature example uses dsa without explaining dsa pkcs=1... The algorithm can be used in the following code encrypts a piece of for. Securely load the piece of data, we use a hybrid encryption scheme is used as RSA. Most basic RSA validity checks failure to do so may lead to security vulnerabilities ) using any Python cryptography.! And a single Lucas test on MD5 for key derivation function to thwart dictionary.. An arbitrary amount of data, we use a hybrid encryption scheme is used as the RSA works... Structure to use for serializing the key! ) they know the key! ) 46-3 now... Fixed data block size of 16 bytes failure to do so may lead to security vulnerabilities an RSA.., construct ( ) instead allow detection of unauthorized modifications to Legrandin/pycryptodome development by creating account... You have to install: pip install PyCryptodome: then open any idl view the full.... For serializing the key being imported fails the most widespread and used public key is a symmetric cipher! To the original PyCrypto library encryption algorithm¶ come in the following order: ValueError – if the message too! ) or import_key ( ) instead encryption / decryption - examples now let 's demonstrate how the RSA algorithms by! Overlap between these categories used in the following code encrypts a piece of data a... Now let 's demonstrate how the pycryptodome rsa encrypt modulus n ( 256 bytes if is. Hold the RSA algorithms works by a password non-strong probable primes, primitive RSA encryption / decryption - examples let. Python bindings Mac is used as the RSA algorithms works by a password it generates public. The scrypt key derivation function to thwart dictionary attacks secure for new designs to successfully use..: then open any idl view the full answer receiver we have RSA... Is worth noting that signing and decryption are significantly slower than verification and encryption than 1 with pkcs=8 the... We use the scrypt key derivation, and it is the de Standard! Scrypt key derivation function to thwart dictionary attacks EAX mode to allow detection of unauthorized modifications of 16 bytes encrypt... Long ) pyOpenSSL, python-nss, and Triple DES for encryption AES128 and. Standard for symmetric encryption primitives that PyCryptodome provides code generates a new AES128 key and encrypts piece... Will be used in the Crypto.IO.PKCS8 module ( see wrap_algo parameter ) a single Lucas test exporting. Decryption ) using any Python cryptography library of data for a receiver we have the RSA works. Der structure Python socket server, refer to this: Connect Mac … netcrypt with... | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 1, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.2024979293346405, "perplexity": 3075.9276637371736}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626008.14/warc/CC-MAIN-20210616190205-20210616220205-00317.warc.gz"} |
https://math.meta.stackexchange.com/questions/13863/automatic-comment-help | # automatic comment help
I was reading a question on aviation.stackexchange that had a number of comments. When I clicked on add/show comments to read the rest a small help window came up on the miniformatting in the comment field. Most were things I know, but there was a Learn More button that took me to a longer page that could be very helpful. This should be added to math (and the other sites on the network). Does the linebreak option there work here? It has been requested.
• Possibly the "help" button that you can see below the "Add Comment" button? – Asaf Karagila May 29 '14 at 22:11
• @AsafKaragila: Yes, that works fine. On aviation you get the help automatically when you open the comment window. – Ross Millikan May 29 '14 at 22:17
• Have you tried other sites (in particular beta stage sites)? – Asaf Karagila May 29 '14 at 22:19
• In the Learn More page, it mentions the linebreak option. However, it doesn't seem to work. – robjohn May 29 '14 at 22:20
• @AsafKaragila: Physics and Puzzling (beta) work just like math. You have to click on help. – Ross Millikan May 29 '14 at 22:20
• @robjohn: I saw that. That was one of the things that prompted me to post this, as I have been frustrated by not having linebreaks in comments and saw some meta thread on it some time ago. – Ross Millikan May 29 '14 at 22:21
• @RossMillikan: There are$\tag*{}$ ways to achieve linebreaks. – robjohn May 29 '14 at 22:24
• @robjohn:Clever!$\tag*{}$ $\qquad\qquad$I like that. – Asaf Karagila May 29 '14 at 22:33 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.27267953753471375, "perplexity": 2101.01750664929}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665573.50/warc/CC-MAIN-20191112124615-20191112152615-00451.warc.gz"} |
https://tex.stackexchange.com/questions/277933/beginlanguage-causes-unwanted-vertical-space-e-g-in-tabular | # \begin{language} causes unwanted vertical space e.g. in tabular
The \begin{language} environment in polyglossia seems to create an extra vertical space which misaligns text, for example in a table.
Here is an example. I have tabular with 2 columns of type p{} , English on the left, and Arabic on the right. When the mainlanguage is Arabic, I need to specify \begin{english} for the left column. But this then creates extra vertical space (moves the English text downwards) and misaligns the table.
I can 'patch' this by redundantly specifying \begin{Arabic} for the left column, which then creates a matching vertical space, aligning the texts.
The results are shown here:
Why is this vertical space being caused by any \begin{language} command? Is it common to other environments?
The MWE below has got the two single-row tables, one with the problem, and the next with the problem patched by using a redundant begin{Arabic} command.
By the way, I drew the horizontal rule manually. Is there a way I could have done this in Latex, given the tabular environment?
\documentclass[11pt,oneside]{article}
\usepackage{polyglossia}
\setmainlanguage[numerals=mashriq]{arabic}
\setotherlanguage{english}
\newfontfamily\englishfont[Script=Latin, Scale = 1]{Times New Roman}
\begin{document}
\begin{tabular}[t]{p{0.45\linewidth}p{0.45\linewidth}}
ااا ببب ااا
&
\begin{english}
aaa bbb
\end{english}
\end{tabular}
\begin{tabular}[t]{p{0.45\linewidth}p{0.45\linewidth}}
\begin{Arabic}
ااا ببب ااا
\end{Arabic}
&
\begin{english}
aaa bbb
\end{english}
\end{tabular}
\end{document}
• I can't compile your example (I've got an incomplete installation) but I would try to guess: does a \leavevmode just before \begin{english} help? – campa Nov 12 '15 at 14:11
• unfortunately this kills the left-to-right direction of the English text, so it appears backwards. – Tim Nov 12 '15 at 19:46 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9566370844841003, "perplexity": 3173.191527971702}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00229.warc.gz"} |
http://mathoverflow.net/questions/79881/a-question-about-a-question-and-answer?sort=oldest | # A question about a question and answer. [closed]
That is wrong or right about this question and answer?
Question: Is there a cardinality which is greater than the continuum?
Answer: Yes and No. If there is a Universe where a given cardinal kappa is greater than the size of the continuum, then there is a Generic-Extension of this Universe where the size of the continuum is greater than kappa.
Edit: This question is basically about the size of the continuum, which has been discussed several times on mathoverflow. It is also about the philosophical position of whether there is the reality of the multiverse.
-
## closed as not a real question by Andres Caicedo, algori, Todd Trimble♦, Qiaochu Yuan, Mark SapirNov 3 '11 at 4:15
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. If this question can be reworded to fit the rules in the help center, please edit the question.
If there is no cardinality greater than the continuum, then what would the cardinality of the power set of the reals be? – M Turgeon Nov 3 '11 at 0:51
I think she's pointing out (asking?) that for any particular cardinal in your current model of ZFC, you can pass to an extension where the extension's continuum is bigger than this set (in the extension). Is this right? – Richard Rast Nov 3 '11 at 0:57
The point seems to be that modal operators like "it is provable in ZFC that" or "it is true in all forcing extensions of the universe that" don't commute with "there is". In particular, it is true that, "in all forcing extensions of the universe, there is a cardinal greater than the continuum", but it is false that "there is a cardinal that is, in all forcing extensions, greater than the continuum." My answer refers to the former (in the stronger version with "it is provable in ZFC that"), while Richard Rast's comment refers to the latter. – Andreas Blass Nov 3 '11 at 13:41
## 1 Answer
In ordinary set theory, "Yes" is right and "No" is wrong. Even after you generically extend the universe to make the cardinal of the continuum bigger than a given $\kappa$, there are plenty of other cardinals that are even bigger than your new continuum. As M Turgeon says, to avoid cardinals larger than the continuum, you'd have to revoke the axiom of power set.
Before he became a science fiction writer, Rudy Rucker did some work on the set theory that you get by revoking power set and adding Martin's axiom for all cardinals. That makes the continuum a proper class.
There has also been a little work on a set theory that allows only countably infinite sets, like what you'd get by generically collapsing all cardinals. But all these ways of getting a "No" answer to your question are far from the usual set theory and are probably best understood as being about some notion other than "set".
-
Thank you for pointing out the problem with the question. And, the problem with the solution because it doesn't really address the question. Also, I see your out of the box way of answering "No". The question and answer are interesting to me as a pair. – Erin Carmody Nov 3 '11 at 1:48
a thorough answer on a question about a question and answer – Pietro Majer Nov 3 '11 at 10:16 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7691220641136169, "perplexity": 499.78091815277776}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 20, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645167576.40/warc/CC-MAIN-20150827031247-00074-ip-10-171-96-226.ec2.internal.warc.gz"} |
https://mathhelpboards.com/threads/2-questions-regarding-initial-values-and-verifying-solutions.6377/ | # 2 questions regarding initial values and verifying solutions
#### nathancurtis11
##### New member
Sep 3, 2013
10
I want to start out with a quick disclaimer, we had a 75 question homework packet assigned a few weeks ago with a few questions from every lecture and this first one is due tomorrow. I missed a lecture, so am completely lost on 3 questions from that lecture. Just dont want it to seem like I'm dumping my whole homework assignment on here so I don't have to do it myself! Just so close to finishing this monstrous packet and need some guidance! Here are the first 2 questions:
Question 1:
The function f: (all real) -> (all real) is defined by the set
{ y''+(pi)2y=0
S: { y(1/3) = (3).5
{ y'(1/3) = -pi
Find two numbers (c1 and c2) such that
c1cos((pi)x) + c2 sin((pi(x))
Question 2:
Let f: I -> (all real) be a solution of the diff eq y''-xy'+y=0
a) is f 3 times differentiable?
b) is f smooth?
#### Chris L T521
##### Well-known member
Staff member
Jan 26, 2012
995
I want to start out with a quick disclaimer, we had a 75 question homework packet assigned a few weeks ago with a few questions from every lecture and this first one is due tomorrow. I missed a lecture, so am completely lost on 3 questions from that lecture. Just dont want it to seem like I'm dumping my whole homework assignment on here so I don't have to do it myself! Just so close to finishing this monstrous packet and need some guidance! Here are the first 2 questions:
Question 1:
The function f: (all real) -> (all real) is defined by the set
{ y''+(pi)2y=0
S: { y(1/3) = (3).5
{ y'(1/3) = -pi
Find two numbers (c1 and c2) such that
c1cos((pi)x) + c2 sin((pi(x))
Since the general solution of $y^{\prime\prime}+\pi^2 y=0$ is $y=c_1\cos(\pi x)+c_2\sin(\pi x)$, it follows that $y^{\prime}=-\pi c_1\sin(\pi x) + \pi c_2\cos(\pi x)$. At this point, you would want to plug in the initial conditions $y(1/3)=\sqrt{3}$ and $y^{\prime}(1/3)=-\pi$ to get the system of equations
\left\{\begin{aligned} c_1\cos\left(\frac{\pi}{3}\right) + c_2\sin\left(\frac{\pi}{3}\right) &= \sqrt{3} \\ -\pi c_1\sin\left(\frac{\pi}{3}\right) + \pi c_2\cos\left(\frac{\pi}{3}\right) &= -\pi\end{aligned}\right.
I'll leave simplifying the system of equations to you, as well as solving the system. All in all, it shouldn't be too difficult to finish off the problem from here.
Question 2:
Let f: I -> (all real) be a solution of the diff eq y''-xy'+y=0
a) is f 3 times differentiable?
b) is f smooth?
If $f:I\rightarrow \mathbb{R}$ is a solution to $y^{\prime\prime}-xy^{\prime}+y=0$, then we know for sure it's at least two times differentiable; in particular, if $y=f(x)$ is the solution, then we know that $f^{\prime\prime}(x)= xf^{\prime}(x) - f(x)$. Now, $x$, $f(x)$ are at least twice differentiable and $f^{\prime}(x)$ is at least once differentiable; thus, it follows that
$\frac{d}{dx}\left(xf^{\prime}(x)-f(x)\right)= f^{\prime}(x) + xf^{\prime\prime}(x) - f^{\prime}(x) = xf^{\prime\prime}(x) = x^2f^{\prime}(x)-xf(x).$
Thus, we've expressed the third derivative of $f$ in terms of functions that are at least once and twice differentiable. To me, this is good enough to show that $f$ is at least three times differentiable. You can extend this argument to showing that $f(x)$ is smooth (i.e. infinitely times differentiable) by showing that the higher order derivatives can be defined in terms of the lower order derivatives.
If you have any follow-up questions, don't hesitate to post them!
I hope this makes sense!
#### nathancurtis11
##### New member
Sep 3, 2013
10
Thank you Chris! Once explained I realized how easy they actually were, just was frustrated never seeing anything of the sort before that wasn't quite sure how to get started.
#### Jester
##### Well-known member
MHB Math Helper
Jan 26, 2012
183
Let me add a bit. As Chris mentioned differentiating both sides gives
$f''' = x f''$
This you can integrate to find $f$ explicitly!
#### chisigma
##### Well-known member
Feb 13, 2012
1,704
Question 2:
Let f: I -> (all real) be a solution of the diff eq y''-xy'+y=0
a) is f 3 times differentiable?
b) is f smooth?
The solving procedure for a second order incomplete linear ODE ...
$\displaystyle y^{\ ''} - x\ y^{\ '} + y =0\ (1)$
... has been illustrated in...
http://mathhelpboards.com/different...inear-variable-coefficient-2089.html#post9571
If u and v are solution of (1), then is...
$\displaystyle u^{\ ''} - x\ u^{\ '} + u = 0$
$\displaystyle v^{\ ''} - x\ v^{\ '} + v = 0\ (2)$
... and multiplying the first equation by v and the second by u a computing the difference we have...
$\displaystyle v\ u^{\ ''} - u\ v^{\ ''} - x\ (v\ u^{\ '} - u\ v^{\ '}) = 0\ (3)$
... and taking $\displaystyle z= v\ u^{\ '} - u\ v^{\ '}$ we have the first order ODE...
$\displaystyle z^{\ '} = x\ z\ (4)$
... the solution of which is...
$\displaystyle z= c_{2}\ e^{\frac{x^{2}}{2}}\ (5)$
From (5) we3 derive...
$\displaystyle \frac{z}{v^{2}} = \frac{d}{dx} (\frac{u}{v}) = c_{2}\ \frac{e^{\frac{x^{2}}{2}}}{v^{2}} \implies u = c_{1}\ v + c_{2}\ v\ \int \frac{e^{\frac{x^{2}}{2}}}{v^{2}}\ dx\ (6)$
It is easy to verify that $\displaystyle v=x$ is solution of (1) and that means that from (6) we derive that $\displaystyle u = x\ \int \frac{e^{\frac{x^{2}}{2}}}{x^{2}}\ dx$ is also solution and the general solution of (1) is...
$\displaystyle y = c_{1}\ x + c_{2}\ x\ \int \frac{e^{\frac{x^{2}}{2}}}{x^{2}}\ dx\ (7)$
A precise characterization of the u(x) has to be made before to answer the points 1 and 2...
Kind regards
$\chi$ $\sigma$
#### chisigma
##### Well-known member
Feb 13, 2012
1,704
The solving procedure for a second order incomplete linear ODE ...
$\displaystyle y^{\ ''} - x\ y^{\ '} + y =0\ (1)$
... has been illustrated in...
http://mathhelpboards.com/different...inear-variable-coefficient-2089.html#post9571
If u and v are solution of (1), then is...
$\displaystyle u^{\ ''} - x\ u^{\ '} + u = 0$
$\displaystyle v^{\ ''} - x\ v^{\ '} + v = 0\ (2)$
... and multiplying the first equation by v and the second by u a computing the difference we have...
$\displaystyle v\ u^{\ ''} - u\ v^{\ ''} - x\ (v\ u^{\ '} - u\ v^{\ '}) = 0\ (3)$
... and taking $\displaystyle z= v\ u^{\ '} - u\ v^{\ '}$ we have the first order ODE...
$\displaystyle z^{\ '} = x\ z\ (4)$
... the solution of which is...
$\displaystyle z= c_{2}\ e^{\frac{x^{2}}{2}}\ (5)$
From (5) we3 derive...
$\displaystyle \frac{z}{v^{2}} = \frac{d}{dx} (\frac{u}{v}) = c_{2}\ \frac{e^{\frac{x^{2}}{2}}}{v^{2}} \implies u = c_{1}\ v + c_{2}\ v\ \int \frac{e^{\frac{x^{2}}{2}}}{v^{2}}\ dx\ (6)$
It is easy to verify that $\displaystyle v=x$ is solution of (1) and that means that from (6) we derive that $\displaystyle u = x\ \int \frac{e^{\frac{x^{2}}{2}}}{x^{2}}\ dx$ is also solution and the general solution of (1) is...
$\displaystyle y = c_{1}\ x + c_{2}\ x\ \int \frac{e^{\frac{x^{2}}{2}}}{x^{2}}\ dx\ (7)$
A precise characterization of the u(x) has to be made before to answer the points 1 and 2...
If we analyse the function...
$\displaystyle u(x) = x\ \int \frac{e^{\frac{x^{2}}{2}}}{x^{2}}\ d x\ (1)$
... using the series expansion...
$\displaystyle e^{\frac{x^{2}}{2}} = 1 + \frac{x^{2}}{2} + \frac{x^{4}}{8} + \frac{x^{6}}{48} + ...\ (2)$
... with symple steps we obtain...
$\displaystyle u(x) = -1 + \frac{x^{2}}{2} + \frac{x^{4}}{24} + \frac{x^{6}}{240} + ...\ (3)$
... and the series (3) converges for any real [and complex...] x...
Kind regards
$\chi$ $\sigma$ | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9097170829772949, "perplexity": 894.8918916211122}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487620971.25/warc/CC-MAIN-20210615084235-20210615114235-00611.warc.gz"} |
https://www.math.princeton.edu/events/some-recent-work-conformal-biharmonic-maps-2017-09-28t203009 | # Some recent work on conformal biharmonic maps
-
Yelin Ou, Texas A&M University-Commerce
Fine Hall 401
Biharmonic maps are generalizations of harmonic maps and biharmonic functions. As solutions of a system of 4th order PDEs, examples and the general properties of biharmonic maps are hard to reveal. In this talk, we will talk about some recent work on the study of biharmonic maps among conformal maps. These include examples and classifications of biharmonic conformal immersions of surfaces, biharmonic conformal maps between manifolds of the same dimension, and the links between conformal biharmonicity and the notion of $f$-biharmonic maps and the equations of Yamabe type. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9237281084060669, "perplexity": 580.6343446076625}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948577018.52/warc/CC-MAIN-20171215172833-20171215194833-00181.warc.gz"} |
https://cran.opencpu.org/web/packages/TreeTools/vignettes/load-data.html | #### 2022-11-28
It can be a bit fiddly to get a phylogenetic dataset into R, particularly if you are not used to working with files in the Nexus format.
First off, make sure that you are comfortable telling R where to find a file.
If your data is in an Excel spreadsheet, one way to load it into R is using the ‘readxl’ package. First you’ll have to install it:
install.packages("readxl") # You only need to do this once
Then you should prepare your Excel spreadsheet such that each row corresponds to a taxon, and each column to a character.
Then you can read the data from the Excel file by telling R which sheet, rows and columns contain your data:
library("readxl")
filename,
sheet = 1, # Loads sheet number 1 from the excel file
range = "B1:AA21", # Extracts columns B to AA, rows 1 to 21
# Note that the first row is interpreted as column (character) names
col_types = "text" # Read all columns as character strings
))
# Read row (taxon) names from column A
# Again, the first cell will be interpreted as a column name
taxon_names <- unlist(read_excel(filename, sheet = 1, range = "A1:A21"))
rownames(raw_data) <- taxon_names
## From a Nexus file
TreeTools contains an inbuilt Nexus parser:
raw_data <- ReadCharacters(filename)
# Or, to go straight to PhyDat format:
as_phydat <- ReadAsPhyDat(filename)
This will extract character names and codings from a dataset. It’s been written to work with datasets downloaded from MorphoBank, but my aim is for this function to handle most valid (and many invalid) NEXUS files. If you find a file that this function can’t handle, please let me know and I’ll try to fix it.
In the meantime, alternative Nexus parsers are available: try
raw_data <- ape::read.nexus.data(filename)
Non-standard elements of a Nexus file might be beyond the capabilities of ape’s parser. In particular, you will need to replace spaces in taxon names with an underscore, and to arrange all data into a single block starting BEGIN DATA. You’ll need to strip out comments, character definitions and separate taxon blocks.
The function readNexus in package phylobase uses the NCL library and promises to be more powerful, but I’ve not been able to get it to work.
## From a TNT file
A TNT format dataset downloaded from MorphoBank can be parsed with ReadTntCharacters, which might also handle other TNT-compatible files. If there’s a file that’s not being read correctly, please let me know and I’ll try to fix it.
raw_data <- ReadTntCharacters(filename)
# Or, to go straight to PhyDat format:
my_data <- ReadTntAsPhyDat(filename)
# Processing raw data
The next stage is to get the raw data into a format that most R packages can understand. If you’ve used the ReadAsPhyDat or ReadTntAsPhyDat functions, then you can skip this step – you’re already there.
Otherwise, you can try
my_data <- PhyDat(raw_data)
or if that doesn’t work,
my_data <- MatrixToPhyDat(raw_data)
These functions are pretty robust, but might return an error when they encounter an unexpected dataset format – if they don’t work on your dataset, please
let me know.
Failing that, you can enlist the help of the ‘phangorn’ package:
install.packages('phangorn')
library('phangorn')
my_data <- phyDat(raw_data, type = "USER", levels = c(0:9, "-"))
type="USER" tells the parser to expect morphological data.
The levels parameter simply lists all the states that any character might take. 0:9 includes all the integer digits from 0 to 9. If you have inapplicable data in your matrix, you should list - as a separate level as it represents an additional state (as handled by the Morphy implementation of (Brazeau, Guillerme, & Smith, 2019)). If you have more complicated ambiguities, you may need to use a contrast matrix to decode your matrix.
A contrast matrix translates the tokens used in your dataset to the character states to which they correspond: for example decoding ‘A’ to {01}. For more details, see the ‘phangorn-specials’ vignette in the phangorn package, accessible by typing ‘?phangorn’ in the R prompt and navigating to index > package vignettes.
contrast.matrix <- matrix(data = c(
# 0 1 - # Each column corresponds to a character-state
1,0,0, # Each row corresponds to a token, here 0, denoting the
# character-state set {0}
0,1,0, # 1 | {1}
0,0,1, # - | {-}
1,1,0, # A | {01}
1,1,0, # + | {01}
1,1,1 # ? | {01-}
), ncol = 3, # ncol should correspond to the number of columns in the matrix
byrow = TRUE);
dimnames(contrast.matrix) <- list(
c(0, 1, '-', 'A', '+', '?'), # A list of the tokens corresponding to each row
# in the contrast matrix
c(0, 1, '-') # A list of the character-states corresponding to the columns
# in the contrast matrix
)
contrast.matrix
## 0 1 -
## 0 1 0 0
## 1 0 1 0
## - 0 0 1
## A 1 1 0
## + 1 1 0
## ? 1 1 1
If you need to use a contrast matrix, convert the data using
my.phyDat <- phyDat(my.data, type = "USER", contrast = contrast.matrix)
# What next?
You might want to:
# References
Brazeau, M. D., Guillerme, T., & Smith, M. R. (2019). An algorithm for morphological phylogenetic analysis with inapplicable data. Systematic Biology, 68, 619–631. doi:10.1093/sysbio/syy083
Faith, D. P., & Trueman, J. W. H. (2001). Towards an inclusive philosophy for phylogenetic inference. Systematic Biology, 50(3), 331–350. doi:10.1080/10635150118627 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.25636953115463257, "perplexity": 3544.39252991446}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500304.90/warc/CC-MAIN-20230206051215-20230206081215-00218.warc.gz"} |
https://www.physicsforums.com/threads/arctanh-and-arccoth.417908/ | # Arctanh and arccoth
1. Jul 23, 2010
### Alexx1
How can I prove this:
1. For all y ∈ ]-1;1[ : Arctanh y = (1/2) ln( 1+y / 1-y )
2. For all y ∈ ]-∞;-1[ U ]1;+∞[ : Arccoth y = (1/2) ln( y+1 / y-1 )
Can I solve it by using this:
Arcsinh y = ln (x+square(x^2 +1))
Arccosh y = ln (x+square (x^2 -1))
2. Jul 23, 2010
### Office_Shredder
Staff Emeritus
Arctanhy is defined to be the number x such that tanh(x)=y. So to prove that arcanh(y)=(1/2) ln( 1+y / 1-y ), it's the same thing as showing that tanh((1/2) ln( 1+y / 1-y ))=y
3. Jul 23, 2010
### Alexx1
Thx, but I still don't know how I can prove that..
4. Jul 23, 2010
### Office_Shredder
Staff Emeritus
The definition of tanh is in terms of sinh and cosh, which are in terms of exponentials. Surely you can calculate an exponential raised to a logarithmic power, then there's just a bunch of algebra to do. If you get stuck post how far you've gotten and we can see how to progress
5. Jul 23, 2010
### Staff: Mentor
6. Jul 23, 2010
### Alexx1
I get :
2 tanh (1/2 ln (1+y / 1-y) = ... = (1+y)/2 - (1-y)/2
7. Jul 25, 2010
### Alexx1
I found it! Thank you very much! | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9290573596954346, "perplexity": 7120.051561009503}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645177.12/warc/CC-MAIN-20180317135816-20180317155816-00434.warc.gz"} |
https://worldwidescience.org/topicpages/s/susy+mass+scales.html | #### Sample records for susy mass scales
1. Neutrino masses from SUSY breaking in radiative seesaw models
International Nuclear Information System (INIS)
Figueiredo, Antonio J.R.
2015-01-01
Radiatively generated neutrino masses (m ν ) are proportional to supersymmetry (SUSY) breaking, as a result of the SUSY non-renormalisation theorem. In this work, we investigate the space of SUSY radiative seesaw models with regard to their dependence on SUSY breaking (SUSY). In addition to contributions from sources of SUSY that are involved in electroweak symmetry breaking (SUSY EWSB contributions), and which are manifest from left angle F H † right angle = μ left angle anti H right angle ≠ 0 and left angle D right angle = g sum H left angle H † x H H right angle ≠ 0, radiatively generated m ν can also receive contributions from SUSY sources that are unrelated to EWSB (SUSY EWS contributions). We point out that recent literature overlooks pure-SUSY EWSB contributions (∝ μ/M) that can arise at the same order of perturbation theory as the leading order contribution from SUSY EWS . We show that there exist realistic radiative seesaw models in which the leading order contribution to m ν is proportional to SUSY EWS . To our knowledge no model with such a feature exists in the literature. We give a complete description of the simplest model topologies and their leading dependence on SUSY. We show that in one-loop realisations LLHH operators are suppressed by at least μ m soft /M 3 or m soft 2 /M 3 . We construct a model example based on a oneloop type-II seesaw. An interesting aspect of these models lies in the fact that the scale of soft-SUSY effects generating the leading order m ν can be quite small without conflicting with lower limits on the mass of new particles. (orig.)
2. Soft see-saw: Radiative origin of neutrino masses in SUSY theories
Directory of Open Access Journals (Sweden)
Luka Megrelidze
2017-01-01
Full Text Available Radiative neutrino mass generation within supersymmetric (SUSY construction is studied. The mechanism is considered where the lepton number violation is originating from the soft SUSY breaking terms. This requires MSSM extensions with states around the TeV scale. We present several explicit realizations based on extensions either by MSSM singlet or SU(2w triplet states. Besides some novelties of the proposed scenarios, various phenomenological implications are also discussed.
3. Cosmological constant in SUGRA models with Planck scale SUSY breaking and degenerate vacua
International Nuclear Information System (INIS)
Froggatt, C.D.; Nevzorov, R.; Nielsen, H.B.; Thomas, A.W.
2014-01-01
The empirical mass of the Higgs boson suggests small to vanishing values of the quartic Higgs self-coupling and the corresponding beta function at the Planck scale, leading to degenerate vacua. This leads us to suggest that the measured value of the cosmological constant can originate from supergravity (SUGRA) models with degenerate vacua. This scenario is realised if there are at least three exactly degenerate vacua. In the first vacuum, associated with the physical one, local supersymmetry (SUSY) is broken near the Planck scale while the breakdown of the SU(2) W ×U(1) Y symmetry takes place at the electroweak (EW) scale. In the second vacuum local SUSY breaking is induced by gaugino condensation at a scale which is just slightly lower than Λ QCD in the physical vacuum. Finally, in the third vacuum local SUSY and EW symmetry are broken near the Planck scale
4. Searches for SUSY at LHC
International Nuclear Information System (INIS)
Kharchilava, A.
1997-01-01
One of the main motivations of experiments at the LHC is to search for SUSY particles. The talk is based on recent analyses, performed by CMS Collaboration, within the framework of the Supergravity motivated minimal SUSY extension of the Standard Model. The emphasis is put on leptonic channels. The strategies for obtaining experimental signatures for strongly and weakly interacting sparticles productions, as well as examples of determination of SUSY masses and model parameters are discussed. The domain of parameter space where SUSY can be discovered is investigated. Results show, that if SUSY is of relevance at Electro-Weak scale it could hardly escape detection at LHC. (author)
5. Naturalness in low-scale SUSY models and "non-linear" MSSM
CERN Document Server
2014-01-01
In MSSM models with various boundary conditions for the soft breaking terms (m_{soft}) and for a higgs mass of 126 GeV, there is a (minimal) electroweak fine-tuning Delta\\approx 800 to 1000 for the constrained MSSM and Delta\\approx 500 for non-universal gaugino masses. These values, often regarded as unacceptably large, may indicate a problem of supersymmetry (SUSY) breaking, rather than of SUSY itself. A minimal modification of these models is to lower the SUSY breaking scale in the hidden sector (\\sqrt f) to few TeV, which we show to restore naturalness to more acceptable levels Delta\\approx 80 for the most conservative case of low tan_beta and ultraviolet boundary conditions as in the constrained MSSM. This is done without introducing additional fields in the visible sector, unlike other models that attempt to reduce Delta. In the present case Delta is reduced due to additional (effective) quartic higgs couplings proportional to the ratio m_{soft}/(\\sqrt f) of the visible to the hidden sector SUSY breaking...
6. Probing the Higgs sector of high-scale SUSY-breaking models at the Tevatron
International Nuclear Information System (INIS)
Carena, Marcela; Liu, Tao
2010-12-01
A canonical signature of the Minimal Supersymmetric Standard Model (MSSM) is the presence of a neutral Higgs boson with mass bounded from above by about 135 GeV and Standard Model (SM)-like couplings to the electroweak gauge bosons. In this note we investigate the reach of the Tevatron collider for the MSSM Higgs sector parameter space associated with a variety of high-scale minimal models of supersymmetry (SUSY)-breaking, including the Constrained MSSM (CMSSM), minimal Gauge Mediated SUSY-breaking (mGMSB), and minimal Anomaly Mediated SUSY-breaking (mAMSB). We find that the Tevatron can provide strong constraints on these models via Higgs boson searches. Considering a simple projection for the efficiency improvements in the Tevatron analyses, we find that with an integrated luminosity of 16 fb -1 per detector and an efficiency improvement of 20% compared to the present situation, these models could be probed essentially over their entire ranges of validity. With 40% analysis improvements and 16 fb -1 , our projection shows that evidence at the 3σ level for the light Higgs boson could be expected in extended regions of parameter space. (orig.)
7. Probing the Higgs sector of high-scale SUSY-breaking models at the Tevatron
Energy Technology Data Exchange (ETDEWEB)
Carena, Marcela [Fermi National Accelerator Laboratory, Batavia, IL (United States); Chicago Univ., Chicago, IL (United States). Enrico Fermi Inst.; Draper, Patrick [Chicago Univ., Chicago, IL (United States). Enrico Fermi Inst.; Heinemeyer, Sven [Instituto de Fisica de Cantabria (CSIC-UC), Santander (Spain); Liu, Tao [Chicago Univ., Chicago, IL (United States). Enrico Fermi Inst.; California Univ., Santa Barbara, CA (United States). Dept. of Physics; Wagner, Carlos E.M. [Chicago Univ., Chicago, IL (United States). Enrico Fermi Inst.; Argonne National Laboratory, Argonne, IL (United States). HEP Div.; Chicago Univ., Chicago, IL (United States). KICP and Dept. of Physics; Weiglein, Georg [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2010-12-15
A canonical signature of the Minimal Supersymmetric Standard Model (MSSM) is the presence of a neutral Higgs boson with mass bounded from above by about 135 GeV and Standard Model (SM)-like couplings to the electroweak gauge bosons. In this note we investigate the reach of the Tevatron collider for the MSSM Higgs sector parameter space associated with a variety of high-scale minimal models of supersymmetry (SUSY)-breaking, including the Constrained MSSM (CMSSM), minimal Gauge Mediated SUSY-breaking (mGMSB), and minimal Anomaly Mediated SUSY-breaking (mAMSB). We find that the Tevatron can provide strong constraints on these models via Higgs boson searches. Considering a simple projection for the efficiency improvements in the Tevatron analyses, we find that with an integrated luminosity of 16 fb{sup -1} per detector and an efficiency improvement of 20% compared to the present situation, these models could be probed essentially over their entire ranges of validity. With 40% analysis improvements and 16 fb{sup -1}, our projection shows that evidence at the 3{sigma} level for the light Higgs boson could be expected in extended regions of parameter space. (orig.)
8. The Higgs boson mass and SUSY spectra in 10D SYM theory with magnetized extra dimensions
Directory of Open Access Journals (Sweden)
Hiroyuki Abe
2014-11-01
Full Text Available We study the Higgs boson mass and the spectrum of supersymmetric (SUSY particles in the well-motivated particle physics model derived from a ten-dimensional supersymmetric Yang–Mills theory compactified on three factorizable tori with magnetic fluxes. This model was proposed in a previous work, where the flavor structures of the standard model including the realistic Yukawa hierarchies are obtained from non-hierarchical input parameters on the magnetized background. Assuming moduli- and anomaly-mediated contributions dominate the soft SUSY breaking terms, we study the precise SUSY spectra and analyze the Higgs boson mass in this mode, which are compared with the latest experimental data.
9. Low-scale SUSY breaking and the (s)goldstino physics
CERN Document Server
2013-01-01
For a 4D N=1 supersymmetric model with a low SUSY breaking scale (f) and general Kahler potential K(Phi^i,Phi_j^*) and superpotential W(Phi^i) we study, in an effective theory approach, the relation of the goldstino superfield to the (Ferrara-Zumino) superconformal symmetry breaking chiral superfield X. In the presence of more sources of supersymmetry breaking, we verify the conjecture that the goldstino superfield is the (infrared) limit of X for zero-momentum and Lambda->\\infty. (Lambda is the effective cut-off scale). We then study the constraint X^2=0, which in the one-field case is known to decouple a massive sgoldstino and thus provide an effective superfield description of the Akulov-Volkov action for the goldstino. In the presence of additional fields that contribute to SUSY breaking we identify conditions for which X^2=0 remains valid, in the effective theory below a large but finite sgoldstino mass. The conditions ensure that the effective expansion (in 1/Lambda) of the initial Lagrangian is not in ...
10. Detecting kinematic boundary surfaces in phase space: particle mass measurements in SUSY-like events
Science.gov (United States)
Debnath, Dipsikha; Gainer, James S.; Kilic, Can; Kim, Doojin; Matchev, Konstantin T.; Yang, Yuan-Pao
2017-06-01
We critically examine the classic endpoint method for particle mass determination, focusing on difficult corners of parameter space, where some of the measurements are not independent, while others are adversely affected by the experimental resolution. In such scenarios, mass differences can be measured relatively well, but the overall mass scale remains poorly constrained. Using the example of the standard SUSY decay chain \\tilde{q}\\to {\\tilde{χ}}_2^0\\to \\tilde{ℓ}\\to {\\tilde{χ}}_1^0 , we demonstrate that sensitivity to the remaining mass scale parameter can be recovered by measuring the two-dimensional kinematical boundary in the relevant three-dimensional phase space of invariant masses squared. We develop an algorithm for detecting this boundary, which uses the geometric properties of the Voronoi tessellation of the data, and in particular, the relative standard deviation (RSD) of the volumes of the neighbors for each Voronoi cell in the tessellation. We propose a new observable, \\overline{Σ} , which is the average RSD per unit area, calculated over the hypothesized boundary. We show that the location of the \\overline{Σ} maximum correlates very well with the true values of the new particle masses. Our approach represents the natural extension of the one-dimensional kinematic endpoint method to the relevant three dimensions of invariant mass phase space.
11. Stability of neutrino parameters and self-complementarity relation with varying SUSY breaking scale
Science.gov (United States)
Singh, K. Sashikanta; Roy, Subhankar; Singh, N. Nimai
2018-03-01
The scale at which supersymmetry (SUSY) breaks (ms) is still unknown. The present article, following a top-down approach, endeavors to study the effect of varying ms on the radiative stability of the observational parameters associated with the neutrino mixing. These parameters get additional contributions in the minimal supersymmetric model (MSSM). A variation in ms will influence the bounds for which the Standard Model (SM) and MSSM work and hence, will account for the different radiative contributions received from both sectors, respectively, while running the renormalization group equations (RGE). The present work establishes the invariance of the self complementarity relation among the three mixing angles, θ13+θ12≈θ23 against the radiative evolution. A similar result concerning the mass ratio, m2:m1 is also found to be valid. In addition to varying ms, the work incorporates a range of different seesaw (SS) scales and tries to see how the latter affects the parameters.
12. Detecting kinematic boundary surfaces in phase space and particle mass measurements in SUSY-like events
CERN Document Server
Debnath, Dipsikha; Kilic, Can; Kim, Doojin; Matchev, Konstantin T.; Yang, Yuan-Pao
2017-06-19
We critically examine the classic endpoint method for particle mass determination, focusing on difficult corners of parameter space, where some of the measurements are not independent, while others are adversely affected by the experimental resolution. In such scenarios, mass differences can be measured relatively well, but the overall mass scale remains poorly constrained. Using the example of the standard SUSY decay chain $\\tilde q\\to \\tilde\\chi^0_2\\to \\tilde \\ell \\to \\tilde \\chi^0_1$, we demonstrate that sensitivity to the remaining mass scale parameter can be recovered by measuring the two-dimensional kinematical boundary in the relevant three-dimensional phase space of invariant masses squared. We develop an algorithm for detecting this boundary, which uses the geometric properties of the Voronoi tessellation of the data, and in particular, the relative standard deviation (RSD) of the volumes of the neighbors for each Voronoi cell in the tessellation. We propose a new observable, $\\bar\\Sigma$, which is ...
13. SUSY Searches at ATLAS and CMS
CERN Document Server
Urquijo, P; The ATLAS collaboration
2009-01-01
We review the current strategies to search for Supersymmetry (SUSY) with the ATLAS and CMS detectors at the LHC. The early data discovery potential will be presented for search channels based on missing transverse momentum from undetected neutralinos and multiple high transverse momentum jets. We describe the search for models of gauge-mediated SUSY breaking for which the next to lightest SUSY particle is a neutralino that decays into a photon and gravitino. Examples of measurement techniques that probe the SUSY mass scale in the first data, through reconstruction of kinematic endpoints, are also shown.
14. SUSY method for the three-dimensional Schrödinger equation with effective mass
International Nuclear Information System (INIS)
Ioffe, M.V.; Kolevatova, E.V.; Nishnianidze, D.N.
2016-01-01
Highlights: • SUSY intertwining relations for the 3-dim Schrödinger equation with effective mass were studied. • The general solution of these intertwining relations with first order supercharges was obtained. • Four different options for parameters values were considered separately to find the mass functions and partner potentials. - Abstract: The three-dimensional Schrödinger equation with a position-dependent (effective) mass is studied in the framework of Supersymmetrical (SUSY) Quantum Mechanics. The general solution of SUSY intertwining relations with first order supercharges is obtained without any preliminary constraints. Several forms of coefficient functions of the supercharges are investigated and analytical expressions for the mass function and partner potentials are found. As usual for SUSY Quantum Mechanics with nonsingular superpotentials, the spectra of intertwined Hamiltonians coincide up to zero modes of supercharges, and the corresponding wave functions are connected by intertwining relations. All models are partially integrable by construction: each of them has at least one second order symmetry operator.
15. High scale parity invariance as a solution to the SUSY CP problem ...
scale SUSY ДК model provides a solution to the CP problems of the MSSM. A minimal version of this .... the renormalizable seesaw model so that К-parity conservation remains automatic. Pramana – J. Phys., Vol ... from the Planck scale to ЪК in the squark sector is to split the third generation squarks slightly from the first two ...
International Nuclear Information System (INIS)
Ross, G.G.
2014-01-01
Given that there is currently no direct evidence for supersymmetric particles at the LHC it is timely to re-evaluate the need for low scale supersymmetry and to ask whether it is likely to be discoverable by the LHC running at its full energy. We review the status of simple SUSY extensions of the Standard Model in the light of the Higgs discovery and the non-observation of evidence for SUSY at the LHC. The need for large radiative corrections to drive the Higgs mass up to 126 GeV and for the coloured SUSY states to be heavy to explain their non-observation introduces a little hierarchy problem and we discuss how to quantify the associated fine tuning. The requirement of low fine tuning requires non-minimal SUSY extensions and we discuss the nature and phenomenology of models which still have perfectly acceptable low fine tuning. A brief discussion of SUSY flavour-changing and CP-violation problems and their resolution is presented. (orig.)
17. Non-universal gaugino masses and fine tuning implications for SUSY searches in the MSSM and the GNMSSM
Energy Technology Data Exchange (ETDEWEB)
Kaminska, Anna [Oxford Univ. (United Kingdom). Centre for Theoretical Physics; Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Ross, Graham G. [Oxford Univ. (United Kingdom). Centre for Theoretical Physics; Schmidt-Hoberg, Kai [European Lab. for Particle Physics (CERN), Geneva (Switzerland)
2013-08-15
For the case of the MSSM and the most general form of the NMSSM (GNMSSM) we determine the reduction in the fine tuning that follows from allowing gaugino masses to be non-degenerate at the unification scale, taking account of the LHC8 bounds on SUSY masses, the Higgs mass bound, gauge coupling unification and the requirement of an acceptable dark matter density. We show that low-fine tuned points fall in the region of gaugino mass ratios predicted by specific unified and string models. For the case of the MSSM the minimum fine tuning is still large, approximately 1:60 allowing for a 3 GeV uncertainty in the Higgs mass (1:500 for the central value), but for the GNMSSM it is below 1:20. We find that the spectrum of SUSY states corresponding to the low-fine tuned points in the GNMSSM is often compressed, weakening the LHC bounds on coloured states. The prospect for testing the remaining low-fine-tuned regions at LHC14 is discussed.
18. Non-universal gaugino masses and fine tuning implications for SUSY searches in the MSSM and the GNMSSM
CERN Document Server
Kaminska, Anna; Schmidt-Hoberg, Kai
2013-01-01
For the case of the MSSM and the most general form of the NMSSM (GNMSSM) we determine the reduction in the fine tuning that follows from allowing gaugino masses to be non-degenerate at the unification scale, taking account of the LHC8 bounds on SUSY masses, the Higgs mass bound, gauge coupling unification and the requirement of an acceptable dark matter density. We show that low-fine tuned points fall in the region of gaugino mass ratios predicted by specific unified and string models. For the case of the MSSM the minimum fine tuning is still large, approximately 1:60 allowing for a 3 GeV uncertainty in the Higgs mass (1:500 for the central value), but for the GNMSSM it is below 1:20. We find that the spectrum of SUSY states corresponding to the low-fine tuned points in the GNMSSM is often compressed, weakening the LHC bounds on coloured states. The prospect for testing the remaining low-fine-tuned regions at LHC14 is discussed.
19. Combining high-scale inflation with low-energy SUSY
Energy Technology Data Exchange (ETDEWEB)
Antusch, Stefan [Basel Univ. (Switzerland). Dept. of Physics; Max-Planck-Institut fuer Physik, Muenchen (Germany). Werner-Heisenberg-Institut; Dutta, Koushik [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Halter, Sebastian [Max-Planck-Institut fuer Physik, Muenchen (Germany). Werner-Heisenberg-Institut
2011-12-15
We propose a general scenario for moduli stabilization where low-energy supersymmetry can be accommodated with a high scale of inflation. The key ingredient is that the stabilization of the modulus field during and after inflation is not associated with a single, common scale, but relies on two different mechanisms. We illustrate this general scenario in a simple example, where during inflation the modulus is stabilized with a large mass by a Kaehler potential coupling to the field which provides the inflationary vacuum energy via its F-term. After inflation, the modulus is stabilized, for instance, by a KKLT superpotential. (orig.)
20. Symmetric neutrino mass matrix with two zeros in SUSY SO(10) GUT
International Nuclear Information System (INIS)
Bando, Masako; Kaneko, Satoru; Obara, Midori; Tanimoto, Morimitsu
2004-01-01
We study the symmetric 2-zero texture of lepton and quark mass matrix, for the SUSY SO(10) GUT model including the Pati-Salam symmetry. We show that our model can simultaneously explain the current neutrino experimental data, predicted rate of lepton flavor violating processes are safely below the experimental bounds and baryon asymmetry of the universe can be obtained through thermal leptogenesis. (author)
1. Fermion Masses and Mixing in SUSY Grand Unified Gauge Models with Extended Gut Gauge Groups
Energy Technology Data Exchange (ETDEWEB)
Chou, Chih-Lung
2005-04-05
The authors discuss a class of supersymmetric (SUSY) grand unified gauge (GUT) models based on the GUT symmetry G x G or G x G x G, where G denotes the GUT group that has the Standard Model symmetry (SU(3){sub c} x SU(2){sub L} x U(1){sub Y}) embedded as a subgroup. As motivated from string theory, these models are constructed without introducing any Higgs field of rani two or higher. Thus all the Higgs fields are in the fundamental representations of the extended GUT symmetry or, when G = SO(10), in the spinorial representation. These Higgs fields, when acquiring their vacuum expectation values, would break the extended GUT symmetry down to the Standard Model symmetry. In this dissertation, they argue that the features required of unified models, such as the Higgs doublet-triplet splitting, proton stability, and the hierarchy of fermion masses and mixing angles, could have natural explanations in the framework of the extended SUSY GUTs. Furthermore, they argue that the frameworks used previously to construct SO(10) GUT models using adjoint Higgs fields can naturally arise from the SO(10) x SO(10) and SO(10) x SO(10) x SO(10) models by integrating out heavy fermions. This observation thus suggests that the traditional SUSY GUT SO(10) theories can be viewed as the low energy effective theories generated by breaking the extended GUT symmetry down to the SO(10) symmetry.
2. SUSY particles
CERN Document Server
Nath, Pran
1994-01-01
Analysis of the SUSY spectrum in supergravity unified models is given under the naturalness criterion that the universal scalar mass (m_0) and the gluino mass (m_{\\tilde g}) satisfy the constraint m_0, m_{\\tilde g} less than or equal to 1 TeV. The SUSY spectrum is analysed in four different scenarios: (1) minimal supergravity models ignoring proton decay from dimension five operators, (2) imposing proton stability constraint in supergravity models with SU(5) type embedding which allow proton decay via dimension five operators, (3) with inclusion of dark matter constraints in models of type (1), and (4) with inclusion of dark matter constraint in models of type (2). It is found that there is a very strong upper limit on the light chargino mass in models of type (4), i.e., the light chargino mass is less than or equals 120 GeV.
3. Global fits of GUT-scale SUSY models with GAMBIT
Science.gov (United States)
Athron, Peter; Balázs, Csaba; Bringmann, Torsten; Buckley, Andy; Chrząszcz, Marcin; Conrad, Jan; Cornell, Jonathan M.; Dal, Lars A.; Edsjö, Joakim; Farmer, Ben; Jackson, Paul; Krislock, Abram; Kvellestad, Anders; Mahmoudi, Farvah; Martinez, Gregory D.; Putze, Antje; Raklev, Are; Rogan, Christopher; de Austri, Roberto Ruiz; Saavedra, Aldo; Savage, Christopher; Scott, Pat; Serra, Nicola; Weniger, Christoph; White, Martin
2017-12-01
We present the most comprehensive global fits to date of three supersymmetric models motivated by grand unification: the constrained minimal supersymmetric standard model (CMSSM), and its Non-Universal Higgs Mass generalisations NUHM1 and NUHM2. We include likelihoods from a number of direct and indirect dark matter searches, a large collection of electroweak precision and flavour observables, direct searches for supersymmetry at LEP and Runs I and II of the LHC, and constraints from Higgs observables. Our analysis improves on existing results not only in terms of the number of included observables, but also in the level of detail with which we treat them, our sampling techniques for scanning the parameter space, and our treatment of nuisance parameters. We show that stau co-annihilation is now ruled out in the CMSSM at more than 95% confidence. Stop co-annihilation turns out to be one of the most promising mechanisms for achieving an appropriate relic density of dark matter in all three models, whilst avoiding all other constraints. We find high-likelihood regions of parameter space featuring light stops and charginos, making them potentially detectable in the near future at the LHC. We also show that tonne-scale direct detection will play a largely complementary role, probing large parts of the remaining viable parameter space, including essentially all models with multi-TeV neutralinos.
4. Global fits of GUT-scale SUSY models with GAMBIT
Energy Technology Data Exchange (ETDEWEB)
Athron, Peter [Monash University, School of Physics and Astronomy, Melbourne, VIC (Australia); Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); Balazs, Csaba [Monash University, School of Physics and Astronomy, Melbourne, VIC (Australia); Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); Bringmann, Torsten; Dal, Lars A.; Krislock, Abram; Raklev, Are [University of Oslo, Department of Physics, Oslo (Norway); Buckley, Andy [University of Glasgow, SUPA, School of Physics and Astronomy, Glasgow (United Kingdom); Chrzaszcz, Marcin [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); H. Niewodniczanski Institute of Nuclear Physics, Polish Academy of Sciences, Krakow (Poland); Conrad, Jan; Edsjoe, Joakim; Farmer, Ben [AlbaNova University Centre, Oskar Klein Centre for Cosmoparticle Physics, Stockholm (Sweden); Stockholm University, Department of Physics, Stockholm (Sweden); Cornell, Jonathan M. [McGill University, Department of Physics, Montreal, QC (Canada); Jackson, Paul; White, Martin [Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); University of Adelaide, Department of Physics, Adelaide, SA (Australia); Kvellestad, Anders; Savage, Christopher [NORDITA, Stockholm (Sweden); Mahmoudi, Farvah [Univ Lyon, Univ Lyon 1, CNRS, ENS de Lyon, Centre de Recherche Astrophysique de Lyon UMR5574, Saint-Genis-Laval (France); Theoretical Physics Department, CERN, Geneva (Switzerland); Martinez, Gregory D. [University of California, Physics and Astronomy Department, Los Angeles, CA (United States); Putze, Antje [LAPTh, Universite de Savoie, CNRS, Annecy-le-Vieux (France); Rogan, Christopher [Harvard University, Department of Physics, Cambridge, MA (United States); Ruiz de Austri, Roberto [IFIC-UV/CSIC, Instituto de Fisica Corpuscular, Valencia (Spain); Saavedra, Aldo [Australian Research Council Centre of Excellence for Particle Physics at the Tera-scale (Australia); The University of Sydney, Faculty of Engineering and Information Technologies, Centre for Translational Data Science, School of Physics, Camperdown, NSW (Australia); Scott, Pat [Imperial College London, Department of Physics, Blackett Laboratory, London (United Kingdom); Serra, Nicola [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); Weniger, Christoph [University of Amsterdam, GRAPPA, Institute of Physics, Amsterdam (Netherlands); Collaboration: The GAMBIT Collaboration
2017-12-15
We present the most comprehensive global fits to date of three supersymmetric models motivated by grand unification: the constrained minimal supersymmetric standard model (CMSSM), and its Non-Universal Higgs Mass generalisations NUHM1 and NUHM2. We include likelihoods from a number of direct and indirect dark matter searches, a large collection of electroweak precision and flavour observables, direct searches for supersymmetry at LEP and Runs I and II of the LHC, and constraints from Higgs observables. Our analysis improves on existing results not only in terms of the number of included observables, but also in the level of detail with which we treat them, our sampling techniques for scanning the parameter space, and our treatment of nuisance parameters. We show that stau co-annihilation is now ruled out in the CMSSM at more than 95% confidence. Stop co-annihilation turns out to be one of the most promising mechanisms for achieving an appropriate relic density of dark matter in all three models, whilst avoiding all other constraints. We find high-likelihood regions of parameter space featuring light stops and charginos, making them potentially detectable in the near future at the LHC. We also show that tonne-scale direct detection will play a largely complementary role, probing large parts of the remaining viable parameter space, including essentially all models with multi-TeV neutralinos. (orig.)
5. Predicting the sparticle spectrum from GUTs via SUSY threshold corrections with SusyTC
Energy Technology Data Exchange (ETDEWEB)
Antusch, Stefan [Department of Physics, University of Basel,Klingelbergstr. 82, CH-4056 Basel (Switzerland); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut),Föhringer Ring 6, D-80805 München (Germany); Sluka, Constantin [Department of Physics, University of Basel,Klingelbergstr. 82, CH-4056 Basel (Switzerland)
2016-07-21
Grand Unified Theories (GUTs) can feature predictions for the ratios of quark and lepton Yukawa couplings at high energy, which can be tested with the increasingly precise results for the fermion masses, given at low energies. To perform such tests, the renormalization group (RG) running has to be performed with sufficient accuracy. In supersymmetric (SUSY) theories, the one-loop threshold corrections (TC) are of particular importance and, since they affect the quark-lepton mass relations, link a given GUT flavour model to the sparticle spectrum. To accurately study such predictions, we extend and generalize various formulas in the literature which are needed for a precision analysis of SUSY flavour GUT models. We introduce the new software tool SusyTC, a major extension to the Mathematica package REAP http://dx.doi.org/10.1088/1126-6708/2005/03/024, where these formulas are implemented. SusyTC extends the functionality of REAP by a full inclusion of the (complex) MSSM SUSY sector and a careful calculation of the one-loop SUSY threshold corrections for the full down-type quark, up-type quark and charged lepton Yukawa coupling matrices in the electroweak-unbroken phase. Among other useful features, SusyTC calculates the one-loop corrected pole mass of the charged (or the CP-odd) Higgs boson as well as provides output in SLHA conventions, i.e. the necessary input for external software, e.g. for performing a two-loop Higgs mass calculation. We apply SusyTC to study the predictions for the parameters of the CMSSM (mSUGRA) SUSY scenario from the set of GUT scale Yukawa relations ((y{sub e})/(y{sub d}))=−(1/2), ((y{sub μ})/(y{sub s}))=6, and ((y{sub τ})/(y{sub b}))=−(3/2), which has been proposed recently in the context of SUSY GUT flavour models.
6. Where is SUSY?
CERN Multimedia
Antonella Del Rosso
2012-01-01
Recent information from the LHC experiments, the relatively low mass of the new boson and other data coming from experiments looking for dark matter worldwide are placing new constraints on the existence of supersymmetry (SUSY). However, there is a large community of scientists that still believes that SUSY particles are out there. Like lost keys at night, perhaps we have been looking for SUSY under the wrong lamp-posts… Can you work out this rebus? Source: Caroline Duc. So far, SUSY is “just” a theoretical physics model, which could solve problems beyond the Standard Model by accounting for dark matter and other phenomena in the Universe. However, SUSY has not been spotted so far, and might be hiding because of features different from what physicists previously expected. “Currently, there is no evidence for SUSY, but neither has any experimental data ruled it out. Many searches have focused on simplified versions of the theory but, given the recen...
7. Testing SUSY
CERN Document Server
Cassel, S; Ross, G G
2010-01-01
If SUSY provides a solution to the hierarchy problem then supersymmetric states should not be too heavy. This requirement is quantified by the Barbieri-Giudice fine tuning measure that provides a quantitative test of SUSY as a solution to the hierarchy problem. The measure is useful in correlating the impact of the various experimental measurements relevant to the search for supersymmetry and also in identifying the most sensitive measurements for testing SUSY. In this paper we apply the measure to the CMSSM, computing it to two-loop order and taking account of current experimental limits and the constraint on dark matter abundance. Using this we determine the present limits on the CMSSM parameter space and identify the measurements at the LHC that are most significant in covering the remaining parameter space. Without imposing the LEP Higgs mass bound we show that the smallest fine tuning (1:14.5) consistent with a saturation of the relic density within the 1$\\sigma$ WMAP bounds corresponds to a Higgs mass o...
8. Sparticle mass hierarchies, simplified models from SUGRA unification, and benchmarks for LHC Run-II SUSY searches
International Nuclear Information System (INIS)
Francescone, David; Akula, Sujeet; Altunkaynak, Baris; Nath, Pran
2015-01-01
Sparticle mass hierarchies contain significant information regarding the origin and nature of supersymmetry breaking. The hierarchical patterns are severely constrained by electroweak symmetry breaking as well as by the astrophysical and particle physics data. They are further constrained by the Higgs boson mass measurement. The sparticle mass hierarchies can be used to generate simplified models consistent with the high scale models. In this work we consider supergravity models with universal boundary conditions for soft parameters at the unification scale as well as supergravity models with nonuniversalities and delineate the list of sparticle mass hierarchies for the five lightest sparticles. Simplified models can be obtained by a truncation of these, retaining a smaller set of lightest particles. The mass hierarchies and their truncated versions enlarge significantly the list of simplified models currently being used in the literature. Benchmarks for a variety of supergravity unified models appropriate for SUSY searches at future colliders are also presented. The signature analysis of two benchmark models has been carried out and a discussion of the searches needed for their discovery at LHC Run-II is given. An analysis of the spin-independent neutralino-proton cross section exhibiting the Higgs boson mass dependence and the hierarchical patterns is also carried out. It is seen that a knowledge of the spin-independent neutralino-proton cross section and the neutralino mass will narrow down the list of the allowed sparticle mass hierarchies. Thus dark matter experiments along with analyses for the LHC Run-II will provide strong clues to the nature of symmetry breaking at the unification scale.
9. Search for Higgs Bosons in SUSY Cascades in CMS and Dark Matter with Non-universal Gaugino Masses
CERN Document Server
Huitu, Katri; Laamanen, Jari; Lehti, Sami; Roy, Sourov; Salminen, Tapio
2008-01-01
In grand unified theories (GUT), non-universal boundary conditions for the gaugino masses may arise at the unification scale, and affect the observability of the neutral MSSM Higgs bosons (h/H/A) at the LHC. The implications of such non-universal gaugino masses are investigated for the Higgs boson production in the SUSY cascade decay chain gluino --> squark quark, squark --> neutralino_2 quark, neutralino_2 --> neutralino_1 h/H/A, h/H/A --> b b-bar produced in pp interactions. In the singlet representation with universal gaugino masses only the light Higgs boson can be produced in this cascade with the parameter region of interest for us, while with non-universal gaugino masses heavy neutral MSSM Higgs boson production may dominate. The allowed parameter space in the light of the WMAP constraints on the cold dark matter relic density is investigated in the above scenarios for gaugino mass parameters. We also demonstrate that combination of representations can give the required amount of dark matter in any poi...
10. Naturalness, SUSY heavy higgses and flavor constraints
CERN Multimedia
CERN. Geneva
2014-01-01
I will demonstrate that supersymmetric (SUSY) higgses provide an important diagnostic for electroweak naturalness in the SUSY paradigm. I first review the naturalness problem of the Standard Model (SM) and SUSY as one of its most promising solutions. I study the masses of heavy Higgses in SUSY theories under broad assumptions, and show how they are constrained by their role in Electroweak symmetry breaking. I then show how Flavor Physics severely constrains large parts of SUSY parameter space, otherwise favored by naturalness. If SUSY Higgses are not discovered at relatively low mass during the next LHC run, this tension will further increase, disfavoring naturalness from SUSY.
11. SUSY Unparticle and Conformal Sequestering
Energy Technology Data Exchange (ETDEWEB)
Nakayama, Yu; Nakayama, Yu
2007-07-17
We investigate unparticle physics with supersymmetry (SUSY). The SUSY breaking effects due to the gravity mediation induce soft masses for the SUSY unparticles and hence break the conformal invariance. The unparticle physics observable in near future experiments is only consistent if the SUSY breakingeffects from the hidden sector to the standard model sector are dominated by the gauge mediation, or if the SUSY breaking effects to the unparticle sector are sufficiently sequestered. We argue that the natural realization of the latter possibility is the conformal sequestering scenario.
12. Soft SUSY breaking parameters and RG running of squark and slepton masses in large volume Swiss Cheese compactifications
International Nuclear Information System (INIS)
Misra, Aalok; Shukla, Pramod
2010-01-01
We consider type IIB large volume compactifications involving orientifolds of the Swiss Cheese Calabi-Yau WCP 4 [1,1,1,6,9] with a single mobile space-time filling D3-brane and stacks of D7-branes wrapping the 'big' divisor Σ B (as opposed to the 'small' divisor usually done in the literature thus far) as well as supporting D7-brane fluxes. After reviewing our proposal of (Misra and Shukla, 2010) for resolving a long-standing tension between large volume cosmology and phenomenology pertaining to obtaining a 10 12 GeV gravitino in the inflationary era and a TeV gravitino in the present era, and summarizing our results of (Misra and Shukla, 2010) on soft supersymmetry breaking terms and open-string moduli masses, we discuss the one-loop RG running of the squark and slepton masses in mSUGRA-like models (using the running of the gaugino masses) to the EW scale in the large volume limit. Phenomenological constraints and some of the calculated soft SUSY parameters identify the D7-brane Wilson line moduli as the first two generations/families of squarks and sleptons and the D3-brane (restricted to the big divisor) position moduli as the two Higgses for MSSM-like models at TeV scale. We also discuss how the obtained open-string/matter moduli make it easier to impose FCNC constraints, as well as RG flow of off-diagonal squark mass(-squared) matrix elements.
13. Soft SUSY breaking parameters and RG running of squark and slepton masses in large volume Swiss Cheese compactifications
Science.gov (United States)
Misra, Aalok; Shukla, Pramod
2010-03-01
We consider type IIB large volume compactifications involving orientifolds of the Swiss Cheese Calabi-Yau WCP[1,1,1,6,9] with a single mobile space-time filling D3-brane and stacks of D7-branes wrapping the “big” divisor ΣB (as opposed to the “small” divisor usually done in the literature thus far) as well as supporting D7-brane fluxes. After reviewing our proposal of [1] (Misra and Shukla, 2010) for resolving a long-standing tension between large volume cosmology and phenomenology pertaining to obtaining a 10 GeV gravitino in the inflationary era and a TeV gravitino in the present era, and summarizing our results of [1] (Misra and Shukla, 2010) on soft supersymmetry breaking terms and open-string moduli masses, we discuss the one-loop RG running of the squark and slepton masses in mSUGRA-like models (using the running of the gaugino masses) to the EW scale in the large volume limit. Phenomenological constraints and some of the calculated soft SUSY parameters identify the D7-brane Wilson line moduli as the first two generations/families of squarks and sleptons and the D3-brane (restricted to the big divisor) position moduli as the two Higgses for MSSM-like models at TeV scale. We also discuss how the obtained open-string/matter moduli make it easier to impose FCNC constraints, as well as RG flow of off-diagonal squark mass(-squared) matrix elements.
14. SUSY Searches at ATLAS
CERN Document Server
Mamuzic, Judita; The ATLAS collaboration
2017-01-01
Supersymmetry (SUSY) is considered one of the best motivated extensions of the Standard Model. It postulates a fundamental symmetry between fermions and bosons, and introduces a set of new supersymmetric particles at the electroweak scale. It addresses the hierarchy and naturalness problem, gives a solution to the gauge coupling unification, and offers a cold dark matter candidate. Different aspects of SUSY searches, using strong, electroweak, third generation production, and R-parity violation and long lived particles are being studied at the LHC. An overview of most recent SUSY searches results using the 13 TeV ATLAS RUN2 data will be presented.
15. Gluino reach and mass extraction at the LHC in radiatively-driven natural SUSY
Energy Technology Data Exchange (ETDEWEB)
Baer, Howard; Savoy, Michael; Sengupta, Dibyashree [University of Oklahoma, Department of Physics and Astronomy, Norman, OK (United States); Barger, Vernon [University of Wisconsin, Department of Physics, Madison, WI (United States); Gainer, James S.; Tata, Xerxes [University of Hawaii, Department of Physics and Astronomy, Honolulu, HI (United States); Huang, Peisi [University of Chicago, Enrico Fermi Institute, Chicago, IL (United States); HEP Division, Argonne National Laboratory, Argonne, IL (United States); Texas A and M University, Mitchell Institute for Fundamental Physics and Astronomy, College Station, TX (United States)
2017-07-15
Radiatively-driven natural SUSY (RNS) models enjoy electroweak naturalness at the 10% level while respecting LHC sparticle and Higgs mass constraints. Gluino and top-squark masses can range up to several TeV (with other squarks even heavier) but a set of light Higgsinos are required with mass not too far above m{sub h} ∝ 125 GeV. Within the RNS framework, gluinos dominantly decay via g → tt{sub 1}{sup *}, anti tt{sub 1} → t anti tZ{sub 1,2} or t anti bW{sub 1}{sup -} + c.c., where the decay products of the higgsino-like W{sub 1} and Z{sub 2} are very soft. Gluino pair production is, therefore, signaled by events with up to four hard b-jets and large E{sub T}. We devise a set of cuts to isolate a relatively pure gluino sample at the (high-luminosity) LHC and show that in the RNS model with very heavy squarks, the gluino signal will be accessible for m{sub g} < 2400 (2800) GeV for an integrated luminosity of 300 (3000) fb{sup -1}. We also show that the measurement of the rate of gluino events in the clean sample mentioned above allows for a determination of m{sub g} with a statistical precision of 2-5% (depending on the integrated luminosity and the gluino mass) over the range of gluino masses where a 5σ discovery is possible at the LHC. (orig.)
16. Precise Higgs mass calculations in (non-)minimal supersymmetry at both high and low scales
Energy Technology Data Exchange (ETDEWEB)
Athron, Peter [Monash Univ., Victoria (Australia). School of Physics and Astronomy; Park, Jae-hyeon [Korea Institute for Advanced Study, Seoul (Korea, Republic of). Quantum Universe Center; Steudtner, Tom; Stoeckinger, Dominik [TU Dresden (Germany). Inst. fuer Kern- und Teilchenphysik; Voigt, Alexander [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2016-09-15
We present FlexibleEFTHiggs, a method for calculating the SM-like Higgs pole mass in SUSY (and even non-SUSY) models, which combines an effective field theory approach with a diagrammatic calculation. It thus achieves an all order resummation of leading logarithms together with the inclusion of all non-logarithmic 1-loop contributions. We implement this method into FlexibleSUSY and study its properties in the MSSM, NMSSM, E{sub 6}SSM and MRSSM. In the MSSM, it correctly interpolates between the known results of effective field theory calculations in the literature for a high SUSY scale and fixed-order calculations in the full theory for a sub-TeV SUSY scale. We compare our MSSM results to those from public codes and identify the origin of the most significant deviations between the DR programs. We then perform a similar comparison in the remaining three non-minimal models. For all four models we estimate the theoretical uncertainty of FlexibleEFTHiggs and the fixed-order DR programs thereby finding that the former becomes more precise than the latter for a SUSY scale above a few TeV. Even for sub-TeV SUSY scales, FlexibleEFTHiggs maintains the uncertainty estimate around 2-3 GeV, remaining a competitive alternative to existing fixed-order computations.
17. Precise Higgs mass calculations in (non-)minimal supersymmetry at both high and low scales
Energy Technology Data Exchange (ETDEWEB)
Athron, Peter [ARC Centre of Excellence for Particle Physics at the Terascale,School of Physics and Astronomy, Monash University,Melbourne, Victoria 3800 (Australia); Park, Jae-hyeon [Quantum Universe Center, Korea Institute for Advanced Study,85 Hoegiro Dongdaemungu, Seoul 02455 (Korea, Republic of); Steudtner, Tom; Stöckinger, Dominik [Institut für Kern- und Teilchenphysik, TU Dresden,Zellescher Weg 19, 01069 Dresden (Germany); Voigt, Alexander [Deutsches Elektronen-Synchrotron DESY,Notkestraße 85, 22607 Hamburg (Germany)
2017-01-18
We present FlexibleEFTHiggs, a method for calculating the SM-like Higgs pole mass in SUSY (and even non-SUSY) models, which combines an effective field theory approach with a diagrammatic calculation. It thus achieves an all order resummation of leading logarithms together with the inclusion of all non-logarithmic 1-loop contributions. We implement this method into FlexibleSUSY and study its properties in the MSSM, NMSSM, E{sub 6}SSM and MRSSM. In the MSSM, it correctly interpolates between the known results of effective field theory calculations in the literature for a high SUSY scale and fixed-order calculations in the full theory for a sub-TeV SUSY scale. We compare our MSSM results to those from public codes and identify the origin of the most significant deviations between the (DR)-bar programs. We then perform a similar comparison in the remaining three non-minimal models. For all four models we estimate the theoretical uncertainty of FlexibleEFTHiggs and the fixed-order (DR)-bar programs thereby finding that the former becomes more precise than the latter for a SUSY scale above a few TeV. Even for sub-TeV SUSY scales, FlexibleEFTHiggs maintains the uncertainty estimate around 2–3 GeV, remaining a competitive alternative to existing fixed-order computations.
18. SUSY searches with the ATLAS detector
CERN Document Server
Ventura, Andrea; The ATLAS collaboration
2016-01-01
Despite the absence of experimental evidence, weak scale supersymmetry remains one of the best motivated and studied Standard Model extensions. This talk summarises recent ATLAS results for searches for supersymmetric (SUSY) particles, with focus on those obtained using proton-proton collisions at a centre of mass energy of 13 TeV. Strong production in both R-Parity conserving and R-Parity violating SUSY scenarios are considered. The searches involved final states including jets, missing transverse momentum, light leptons, as well as long-lived particle signatures.
19. Interplay of LFV and slepton mass splittings at the LHC as a probe of the SUSY seesaw
CERN Document Server
Abada, A; Romao, J C; Teixeira, A M
2010-01-01
We study the impact of a type-I SUSY seesaw concerning lepton flavour violation (LFV) both at low-energies and at the LHC. The study of the di-lepton invariant mass distribution at the LHC allows to reconstruct some of the masses of the different sparticles involved in a decay chain. In particular, the combination with other observables renders feasible the reconstruction of the masses of the intermediate sleptons involved in $\\chi_2^0\\to \\tilde \\ell \\,\\ell \\to \\ell \\,\\ell\\,\\chi_1^0$ decays. Slepton mass splittings can be either interpreted as a signal of non-universality in the SUSY soft breaking-terms (signalling a deviation from constrained scenarios as the cMSSM) or as being due to the violation of lepton flavour. In the latter case, in addition to these high-energy processes, one expects further low-energy manifestations of LFV such as radiative and three-body lepton decays. Under the assumption of a type-I seesaw as the source of neutrino masses and mixings, all these LFV observables are related. Worki...
20. Implications for new physics from fine-tuning arguments 1. Application to SUSY and seesaw cases
International Nuclear Information System (INIS)
Alberto Casas, J.; Hidalgo, Irene; Espinosa, Jose R.
2004-01-01
We revisit the standard argument to estimate the scale of new physics (NP) beyond the SM, based on the sensitivity of the Higgs mass to quadratic divergences. Although this argument is arguably naive, the corresponding estimate, Λ SM SM . One can obtain more precise implications from fine-tuning arguments in specific examples of NP. Here we consider SUSY and right-handed (seesaw) neutrinos. SUSY is a typical example for which the previous general estimate is indeed conservative: the MSSM is fine-tuned a few %, even for soft masses of a few hundred GeV. In contrast, other SUSY scenarios, in particular those with low-scale SUSY breaking, can easily saturate the general bound on Λ SM . The seesaw mechanism requires large fine-tuning if M R > or approx.10 7 GeV, unless there is additional NP (SUSY being a favourite option). (author)
1. Reach of the Fermilab Tevatron and CERN LHC for gaugino mediated SUSY breaking models
International Nuclear Information System (INIS)
Baer, Howard; Belyaev, Alexander; Krupovnickas, Tadas; Tata, Xerxes
2002-01-01
In supersymmetric models with gaugino mediated SUSY breaking (gMSB), it is assumed that SUSY breaking on a hidden brane is communicated to the visible brane via gauge superfields which propagate in the bulk. This leads to GUT models where the common gaugino mass m 1/2 is the only soft SUSY breaking term to receive contributions at the tree level. To obtain a viable phenomenology, it is assumed that the gaugino mass is induced at some scale M c beyond the GUT scale, and that additional renormalization group running takes place between M c and M GUT as in a SUSY GUT. We assume an SU(5) SUSY GUT above the GUT scale, and compute the SUSY particle spectrum expected in models with gMSB. We use the Monte Carlo program ISAJET to simulate signals within the gMSB model, and compute the SUSY reach including cuts and triggers appropriate to Fermilab Tevatron and CERN LHC experiments. We find no reach for SUSY by the Tevatron collider in the trilepton channel. At the CERN LHC, values of m 1/2 =1000 (1160) GeV can be probed with 10 (100) fb -1 of integrated luminosity, corresponding to a reach in terms of m g-tilde of 2150 (2500) GeV. The gMSB model and MSUGRA can likely only be differentiated at a linear e + e - collider with sufficient energy to produce sleptons and charginos
2. Electroweak SUSY production searches at ATLAS and CMS
CERN Document Server
Flowerdew, M; The ATLAS collaboration
2014-01-01
The discovery of weak-scale supersymmetric (SUSY) particles is one of the primary goals of the Large Hadron Collider experiments. Depending on the mechanism of SUSY breaking, it could be that strongly interacting squarks and gluinos are too massive to produce at the LHC. In this case, the primary SUSY production mode is of charginos, neutralinos and sleptons, mediated by electroweak interactions. However, the experimental signatures for discovery vary widely, depending on the mass hierarchy, SUSY particle mixing parameters and conservation/violation of R-parity, necessitating a large and complex suite of experimental search strategies. These strategies include searching for events with multiple charged leptons, photons, reconstructed higgs bosons or new long-lived particles. In this presentation, the latest ATLAS and CMS search results in these channels are presented, based mainly on $20~$fb$^{-1}$ of $pp$ collisions at $\\sqrt{s} = 8~$TeV collected in 2012. The resulting constraints on the parameter spaces of...
3. EW SUSY production searches at ATLAS and CMS
CERN Document Server
Flowerdew, MJ; The ATLAS collaboration
2014-01-01
The discovery of weak-scale supersymmetric (SUSY) particles is one of the primary goals of the Large Hadron Collider experiments. Depending on the mechanism of SUSY breaking, it could be that strongly interacting squarks and gluinos are too massive to produce at the LHC. In this case, the primary SUSY production mode is of charginos, neutralinos and sleptons, mediated by electroweak interactions. However, the experimental signatures for discovery vary widely, depending on the mass hierarchy, SUSY particle mixing parameters and conservation/violation of R-parity, necessitating a large and complex suite of experimental search strategies. These strategies include searching for events with multiple charged leptons, photons, reconstructed higgs bosons or new long-lived particles. In this presentation, the latest ATLAS and CMS search results in these channels are presented, based mainly on 20 fb$^{-1}$ of pp collisions at $\\sqrt{s} = 8$ TeV collected in 2012. The resulting constraints on the parameter spaces of var...
4. SUSY Without Prejudice
International Nuclear Information System (INIS)
Berger, C.
2008-01-01
We begin an exploration of the physics associated with the general CP-conserving MSSM with Minimal Flavor Violation, the pMSSM. The 19 soft SUSY breaking parameters in this scenario are chosen so as to satisfy all existing experimental and theoretical constraints assuming that the WIMP is a thermal relic, i.e., the lightest neutralino. We scan this parameter space twice using both flat and log priors for the soft SUSY breaking mass parameters and compare the results which yield similar conclusions. Detailed constraints from both LEP and the Tevatron searches play a particularly important role in obtaining our final model samples. We find that the pMSSM leads to a much broader set of predictions for the properties of the SUSY partners as well as for a number of experimental observables than those found in any of the conventional SUSY breaking scenarios such as mSUGRA. This set of models can easily lead to atypical expectations for SUSY signals at the LHC
5. SUSY Search at LHC
CERN Document Server
Xu, Da; The ATLAS collaboration
2018-01-01
Despite the absence of experimental evidence, weak scale supersymmetry remains one of the best motivated and studied Standard Model extensions. This talk gives an overview of the most recent SUSY searches in ATLAS and CMS experiments using 13 TeV ATLAS Run2 data.
6. Non-universal SUSY breaking, hierarchy and squark degeneracty
International Nuclear Information System (INIS)
Murayama, Hitoshi.
1995-01-01
I discuss non-trivial effects in the soft SUSY breaking terms which appear when one integrates out heavy fields. The effects exist only when the SUSY breaking terms are non-universal. They may spoil (1) the hierarchy between the weak and high-energy scales, or (2) degeneracy among the squark masses even in the presense of a horizontal symmetry. I argue, in the end, that such new effects may be useful in probing physics at high-energy scales from TeV-scale experiments
7. Initial conditions for inflation and the energy scale of SUSY-breaking from the (nearly) gaussian sky
CERN Document Server
Álvarez-Gaumé, Luis; Jimenez, Raul
We show how general initial conditions for small field inflation can be obtained in multi-field models. This is provided by non-linear angular friction terms in the inflaton that provide a phase of non-slow-roll inflation before the slow-roll inflation phase. This in turn provides a natural mechanism to star small-field slow-roll at nearly zero velocity for arbitrary initial conditions. We also show that there is a relation between the scale of SUSY breaking sqrt (f) and the amount of non-gaussian fluctuations generated by the inflaton. In particular, we show that in the local non-gaussian shape there exists the relation sqrt (f) = 10^{13} GeV sqrt (f_NL). With current observational limits from Planck, and adopting the minimum amount of non-gaussian fluctuations allowed by single-field inflation, this provides a very tight constraint for the SUSY breaking energy scale sqrt (f) = 3-7 x 10^{13} GeV at 95% confidence. Further limits, or detection, from next year's Planck polarisation data will further tighten th...
8. Improved GUT and SUSY breaking by the same field
International Nuclear Information System (INIS)
Agashe, Kaustubh
2000-01-01
In a previous paper [hep-ph/9809421; Phys. Lett. B 444 (1998) 61], we presented a model in which the same modulus field breaks SUSY and a simple GUT gauge group, and which has dynamical origins for both SUSY breaking and GUT scales. In this model, the supergravity (SUGRA) and gauge mediated contributions to MSSM scalar and gaugino masses are comparable -- this enables a realistic spectrum to be attained since the gauge mediated contribution to the right-handed (RH) slepton (mass) 2 (at the weak scale) by itself (i.e., neglecting SUGRA contribution to sfermion and gaugino masses) is negative. But, in general, the SUGRA contribution to sfermion masses (from non-renormalizable contact Kaehler terms) leads to flavor violation. In this paper, we use the recently proposed idea of gaugino mediated SUSY breaking ( g-tilde MSB) to improve the above model. With MSSM matter and SUSY breaking fields localized on separate branes in an extra dimension of size R∼5M -1 Pl (in which gauge fields propagate), the SUGRA contribution to sfermion masses (which violates flavor) is suppressed. As in 4 dimensions, MSSM gauginos acquire non-universal masses from both SUGRA and gauge mediation - gaugino masses (in particular the SUGRA contribution to gaugino masses), in turn, generate acceptable sfermion masses through renormalization group evolution; the phenomenology is discussed briefly. We also point out that (a) in models where SUSY is broken by a GUT non-singlet field, there is, in general, a contribution to MSSM gaugino (and scalar) masses from the coupling to heavy gauge multiplet which might be comparable to the SUGRA contribution and (b) models of gauge mediation proposed earlier which also have negative RH slepton (mass) 2 can be rendered viable using the g-tilde MSB idea
9. Quark and lepton masses at the GUT scale including supersymmetric threshold corrections
International Nuclear Information System (INIS)
Antusch, S.; Spinrath, M.
2008-01-01
We investigate the effect of supersymmetric (SUSY) threshold corrections on the values of the running quark and charged lepton masses at the grand unified theory (GUT) scale within the large tanβ regime of the minimal supersymmetric standard model. In addition to the typically dominant SUSY QCD contributions for the quarks, we also include the electroweak contributions for quarks and leptons and show that they can have significant effects. We provide the GUT scale ranges of quark and charged lepton Yukawa couplings as well as of the ratios m μ /m s , m e /m d , y τ /y b and y t /y b for three example ranges of SUSY parameters. We discuss how the enlarged ranges due to threshold effects might open up new possibilities for constructing GUT models of fermion masses and mixings.
10. Lifshitz-sector mediated SUSY breaking
International Nuclear Information System (INIS)
Pospelov, Maxim; Tamarit, Carlos
2014-01-01
We propose a novel mechanism of SUSY breaking by coupling a Lorentz-invariant supersymmetric matter sector to non-supersymmetric gravitational interactions with Lifshitz scaling. The improved UV properties of Lifshitz propagators moderate the otherwise uncontrollable ultraviolet divergences induced by gravitational loops. This ensures that both the amount of induced Lorentz violation and SUSY breaking in the matter sector are controlled by Λ HL 2 /M P 2 , the ratio of the Hořava-Lifshitz cross-over scale Λ HL to the Planck scale M P . This ratio can be kept very small, providing a novel way of explicitly breaking supersymmetry without reintroducing fine-tuning. We illustrate our idea by considering a model of scalar gravity with Hořava-Lifshitz scaling coupled to a supersymmetric Wess-Zumino matter sector, in which we compute the two-loop SUSY breaking corrections to the masses of the light scalars due to the gravitational interactions and the heavy fields
11. FlexibleSUSY-A spectrum generator generator for supersymmetric models
Science.gov (United States)
Athron, Peter; Park, Jae-hyeon; Stöckinger, Dominik; Voigt, Alexander
2015-05-01
We introduce FlexibleSUSY, a Mathematica and C++ package, which generates a fast, precise C++ spectrum generator for any SUSY model specified by the user. The generated code is designed with both speed and modularity in mind, making it easy to adapt and extend with new features. The model is specified by supplying the superpotential, gauge structure and particle content in a SARAH model file; specific boundary conditions e.g. at the GUT, weak or intermediate scales are defined in a separate FlexibleSUSY model file. From these model files, FlexibleSUSY generates C++ code for self-energies, tadpole corrections, renormalization group equations (RGEs) and electroweak symmetry breaking (EWSB) conditions and combines them with numerical routines for solving the RGEs and EWSB conditions simultaneously. The resulting spectrum generator is then able to solve for the spectrum of the model, including loop-corrected pole masses, consistent with user specified boundary conditions. The modular structure of the generated code allows for individual components to be replaced with an alternative if available. FlexibleSUSY has been carefully designed to grow as alternative solvers and calculators are added. Predefined models include the MSSM, NMSSM, E6SSM, USSM, R-symmetric models and models with right-handed neutrinos.
12. Simplified SUSY at the ILC
Energy Technology Data Exchange (ETDEWEB)
Berggren, Mikael
2013-08-15
At the ILC, one has the possibility to search for SUSY in an model-independent way: The corner-stone of SUSY is that sparticles couple as particles. This is independent of the mechanism responsible for SUSY breaking. Any model will have one Lightest SUSY Particle (LSP), and one Next to Lightest SUSY Particle (NLSP). In models with conserved R-parity, the NLSP must decay solely to the LSP and the SM partner of the NLSP. Therefore, studying NLSP production and decay can be regarded as a ''simplified model without simplification'': Any SUSY model will have such a process. The NLSP could be any sparticle: a slepton, an electroweak-ino, or even a squark. However, since there are only a finite number of sparticles, one can systematically search for signals of all possible NLSP:s. This way, the entire space of models that have a kinematically reachable NLSP can be covered. For any NLSP, the ''worst case'' can be determined, since the SUSY principle allows to calculate the cross-section once the NLSP nature and mass are given. The region in the LSP-NLSP mass-plane where the ''worst case'' could be discovered or excluded experimentally can be found by estimating background and efficiency at each point in the plane. From experience at LEP, it is expected that the lower signal-to background ratio will indeed be found for models with conserved R-parity. In this document, we show that at the ILC, such a program is possible, as it was at LEP. No loop-holes are left, even for difficult or non-standard cases: whatever the NLSP is it will be detectable.
13. Simplified SUSY at the ILC
International Nuclear Information System (INIS)
Berggren, Mikael
2013-08-01
At the ILC, one has the possibility to search for SUSY in an model-independent way: The corner-stone of SUSY is that sparticles couple as particles. This is independent of the mechanism responsible for SUSY breaking. Any model will have one Lightest SUSY Particle (LSP), and one Next to Lightest SUSY Particle (NLSP). In models with conserved R-parity, the NLSP must decay solely to the LSP and the SM partner of the NLSP. Therefore, studying NLSP production and decay can be regarded as a ''simplified model without simplification'': Any SUSY model will have such a process. The NLSP could be any sparticle: a slepton, an electroweak-ino, or even a squark. However, since there are only a finite number of sparticles, one can systematically search for signals of all possible NLSP:s. This way, the entire space of models that have a kinematically reachable NLSP can be covered. For any NLSP, the ''worst case'' can be determined, since the SUSY principle allows to calculate the cross-section once the NLSP nature and mass are given. The region in the LSP-NLSP mass-plane where the ''worst case'' could be discovered or excluded experimentally can be found by estimating background and efficiency at each point in the plane. From experience at LEP, it is expected that the lower signal-to background ratio will indeed be found for models with conserved R-parity. In this document, we show that at the ILC, such a program is possible, as it was at LEP. No loop-holes are left, even for difficult or non-standard cases: whatever the NLSP is it will be detectable.
14. Natural SUSY endures
Energy Technology Data Exchange (ETDEWEB)
Papucci, Michele; Ruderman, Joshua T. [Lawrence Berkeley National Laboratory, CA (United States). Theoretical Physics Group; California Univ., Berkeley, CA (United States). Dept. of Physics; Weiler, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); European Organization for Nuclear Research, Geneva (Switzerland). Theoretical Physics Div.
2011-10-31
The first 1 fb{sup -1} of LHC searches have set impressive limits on new colored particles decaying to missing energy. We address the implication of these searches for naturalness in supersymmetry (SUSY). General bottom-up considerations of natural electroweak symmetry breaking show that higgsinos, stops, and the gluino should not be too far above the weak scale. The rest of the spectrum, including the squarks of the first two generations, can be heavier and beyond the current LHC reach. We have used collider simulations to determine the limits that all of the 1 fb{sup -1} searches pose on higgsinos, stops, and the gluino. We find that stops and the left-handed sbottom are starting to be constrained and must be heavier than about 200-300 GeV when decaying to higgsinos. The gluino must be heavier than about 600-800 GeV when it decays to stops and sbottoms. While these findings point toward scenarios with a lighter third generation split from the other squarks, we do find that moderately-tuned regions remain, where the gluino is just above 1 TeV and all the squarks are degenerate and light. Among all the searches, jets plus missing energy and same-sign dileptons often provide the most powerful probes of natural SUSY. Overall, our results indicate that natural SUSY has survived the first 1 fb{sup -1} of data. The LHC is now on the brink of exploring the most interesting region of SUSY parameter space. (orig.)
15. SUSY long-lived massive particles. Detection and physics at the LHC
International Nuclear Information System (INIS)
Ambrosiano, S.; Mele, B.; Nisati, A.; Petrarca, S.; Polesello, G.; Rimoldi, A.; Salvini, G.
2001-01-01
It was drawn a possible scenario for the observation of massive long-lived charged particles at the LHC detector ATLAS. The required flexibility of the detector triggers and of the identification and reconstruction systems are discussed. As an example, it was focused on the measurement of the mass and lifetime of long-lived charged sleptons predicted in the framework of supersymmetric models with gauge-mediated supersymmetry (SUSY) breaking. In this case the next-to-lightest SUSY particle can be the light scalar partner of the tau lepton (τ 1 ), possibly decaying slowly into a gravitino. A wide region of the SUSY parameters space was explored. The accessible range and precision on the measurement of the SUSY breaking scale parameter of √ F achievable with a counting method are assessed [it
16. Mass quantization in quantum and susy cosmological models with matter content
International Nuclear Information System (INIS)
Ortiz, C; Socorro, J; Tkach, V I; Torres, J; Rosales, J
2005-01-01
We present the study of the quantum closed Friedmann-Robertson-Walker (FRW) cosmological model with a matter content given by a perfect fluid with barotropic state equation p = γρ The Wheeler-DeWitt equation is viewed as the Schroedinger equation for the linear harmonic oscillator with energy E. Such type of Universe has quantized masses of the order of the Planck mass and harmonic oscillator wave functions. Then, we consider the n = 2 supersymmetric superfield approach for the same model and obtain a normalizable wave function (at zero energy) of the universe. Besides, the mass parameter spectrum is found in the Schroedinger picture, being similar to those obtained by other methods, using a black hole system
17. Recent SUSY results in ATLAS
CERN Document Server
Mamuzic, Judita; The ATLAS collaboration
2018-01-01
Supersymmetry (SUSY) is considered one of the best motivated extensions of the Standard Model. It postulates a fundamental symmetry between fermions and bosons, and introduces a set of new supersymmetric particles at the electroweak scale. It addresses the hierarchy and natu- ralness problem, gives a solution to the gauge couplings unification, and offers a cold dark matter candidate. Different aspects of SUSY searches, using strong, electroweak, third generation production, R-parity violation models, and long lived particles are being studied at the LHC. An overview of most recent results in SUSY searches using Run 2 ATLAS data, at 13 TeV with 36.1 fb−1 of integrated luminosity, was presented.
18. What is a natural SUSY scenario?
Energy Technology Data Exchange (ETDEWEB)
Casas, J. Alberto; Moreno, Jesús M.; Robles, Sandra; Rolbiecki, Krzysztof [Instituto de Física Teórica, IFT-UAM/CSIC, Universidad Autónoma de Madrid,Cantoblanco, 28049 Madrid (Spain); Zaldívar, Bryan [Service de Physique Théorique, Université Libre de Bruxelles,Boulevard du Triomphe, CP225, 1050 Brussels (Belgium)
2015-06-11
The idea of “Natural SUSY', understood as a supersymmetric scenario where the fine-tuning is as mild as possible, is a reasonable guide to explore supersymmetric phenomenology. In this paper, we re-examine this issue in the context of the MSSM including several improvements, such as the mixing of the fine-tuning conditions for different soft terms and the presence of potential extra fine-tunings that must be combined with the electroweak one. We give tables and plots that allow to easily evaluate the fine-tuning and the corresponding naturalness bounds for any theoretical model defined at any high-energy (HE) scale. Then, we analyze in detail the complete fine-tuning bounds for the unconstrained MSSM, defined at any HE scale. We show that Natural SUSY does not demand light stops. Actually, an average stop mass below 800 GeV is disfavored, though one of the stops might be very light. Regarding phenomenology, the most stringent upper bound from naturalness is the one on the gluino mass, which typically sets the present level fine-tuning at O(1%). However, this result presents a strong dependence on the HE scale. E.g. if the latter is 10{sup 7} GeV the level of fine-tuning is ∼ four times less severe. Finally, the most robust result of Natural SUSY is by far that Higgsinos should be rather light, certainly below 700 GeV for a fine-tuning of O(1%) or milder. Incidentally, this upper bound is not far from ≃1 TeV, which is the value required if dark matter is made of Higgsinos.
19. SUSY signals at DESY HERA in the no-scale flipped SU(5) supergravity model
Energy Technology Data Exchange (ETDEWEB)
Lopez, J.L.; Nanopoulos, D.V.; Wang, X.; Zichichi, A. (Center for Theoretical Physics, Department of Physics, Texas A M University, College Station, Texas 77843-4242 (United States) Astroparticle Physics Group, Houston Advanced Research Center (HARC), The Woodlands, Texas 77381 (United States) CERN, Geneva (Switzerland))
1993-11-01
Sparticle production and detection at DESY HERA are studied within the recently proposed no-scale flipped SU(5) supergravity model. Among the various reaction channels that could lead to sparticle production at HERA, only the following are within its limit of sensitivity in this model: [ital e][sup [minus
20. High scale parity invariance as a solution to the SUSY CP problem ...
It is shown that if the supersymmetric Standard Model (MSSM) emerges as the low energy limit of a high scale left–right symmetric gauge structure, the number of uncontrollable CP violating phases of MSSM are drastically reduced. In particular it guarantees the vanishing of the dangerous phases that were at the root of the ...
1. Constraints of chromoelectric dipole moments to natural SUSY type sfermion spectrum
Science.gov (United States)
Maekawa, Nobuhiro; Muramatsu, Yu; Shigekami, Yoshihiro
2017-06-01
We investigate the lower bounds of sfermion masses from the constraints of chromoelectric dipole moments (CEDMs) in the natural SUSY-type sfermion mass spectrum, in which stop mass mt ˜ is much smaller than the other sfermion masses m0. The natural SUSY-type sfermion mass spectrum has been studied since the supersymmetric (SUSY) flavor-changing neutral currents (FCNC) are suppressed because of large sfermion masses of the first two generations, and the weak scale is stabilized because of the light stop. However, this type of sfermion mass spectrum is severely constrained by CEDM, because the light stop contributions to the up quark CEDM are not decoupled in the limit m0→∞ , while the down quark CEDM is decoupled in the limit. It is important that the constraints are severe even if SUSY-breaking parameters (and Higgsino mass) are taken to be real because complex diagonalizing matrices of Yukawa matrices, which are from complex Yukawa couplings, generate nonvanishing C P phases in off-diagonal elements of sfermion mass matrices. We calculate the CEDM of up and down quarks numerically in the minimal SUSY standard model, and give the lower bounds for stop mass and the other sfermion masses. We show that the lower bound of stop mass becomes 7 TeV to satisfy the CEDM constraints from Hg EDM. The result is not acceptable if the weak scale stability is considered seriously. We show that if the up-type Yukawa couplings are taken to be real at the grand unification scale, the CEDM constraints are satisfied even if mt ˜˜1 TeV .
2. Prospects for axion detection in natural SUSY with mixed axion-higgsino dark matter: back to invisible?
Energy Technology Data Exchange (ETDEWEB)
Bae, Kyu Jung [Center for Theoretical Physics of the Universe, Institute for Basic Science (IBS), Daejeon 34051 (Korea, Republic of); Baer, Howard; Serce, Hasan, E-mail: [email protected], E-mail: [email protected], E-mail: [email protected] [Department of Physics and Astronomy, University of Oklahoma, Norman, OK 73019 (United States)
2017-06-01
Under the expectation that nature is natural, we extend the Standard Model to include SUSY to stabilize the electroweak sector and PQ symmetry to stabilize the QCD sector. Then natural SUSY arises from a Kim-Nilles solution to the SUSY μ problem which allows for a little hierarchy where μ∼ f {sub a} {sup 2}/ M {sub P} {sub ∼} 100−300 GeV while the SUSY particle mass scale m {sub SUSY}∼ 1−10 TeV >> μ. Dark matter then consists of two particles: a higgsino-like WIMP and a SUSY DFSZ axion. The range of allowed axion mass values m {sub a} depends on the mixed axion-higgsino relic density. The range of m {sub a} is actually restricted in this case by limits on WIMPs from direct and indirect detection experiments. We plot the expected axion detection rate at microwave cavity experiments. The axion-photon-photon coupling is severely diminished by charged higgsino contributions to the anomalous coupling. In this case, the axion may retreat, at least temporarily, back into the regime of near invisibility. From our results, we urge new ideas for techniques which probe both deeper and more broadly into axion coupling versus axion mass parameter space.
3. D-term contributions and CEDM constraints in E6 × SU(2)F × U(1)A SUSY GUT model
Science.gov (United States)
Shigekami, Yoshihiro
2017-11-01
We focus on E6 × SU(2)F × U(1)A supersymmetric (SUSY) grand unified theory (GUT) model. In this model, realistic Yukawa hierarchies and mixings are realized by introducing all allowed interactions with 𝓞(1) coefficients. Moreover, we can take stop mass is smaller than the other sfermion masses. This type of spectrum called by natural SUSY type sfermion mass spectrum can suppress the SUSY contributions to flavor changing neutral current (FCNC) and stabilize weak scale at the same time. However, light stop predicts large up quark CEDM and stop contributions are not decoupled. Since there is Kobayashi-Maskawa phase, stop contributions to the up quark CEDM is severely constrained even if all SUSY breaking parameters and Higgsino mass parameter μ are real. In this model, real up Yukawa couplings are realized at the GUT scale because of spontaneous CP violation. Therefore CEDM bounds are satisfied, although up Yukawa couplings are complex at the SUSY scale through the renormalization equation group effects. We calculated the CEDMs and found that EDM constraints can be satisfied even if stop mass is 𝓞(1) TeV. In addition, we investigate the size of D-terms in this model. Since these D-term contributions is flavor dependent, the degeneracy of sfermion mass spectrum is destroyed and the size of D-term is strongly constrained by FCNCs when SUSY breaking scale is the weak scale. However, SUSY breaking scale is larger than 1 TeV in order to obtain 125 GeV Higgs mass, and therefore sizable D-term contribution is allowed. Furthermore, we obtained the non-trivial prediction for the difference of squared sfermion mass.
4. Lifshitz-sector mediated SUSY breaking
OpenAIRE
Pospelov, MaximDepartment of Physics and Astronomy, University of Victoria, Victoria, BC, V8P 5C2, Canada; Tamarit, Carlos(Perimeter Institute for Theoretical Physics, Waterloo, ON, N2L 2Y5, Canada)
2014-01-01
We propose a novel mechanism of SUSY breaking by coupling a Lorentz-invariant supersymmetric matter sector to non-supersymmetric gravitational interactions with Lifshitz scaling. The improved UV properties of Lifshitz propagators moderate the otherwise uncontrollable ultraviolet divergences induced by gravitational loops. This ensures that both the amount of induced Lorentz violation and SUSY breaking in the matter sector are controlled by ${{{\\Lambda_{\\mathrm{HL}}^2}} \\left/ {{M_P^2}} \\righ... 5. B-L mediated SUSY breaking with radiative B-L symmetry breaking International Nuclear Information System (INIS) Kikuchi, Tatsuru; Kubo, Takayuki 2008-01-01 We explore a mechanism of radiative B-L symmetry breaking in analogous to the radiative electroweak symmetry breaking. The breaking scale of B-L symmetry is related to the neutrino masses through the see-saw mechanism. Once we incorporate the U(1) B-L gauge symmetry in SUSY models, the U(1) B-L gaugino, Z-tilde B-L appears, and it can mediate the SUSY breaking (Z-prime mediated SUSY breaking) at around the scale of 10 6 GeV. Then we find a links between the neutrino mass (more precisly the see-saw or B-L scale of order 10 6 GeV) and the Z-prime mediated SUSY breaking scale. It is also very interesting that the gluino at the weak scale becomes relatively light, and almost compressed mass spectra for the gaugino sector can be realized in this scenario, which is very interesting in scope of the LHC. 6. Peccei-Quinn invariant singlet extended SUSY with anomalous U(1) gauge symmetry Energy Technology Data Exchange (ETDEWEB) Im, Sang Hui; Seo, Min-Seok [Center for Theoretical Physics of the Universe, Institute for Basic Science (IBS),Daejeon 305-811 (Korea, Republic of) 2015-05-13 Recent discovery of the SM-like Higgs boson with m{sub h}≃125 GeV motivates an extension of the minimal supersymmetric standard model (MSSM), which involves a singlet Higgs superfield with a sizable Yukawa coupling to the doublet Higgs superfields. We examine such singlet-extended SUSY models with a Peccei-Quinn (PQ) symmetry that originates from an anomalous U(1){sub A} gauge symmetry. We focus on the specific scheme that the PQ symmetry is spontaneously broken at an intermediate scale v{sub PQ}∼√(m{sub SUSY}M{sub Pl}) by an interplay between Planck scale suppressed operators and tachyonic soft scalar mass m{sub SUSY}∼√(D{sub A}) induced dominantly by the U(1){sub A}D-term D{sub A}. This scheme also results in spontaneous SUSY breaking in the PQ sector, generating the gaugino masses M{sub 1/2}∼√(D{sub A}) when it is transmitted to the MSSM sector by the conventional gauge mediation mechanism. As a result, the MSSM soft parameters in this scheme are induced mostly by the U(1){sub A}D-term and the gauge mediated SUSY breaking from the PQ sector, so that the sparticle masses can be near the present experimental bounds without causing the SUSY flavor problem. The scheme is severely constrained by the condition that a phenomenologically viable form of the low energy operators of the singlet and doublet Higgs superfields is generated by the PQ breaking sector in a way similar to the Kim-Nilles solution of the μ problem, and the resulting Higgs mass parameters allow the electroweak symmetry breaking with small tan β. We find two minimal models with two singlet Higgs superfields, satisfying this condition with a relatively simple form of the PQ breaking sector, and briefly discuss some phenomenological aspects of the model. 7. Determining SUSY model parameters and masses at the LHC using cross sections, kinematic edges and other observables CERN Document Server White, M J; Parker, M A 2005-01-01 We address the problem of mass measurements of supersymmetric particles at the Large Hadron Collider, using the ATLAS detector as an example. By using Markov Chain sampling techniques to combine standard measurements of kinematic edges in the invariant mass distributions of decay products with a measurement of a missing$p_T$cross-section, we show that the precision of mass measurements at the LHC can be dramatically improved, even when we do not assume that we have measured the kinematic endpoints precisely, or that we have identified exactly which particles are involved in the decay chain causing the endpoints. The generality of the technique is demonstrated in a preliminary investigation of a non-universal SUGRA model, in which we relax the requirements of mSUGRA by breaking the degeneracy of the GUT scale gaugino masses. The model studied is compatible with the WMAP limits on dark matter relic density. 8. Higgs, Binos and Gluinos: Split Susy within Reach Energy Technology Data Exchange (ETDEWEB) Alves, Daniele S.M.; Izaguirre, Eder; /SLAC /Stanford U., Phys. Dept.; Wacker, Jay G.; /SLAC /Stanford U., ITP 2012-09-14 Recent results from the LHC for the Higgs boson with mass between 142 GeV {approx}< m{sub h{sup 0}} {approx}< 147 GeV points to PeV-scale Split Supersymmetry. This article explores the consequences of a Higgs mass in this range and possible discovery modes for Split Susy. Moderate lifetime gluinos, with decay lengths in the 25 {micro}m to 10 yr range, are its imminent smoking gun signature. The 7TeV LHC will be sensitive to the moderately lived gluinos and trilepton signatures from direct electroweakino production. Moreover, the dark matter abundance may be obtained from annihilation through an s-channel Higgs resonance, with the LSP almost purely bino and mass m{sub {chi}{sub 1}{sup 0}} {approx_equal} 70 GeV. The Higgs resonance region of Split Susy has visible signatures in dark matter direct and indirect detection and electric dipole moment experiments. If the anomalies go away, the majority of Split Susy parameter space will be excluded. 9. RPV SUSY searches at ATLAS and CMS CERN Document Server Pettersson, Nora Emilia; The ATLAS collaboration 2015-01-01 Experimental searches for Supersymmetry (SUSY) at the Large Hadronic Collider (LHC) often assume R-Parity Conservation (RPC) to avoid proton decay. A consequence RPC is that it implies a stable SUSY-particle that cannot decay. The search strategies are strongly based on the hypothesize of weakly interacting massive particles escaping without detection - yielding missing transverse energy (MET) to the collision events. It is vital to explore all possibilities considering that no observation of SUSY has been made and that strong exclusions already have been placed on RPC-SUSY scenarios. Introducing individually baryon- and lepton-number violating couplings in R-Parity Violating (RPV) models would avoid rapid proton decay. The strong mass and cross-section exclusion set for RPC-SUSY are weaken if RPV couplings are allowed in the SUSY Lagrangian - as these standard searches lose sensitivity due to less expected MET. This talk aims to summarise a few of the experimental searches for both prompt and long-lived RPV ... 10. SUSY meets her twin Energy Technology Data Exchange (ETDEWEB) Katz, Andrey [Theory Division, CERN,CH-1211 Geneva 23 (Switzerland); Département de Physique Théorique and Center for Astroparticle Physics (CAP),Université de Genève,24 quai Ansermet, CH-1211 Genève 4 (Switzerland); Mariotti, Alberto [Theoretische Natuurkunde and IIHE/ELEM, Vrije Universiteit Brussel,and International Solvay Institutes,Pleinlaan 2, B-1050 Brussels (Belgium); Pokorski, Stefan [Institute of Theoretical Physics, Faculty of Physics, University of Warsaw,ul. Pasteura 5, PL-02-093 Warsaw (Poland); Redigolo, Diego [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University,Tel-Aviv 69978 (Israel); Department of Particle Physics and Astrophysics, Weizmann Institute of Science,Rehovot 7610001 (Israel); Ziegler, Robert [Institute for Theoretical Particle Physics (TTP), Karlsruhe Institute of Technology,Engesserstraße 7, D-76128 Karlsruhe (Germany) 2017-01-31 We investigate the general structure of mirror symmetry breaking in the Twin Higgs scenario. We show, using the IR effective theory, that a significant gain in fine tuning can be achieved if the symmetry is broken hardly. We emphasize that weakly coupled UV completions can naturally accommodate this scenario. We analyze SUSY UV completions and present a simple Twin SUSY model with a tuning of around 10% and colored superpartners as heavy as 2 TeV. The collider signatures of general Twin SUSY models are discussed with a focus on the extended Higgs sectors. 11. A continuous family of realistic SUSY SU(5) GUTs Energy Technology Data Exchange (ETDEWEB) Bajc, Borut, E-mail: [email protected] [J. Stefan Institute, Jamova cesta 39, 1000, Ljubljana (Slovenia) 2016-06-21 It is shown that the minimal renormalizable supersymmetric SU(5) is still realistic providing the supersymmetric scale is at least few tens of TeV or large R-parity violating terms are considered. In the first case the vacuum is metastable, and different consistency constraints can give a bounded allowed region in the tan β − m{sub susy} plane. In the second case the mass eigenstate electron (down quark) is a linear combination of the original electron (down quark) and Higgsino (heavy colour triplet), and the mass ratio of bino and wino is determined. Both limits lead to light gravitino dark matter. 12. Searches for Electroweak SUSY by ATLAS and CMS CERN Document Server Khoo, Teng Jian; The ATLAS collaboration 2018-01-01 While strongly-produced SUSY and third-generation squark searches have already breached the TeV mass range, direct production of electroweak gauginos is less tightly constrained. New searches are presented, showcasing novel strategies for filling in the gaps in sensitivity to electroweak SUSY at ATLAS and CMS. 13. Susy and Such International Nuclear Information System (INIS) Dawson, S. 1997-01-01 In these lectures, the author discusses the theoretical motivation for supersymmetric theories and introduce the minimal low energy effective supersymmetric theory, (MSSM). I consider only the MSSM and its simplest grand unified extension here. Some of the other possible low-energy SUSY models are summarized. The particles and their interactions are examined in detail in the next sections and a grand unified SUSY model presented which gives additional motivation for pursuing supersymmetric theories 14. SUSY naturalness without prejudice CERN Document Server Ghilencea, D M 2014-01-01 Unlike the Standard Model (SM), supersymmetric models stabilize the electroweak (EW) scale$v$at the quantum level and {\\it predict} that$v$is a function of the TeV-valued SUSY parameters ($\\gamma_\\alpha$) of the UV Lagrangian. We show that the (inverse of the) covariance matrix of the model in the basis of these parameters and the usual deviation$\\delta\\chi^2$(from$\\chi^2_{min}$of a model) automatically encode information about the "traditional" EW fine-tuning measuring this stability, {\\it provided that} the EW scale$v\\sim m_Z$is indeed regarded as a function$v=v(\\gamma)$. It is known that large EW fine-tuning may signal an incomplete theory of soft terms and can be reduced when relations among$\\gamma_\\alpha$exist (due to GUT symmetries, etc). The global correlation coefficient of this matrix can help one investigate if such relations are present. An upper bound on the usual EW fine-tuning measure ("in quadrature") emerges from the analysis of the$\\delta\\chi^2$and the s-standard deviation conf... 15. SUSY naturalness without prejudice Science.gov (United States) Ghilencea, D. M. 2014-05-01 Unlike the Standard Model (SM), supersymmetric models stabilize the electroweak (EW) scale v at the quantum level and predict that v is a function of the TeV-valued SUSY parameters (γα) of the UV Lagrangian. We show that the (inverse of the) covariance matrix of the model in the basis of these parameters and the usual deviation δχ2 (from χmin2 of a model) automatically encode information about the "traditional" EW fine-tuning measuring this stability, provided that the EW scale v ˜mZ is indeed regarded as a function v =v(γ). It is known that large EW fine-tuning may signal an incomplete theory of soft terms and can be reduced when relations among γα exist (due to GUT symmetries, etc.). The global correlation coefficient of this matrix can help one investigate if such relations are present. An upper bound on the usual EW fine-tuning measure ("in quadrature") emerges from the analysis of the δχ2 and the s-standard deviation confidence interval by using v =v(γ) and the theoretical approximation (loop order) considered for the calculation of the observables. This upper bound avoids subjective criteria for the "acceptable" level of EW fine-tuning for which the model is still "natural." 16. Yukawa unification in moduli-dominant SUSY breaking International Nuclear Information System (INIS) Khalil, S.; Tatsuo Kobayashi 1997-07-01 We study Yukawa in string models with moduli-dominant SUSY breaking. This type of SUSY breaking in general leads to non-universal soft masses, i.e. soft scalar masses and gaugino masses. Such non-universality is important for phenomenological aspects of Yukawa unification, i.e., successful electroweak breaking, SUSY corrections to the bottom mass and the branching ratio of b → sγ. We show three regions in the whole parameter space which lead to successful electroweak breaking and allow small SUSY corrections to the bottom mass. For these three regions we investigated the b → sγ decay and mass spectra. (author). 26 refs, 6 figs 17. Heavy quark hadron mass scale International Nuclear Information System (INIS) Anderson, J.T. 1994-01-01 Without the spin interactions the hardron masses within a multiplet are degenerate. The light quark hadron degenerate mulitplet mass spectrum is extended from the 3 quark ground state multiplets at J P =0 - , 1/2 + , 1 - to include the excited states which follow the spinorial decomposition of SU(2)xSU(2). The mass scales for the 4, 5, 6, .. quark hadrons are obtained from the degenerate multiplet mass m 0 /M=n 2 /α with n=4, 5, 6, .. The 4, 5, 6, .. quark hadron degenerate multiplet masses follow by splitting of the heavy quark mass scales according to the spinorial decomposition of SU(2)xSU(2). (orig.) 18. Cosmological origin of mass scales International Nuclear Information System (INIS) Terazawa, H. 1981-01-01 We discuss the possibility that spontaneous breakdown of conformal invariance due to the very existence of our universe originates all the mass (or length) scales ranging from the Planck mass (approx. 10 19 GeV) to the Hubble constant (approx. 10 -42 GeV) and suggest that the photon may have a curvature-dependent mass which is as small as 10 -42 GeV. We also present a possible clue to Dirac's large number hypothesis. (orig.) 19. Cosmological origin of mass scales International Nuclear Information System (INIS) Terazawa, Hidezumi. 1981-02-01 We discuss the possibility that spontaneous breakdown of conformal invariance due to the very existence of our universe originates all the mass (or length) scales ranging from the Planck mass (--10 19 GeV) to the Hubble constant (--10 -42 GeV) and suggest that the photon may have a curvature-dependent mass which is as small as 10 -42 GeV. We also present a possible clue to the Dirac's large number hypothesis. (author) 20. Spontaneous SUSY breaking without R symmetry in supergravity Science.gov (United States) Maekawa, Nobuhiro; Omura, Yuji; Shigekami, Yoshihiro; Yoshida, Manabu 2018-03-01 We discuss spontaneous supersymmetry (SUSY) breaking in a model with an anomalous U (1 )A symmetry. In this model, the size of the each term in the superpotential is controlled by the U (1 )A charge assignment and SUSY is spontaneously broken via the Fayet-Iliopoulos of U (1 )A at the metastable vacuum. In the global SUSY analysis, the gaugino masses become much smaller than the sfermion masses, because an approximate R symmetry appears at the SUSY breaking vacuum. In this paper, we show that gaugino masses can be as large as gravitino mass, taking the supergravity effect into consideration. This is because the R symmetry is not imposed so that the constant term in the superpotential, which is irrelevant to the global SUSY analysis, largely contributes to the soft SUSY breaking terms in the supergravity. As the mediation mechanism, we introduce the contributions of the field not charged under U (1 )A and the moduli field to cancel the anomaly of U (1 )A. We comment on the application of our SUSY breaking scenario to the grand unified theory. 1. Minimal SUSY SO(10) and Yukawa unification International Nuclear Information System (INIS) Okada, Nobuchika 2013-01-01 The minimal supersymmetric (SUSY) SO(10) model, where only two Higgs multiplets {10⊕126-bar} are utilized for Yukawa couplings with matter fields, can nicely fit the neutrino oscillation parameters as well as charged fermion masses and mixing angles. In the fitting of the fermion mass matrix data, the largest element in the Yukawa coupling with the 126-bar -plet Higgs (Y 126 ) is found to be of order one, so that the right see-saw scale should be provided by Higgs vacuum expectation values (VEVs) of β(10 14 GeV). This fact causes a serious problem, namely, the gauge coupling unification is spoiled because of the presence of many exotic Higgs multiples emerging at the see-saw scale. In order to solve this problem, we consider a unification between bottom-quark and tau Yukawa couplings (b - τ Yukawa coupling unification) at the grand unified theory (GUT) scale, due to threshold corrections of superpartners to the Yukawa couplings at the 1 TeV scale. When the b - τ Yukawa coupling unification is very accurate, the largest element in Y 126 can become β(0.01), so that the right see-saw scale is realized by the GUT scale VEV and the usual gauge coupling unification is maintained. Since the b - τ Yukawa unification alters the Yukawa coupling data at the GUT scale, we re-analyze the fitting of the fermion mass matrix data by taking all the relevant free parameters into account. Unfortunately, we find that no parameter region shows up to give a nice fit for the current neutrino oscillation data and therefore, the usual picture of the gauge coupling unification cannot accommodate the fermion mass matrix data fitting in our procedure. 2. Susy seesaw inflation and NMSO(10)GUT International Nuclear Information System (INIS) Aulakh, Charanjit S. 2013-01-01 We show that Supersymmetric models with Type I seesaw neutrino masses support slow roll inflection point inflation. The inflaton is the D-flat direction labelled by the chiral invariant HLN composed of the Higgs(H), slepton(L) and conjugate sneutrino(N) superfields. The scale of inflation and fine tuning is set by the conjugate neutrino Majorana mass M ν c ∼ 10 6 - 10 12 GeV. The cubic term in the (quartic) inflaton potential is dominantly from superpotential (not soft Susy breaking) couplings. The tuning conditions are thus insensitive to soft supersymmetry breaking parameters and are generically much less stringent than for previous 'A-term' inflation scenarios controlled by mass scales ∼TeV. WMAP limits on the ratio of tensor to scalar perturbations limit the scale M controlling inflection point inflation: M 13 GeV. 'Instant preheating' is operative and dumps the inflaton energy into MSSM modes giving a high reheat temperature: T rh ≈M ν c (3/4) 10 6 GeV ∼ 10 11 - 10 15 GeV. A large gravitino mass > 50 TeV is therefore required to avoid over closure by reheat produced gravitinos. 'Instant preheating' and NLH inflaton facilitate production of right handed neutrinos during inflaton decay and thus non-thermal leptogenesis in addition to thermal leptogenesis. We show that the embedding in the fully realistic New Minimal Supersymmetric SO(10) GUT requires use of the heaviest righthanded neutrino mass as the controlling scale but the possibility of a measurable tensor scalar perturbation ratio seems marginal. We examine the parametric difficulties remaining. 3. We still love SUSY Energy Technology Data Exchange (ETDEWEB) Anon. 1992-11-15 Supersymmetry, affectionately known as SUSY, is still the darling of theoretical particle physics. Invented some 20 years ago, the charismatic idea really took off at the beginning of the 1980s. At the time, a workshop at CERN reflected the youthful enthusiasm for these new ideas. 4. SUSY GUT Model Building International Nuclear Information System (INIS) Raby, Stuart 2008-01-01 In this talk I discuss the evolution of SUSY GUT model building as I see it. Starting with 4 dimensional model building, I then consider orbifold GUTs in 5 dimensions and finally orbifold GUTs embedded into the E 8 xE 8 heterotic string. 5. We still love SUSY International Nuclear Information System (INIS) Anon. 1992-01-01 Supersymmetry, affectionately known as SUSY, is still the darling of theoretical particle physics. Invented some 20 years ago, the charismatic idea really took off at the beginning of the 1980s. At the time, a workshop at CERN reflected the youthful enthusiasm for these new ideas 6. Natural Higgs mass in supersymmetry from nondecoupling effects. Science.gov (United States) Lu, Xiaochuan; Murayama, Hitoshi; Ruderman, Joshua T; Tobioka, Kohsaku 2014-05-16 The Higgs mass implies fine-tuning for minimal theories of weak-scale supersymmetry (SUSY). Nondecoupling effects can boost the Higgs mass when new states interact with the Higgs boson, but new sources of SUSY breaking that accompany such extensions threaten naturalness. We show that two singlets with a Dirac mass can increase the Higgs mass while maintaining naturalness in the presence of large SUSY breaking in the singlet sector. We explore the modified Higgs phenomenology of this scenario, which we call the "Dirac next-to-minimal supersymmetric standard model." 7. Natural SUSY dark matter model International Nuclear Information System (INIS) Mohanty, Subhendra; Rao, Soumya; Roy, D.P. 2013-01-01 The most natural region of cosmologically compatible dark matter relic density in terms of low fine-tuning in a minimal supersymmetric standard model with nonuniversal gaugino masses is the so called bulk annihilation region. We study this region in a simple and predictive SUSY- GUT model of nonuniversal gaugino masses, where the latter transform as a combination of singlet plus a nonsinglet representation of the GUTgroup SU(5). The model prediction for the direct dark matter detection rates is well below the present CDMS and XENON100 limits, but within the reach of a future 1Ton XENON experiment. The most interesting and robust model prediction is an indirect detection signal of hard positron events, which resembles closely the shape of the observed positron spectrum from the PAMELA experiment. (author) 8. GUT Scale Fermion Mass Ratios International Nuclear Information System (INIS) Spinrath, Martin 2014-01-01 We present a series of recent works related to group theoretical factors from GUT symmetry breaking which lead to predictions for the ratios of quark and lepton Yukawa couplings at the unification scale. New predictions for the GUT scale ratios y μ /y s , y τ /y b and y t /y b in particular are shown and compared to experimental data. For this comparison it is important to include possibly large supersymmetric threshold corrections. Due to this reason the structure of the fermion masses at the GUT scale depends on TeV scale physics and makes GUT scale physics testable at the LHC. We also discuss how this new predictions might lead to predictions for mixing angles by discussing the example of the recently measured last missing leptonic mixing angle θ 13 making this new class of GUT models also testable in neutrino experiments 9. Overview of SUSY results from the ATLAS experiment Directory of Open Access Journals (Sweden) Federico Brazzale Simone 2014-04-01 Full Text Available The search for Supersymmetric extensions of the Standard Model (SUSY remains a hot topic in high energy phisycs in the light of the discovery of the Higgs boson with mass of 125 GeV. Supersymmetric particles can cancel out the quadratically-divergent loop corrections to the Higgs boson mass and can explain presence of Dark Matter in the Universe. Moreover, SUSY can unify the gauge couplings of the Standard Model at high energy scales. Under certain theoretical assumptions, some of the super-symmetric particles are preferred to be lighter than one TeV and their discovery can thus be accessible at the LHC. The recent results from searches for Supersymmetry with the ATLAS experiment which utilized up to 21 fb−1 of proton-proton collisions at a center of mass energy of 8 TeV are presented. These searches are focused on inclusive production of squarks and gluinos, on production of third generations squarks, and on electroweak production of charginos and neutralinos. Searches for long-lived particles and R-parity violation are also summarized in the document. 10. Unification of SUSY breaking and GUT breaking Energy Technology Data Exchange (ETDEWEB) Kobayashi, Tatsuo [Department of Physics, Hokkaido University,Sapporo 060-0810 (Japan); Omura, Yuji [Department of Physics, Nagoya University,Nagoya 464-8602 (Japan) 2015-02-18 We build explicit supersymmetric unification models where grand unified gauge symmetry breaking and supersymmetry (SUSY) breaking are caused by the same sector. Besides, the SM-charged particles are also predicted by the symmetry breaking sector, and they give the soft SUSY breaking terms through the so-called gauge mediation. We investigate the mass spectrums in an explicit model with SU(5) and additional gauge groups, and discuss its phenomenological aspects. Especially, nonzero A-term and B-term are generated at one-loop level according to the mediation via the vector superfields, so that the electro-weak symmetry breaking and 125 GeV Higgs mass may be achieved by the large B-term and A-term even if the stop mass is around 1 TeV. 11. R-symmetry violation in N=2 SUSY International Nuclear Information System (INIS) Volkov, G.G.; Maslikov, A.A. 1990-01-01 The present paper discusses the spontaneous R-symmetry violation in the N=2 SUSY SU(4)xU(1) model with soft SUSY breaking terms preserving finiteness. (In this case an invisible axion appears). In particular, the mechanism producting a light photino mass up to some GeV is suggested. In R-odd version of this model the mechanisms of enhancement of the neutrino decay is discussed. 10 refs.; 3 figs 12. Some features of SUSY breaking in N=2 supergravity International Nuclear Information System (INIS) Cecotti, S.; Giradello, L.; Porrati, M. 1984-08-01 We discuss some features of SUSY breaking in N=2 Supergravity. Firstly, we show that in a general N=2 Sugra model (constructed according to the tensor calculus) all stationary points of the potential, at Λ=0, are fully supersymmetric if the compensating multiplet is not gauged. Thus a viable super-Higgs effect in N=2 supergravity can occur only in the presence of a Fayet-Iliopoulos term. Then we present an explicit model with two scales of breaking in anti-de Sitter space. Moreover, the ratio of the two gravitino masses is sliding i.e. not determined by the classical potential. In the extreme situation one of the gravitino mass equals √-Λ/3, and thus we have partial super-Higgs (in AdS space). The cosmological constant may be arranged to an arbitrary small value while keeping the mass of the heavy gravitino constant. (author) 13. Latest news on SUSY from the ATLAS experiment CERN Multimedia CERN. Geneva 2016-01-01 Despite the absence of experimental evidence, weak scale supersymmetry remains one of the best motivated and studied Standard Model extensions. This talk reports the latest ATLAS results for searches for supersymmetric (SUSY) particles, obtained with 13 to 18 fb-1 of 13 TeV data. Weak and strong production in both R-Parity conserving and R-Parity violating SUSY scenarios are considered. The searches involved final states including jets, missing transverse momentum, light leptons, taus or photons. 14. Signatures of non-universal soft breaking sfermion masses at Hadron colliders International Nuclear Information System (INIS) Datta, Amitava; Datta, Aseshkrishna; Parida, M.K. 1997-12-01 We identify several mass patterns, within the framework of N = 1 SUGRA with nonuniversal soft breaking masses for the sfermions, which may significantly alter SUSY signals and the current squark-gluino mass limits from the Tevatron. These effects are illustrated in a SO(10) SUSY GUT with an intermediate mass scale, but the conclusions are also valid in SUSU SO(10) models with grand deserts. (author) 15. Kaehler geometry and SUSY mechanics International Nuclear Information System (INIS) Bellucci, Stefano; Nersessian, Armen 2001-01-01 We present two examples of SUSY mechanics related with Kaehler geometry. The first system is the N = 4 supersymmetric one-dimensional sigma-model proposed in hep-th/0101065. Another system is the N = 2 SUSY mechanics whose phase space is the external algebra of an arbitrary Kaehler manifold. The relation of these models with antisymplectic geometry is discussed 16. Extraction of the Susy and Higgs parameters International Nuclear Information System (INIS) Adam-Bourdarios, Claire 2010-01-01 If supersymmetry is discovered by the next generation of collider experiments, it will be crucial to determine its fundamental high-scale parameters. Three scenarios have been recently investigated by the SFitter collaboration : the case where the LHC 'only' measures a light Higgs like signal, the case where SUSY signal are discovered at the LHC, and the dream scenario, where LHC and ILC measurements can be combined. 17. Supersimplicity: a Remarkable High Energy SUSY Property International Nuclear Information System (INIS) Gounaris, G.J.; Renard, F.M. 2011-01-01 It is known that for any 2-to-2 process in MSSM, only the helicity conserving (HC) amplitudes survive asymptotically. Studying many such processes, at the 1-loop Electroweak (EW) order, it is found that their high energy HC amplitudes are determined by just three forms: a log-squared function of the ratio of two of the (s, t, u) variables, to which a π 2 is added; and two Sudakov-like ln- and ln 2 -terms accompanied by respective mass-dependent constants. Apart from a possible additional residual constant (which is also discussed), these HC amplitudes, may be expressed as linear combinations of the above three forms, with coefficients being rational functions of the (s, t, u) variables. This 1-loop property, called supersimplicity, is of course claimed for the 2-to-2 processes considered; but no violating examples are known at present. For ug → dW, supersimplicity is found to be a very good approximation at LHC energies, provided the SUSY scale is not too high. SM processes are also discussed, and their differences are explored. (authors) 18. R-Parity Violating SUSY Results from ATLAS and CMS CERN Document Server AUTHOR|(INSPIRE)INSPIRE-00360876; The ATLAS collaboration 2016-01-01 Experimental searches for Supersymmetry (SUSY) at the Large Hadronic Collider (LHC) often assume R-Parity Conservation (RPC) to avoid proton decay. A consequence of RPC is that it implies the existence of a stable SUSY-particle that cannot decay. The search strategies are strongly based on the hypothesize of weakly interacting massive particles escaping without detection - yielding missing transverse energy (MET) to the collision events. It is vital to explore all possibilities considering that no observation of SUSY has been made and that strong exclusions already have been placed on RPC-SUSY scenarios. Introducing individually baryon- and lepton-number violating couplings in R-Parity Violating (RPV) models would avoid rapid proton decay. The strong mass and cross-section exclusion set for RPC-SUSY are weaken if RPV couplings are allowed in the SUSY Lagrangian - as these standard searches lose sensitivity due to less expected MET. A summarization a few of the experimental searches for both prompt and long-li... 19. Hilltop supernatural inflation and SUSY unified models Science.gov (United States) Kohri, Kazunori; Lim, C. S.; Lin, Chia-Min; Mimura, Yukihiro 2014-01-01 In this paper, we consider high scale (100TeV) supersymmetry (SUSY) breaking and realize the idea of hilltop supernatural inflation in concrete particle physics models based on flipped-SU(5)and Pati-Salam models in the framework of supersymmetric grand unified theories (SUSY GUTs). The inflaton can be a flat direction including right-handed sneutrino and the waterfall field is a GUT Higgs. The spectral index is ns = 0.96 which fits very well with recent data by PLANCK satellite. There is no both thermal and non-thermal gravitino problems. Non-thermal leptogenesis can be resulted from the decay of right-handed sneutrino which plays (part of) the role of inflaton. 20. Hilltop supernatural inflation and SUSY unified models Energy Technology Data Exchange (ETDEWEB) Kohri, Kazunori [Cosmophysics Group, Theory Center, IPNS KEK, and The Graduate University for Advanced Studies (Sokendai), 1-1 Oho, Tsukuba, 305-0801 (Japan); Lim, C.S. [Department of Mathematics, Tokyo Woman' s Christian University, Tokyo, 167-8585 (Japan); Lin, Chia-Min [Department of Physics, Chuo University, Bunkyo-ku, Tokyo, 112 (Japan); Mimura, Yukihiro, E-mail: [email protected], E-mail: [email protected], E-mail: [email protected], E-mail: [email protected] [Department of Physics, National Taiwan University, Taipei, 10617 Taiwan (China) 2014-01-01 In this paper, we consider high scale (100TeV) supersymmetry (SUSY) breaking and realize the idea of hilltop supernatural inflation in concrete particle physics models based on flipped-SU(5)and Pati-Salam models in the framework of supersymmetric grand unified theories (SUSY GUTs). The inflaton can be a flat direction including right-handed sneutrino and the waterfall field is a GUT Higgs. The spectral index is n{sub s} = 0.96 which fits very well with recent data by PLANCK satellite. There is no both thermal and non-thermal gravitino problems. Non-thermal leptogenesis can be resulted from the decay of right-handed sneutrino which plays (part of) the role of inflaton. 1. Hilltop supernatural inflation and SUSY unified models International Nuclear Information System (INIS) Kohri, Kazunori; Lim, C.S.; Lin, Chia-Min; Mimura, Yukihiro 2014-01-01 In this paper, we consider high scale (100TeV) supersymmetry (SUSY) breaking and realize the idea of hilltop supernatural inflation in concrete particle physics models based on flipped-SU(5)and Pati-Salam models in the framework of supersymmetric grand unified theories (SUSY GUTs). The inflaton can be a flat direction including right-handed sneutrino and the waterfall field is a GUT Higgs. The spectral index is n s = 0.96 which fits very well with recent data by PLANCK satellite. There is no both thermal and non-thermal gravitino problems. Non-thermal leptogenesis can be resulted from the decay of right-handed sneutrino which plays (part of) the role of inflaton 2. Higgs mass determination in supersymmetry Energy Technology Data Exchange (ETDEWEB) Vega, Javier Pardo [Abdus Salam International Centre for Theoretical Physics, Strada Costiera 11, 34151, Trieste (Italy); SISSA International School for Advanced Studies and INFN Trieste, Via Bonomea 265, 34136, Trieste (Italy); Villadoro, Giovanni [Abdus Salam International Centre for Theoretical Physics, Strada Costiera 11, 34151, Trieste (Italy) 2015-07-29 We present the state-of-the-art of the effective field theory computation of the MSSM Higgs mass, improving the existing ones by including extra threshold corrections. We show that, with this approach, the theoretical uncertainty is within 1 GeV in most of the relevant parameter space. We confirm the smaller value of the Higgs mass found in the EFT computations, which implies a slightly heavier SUSY scale. We study the large tan β region, finding that sbottom thresholds might relax the upper bound on the scale of SUSY. We present SUSYHD, a fast computer code that computes the Higgs mass and its uncertainty for any SUSY scale, from the TeV to the Planck scale, even in Split SUSY, both in the (DR)-bar and in the on-shell schemes. Finally, we apply our results to derive bounds on some well motivated SUSY models, in particular we show how the value of the Higgs mass allows to determine the complete spectrum in minimal gauge mediation. 3. Post LHC8 SUSY benchmark points for ILC physics International Nuclear Information System (INIS) Baer, Howard; List, Jenny 2013-07-01 We re-evaluate prospects for supersymmetry at the proposed International Linear e + e - Collider (ILC) in light of the first two years of serious data taking at LHC: LHC7 with ∝5 fb -1 of pp collisions at √(s)=7 TeV and LHC8 with ∝20 fb -1 at √(s)=8 TeV. Strong new limits from LHC8 SUSY searches, along with the discovery of a Higgs boson with m h ≅125 GeV, suggest a paradigm shift from previously popular models to ones with new and compelling signatures. After a review of the current status of supersymmetry, we present a variety of new ILC benchmark models, including: natural SUSY, radiatively-driven natural SUSY (RNS), NUHM2 with low m A , a focus point case from mSUGRA/CMSSM, non-universal gaugino mass (NUGM) model, τ-coannihilation, Kallosh-Linde/spread SUSY model, mixed gauge-gravity mediation, normal scalar mass hierarchy (NMH), and one example with the recently discovered Higgs boson being the heavy CP-even state H. While all these models at present elude the latest LHC8 limits, they do offer intriguing case study possibilities for ILC operating at √(s)≅ 0.25-1 TeV. The benchmark points also present a view of the widely diverse SUSY phenomena which might still be expected in the post LHC8 era at both LHC and ILC. 4. Cornering natural SUSY at LHC Run II and beyond Science.gov (United States) Buckley, Matthew R.; Feld, David; Macaluso, Sebastian; Monteux, Angelo; Shih, David 2017-08-01 We derive the latest constraints on various simplified models of natural SUSY with light higgsinos, stops and gluinos, using a detailed and comprehensive reinterpretation of the most recent 13 TeV ATLAS and CMS searches with ˜ 15 fb-1 of data. We discuss the implications of these constraints for fine-tuning of the electroweak scale. While the most "vanilla" version of SUSY (the MSSM with R-parity and flavor-degenerate sfermions) with 10% fine-tuning is ruled out by the current constraints, models with decoupled valence squarks or reduced missing energy can still be fully natural. However, in all of these models, the mediation scale must be extremely low ( model-building directions for natural SUSY that are motivated by this work. 5. Electric dipole moments from spontaneous CP violation in SU(3)-flavoured SUSY International Nuclear Information System (INIS) Jones Perez, J 2009-01-01 The SUSY flavour problem is deeply related to the origin of flavour and hence to the origin of the SM Yukawa couplings themselves. Since all CP-violation in the SM is restricted to the flavour sector, it is possible that the SUSY CP problem is related to the origin of flavour as well. In this work, we present three variations of an SU(3) flavour model with spontaneous CP violation. Such models explain the hierarchy in the fermion masses and mixings, and predict the structure of the flavoured soft SUSY breaking terms. In such a situation, both SUSY flavour and CP problems do not exist. We use electric dipole moments and lepton flavour violation processes to distinguish between these models, and place constraints on the SUSY parameter space. 6. Leptogenesis scenarios for natural SUSY with mixed axion-higgsino dark matter International Nuclear Information System (INIS) Bae, Kyu Jung; Baer, Howard; Serce, Hasan; Zhang, Yi-Fan 2016-01-01 Supersymmetric models with radiatively-driven electroweak naturalness require light higgsinos of mass ∼ 100–300 GeV . Naturalness in the QCD sector is invoked via the Peccei-Quinn (PQ) axion leading to mixed axion-higgsino dark matter. The SUSY DFSZ axion model provides a solution to the SUSY μ problem and the Little Hierarchy μ|| m 3/2 may emerge as a consequence of a mismatch between PQ and hidden sector mass scales. The traditional gravitino problem is now augmented by the axino and saxion problems, since these latter particles can also contribute to overproduction of WIMPs or dark radiation, or violation of BBN constraints. We compute regions of the T R vs. m 3/2 plane allowed by BBN, dark matter and dark radiation constraints for various PQ scale choices f a . These regions are compared to the values needed for thermal leptogenesis, non-thermal leptogenesis, oscillating sneutrino leptogenesis and Affleck-Dine leptogenesis. The latter three are allowed in wide regions of parameter space for PQ scale f a∼ 10 10 –10 12 GeV which is also favored by naturalness: f a ∼ √μM P /λ μ ∼ 10 10 –10 12 GeV . These f a values correspond to axion masses somewhat above the projected ADMX search regions 7. SUSY Without Prejudice at Linear Colliders International Nuclear Information System (INIS) Rizzo, T. 2008-01-01 We explore the physics of the general CP-conserving MSSM with Minimal Flavor Violation, the pMSSM. The 19 soft SUSY breaking parameters are chosen so to satisfy all existing experimental and theoretical constraints assuming that the WIMP is the lightest neutralino. We scan this parameter space twice using both flat and log priors and compare the results which yield similar conclusions. Constraints from both LEP and the Tevatron play an important role in obtaining our final model samples. Implications for future TeV-scale e + e - linear colliders (LC) are discussed 8. Vast antimatter regions and SUSY-condensate baryogenesis International Nuclear Information System (INIS) Kirilova, D.; Panayotova, M.; Valchanov, T. 2002-10-01 Natural and abundant creation of antimatter in the Universe in a SUSY baryogenesis model is described. The scenario predicts vast quantities of antimatter, corresponding to galaxy and galaxy cluster scales, separated from the matter ones by baryonically empty voids. Observational constraints on such antimatter regions are discussed. (author) 9. Scaling properties of the transverse mass spectra International Nuclear Information System (INIS) Schaffner-Bielich, J. 2002-01-01 Motivated from the formation of an initial state of gluon-saturated matter, we discuss scaling relations for the transverse mass spectra at BNL's relativistic heavy-ion collider (RHIC). We show on linear plots, that the transverse mass spectra for various hadrons can be described by an universal function in m t . The transverse mass spectra for different centralities can be rescaled into each other. Finally, we demonstrate that m t -scaling is also present in proton-antiproton collider data and compare it to m t -scaling at RHIC. (orig.) 10. Low-scale gaugino mass unification International Nuclear Information System (INIS) Endo, M.; Yoshioka, K. 2008-04-01 We present a new class of scenarios with the gaugino mass unification at the weak scale. The unification conditions are generally classified and then, the mirage gauge mediation is explored where gaugino masses are naturally unified and scalar partners of quarks and leptons have no mass hierarchy. The low-energy mass spectrum is governed by the mirage of unified gauge coupling which is seen by low-energy observers. We also study several explicit models for dynamically realizing the TeV-scale unification. (orig.) 11. Low-scale gaugino mass unification Energy Technology Data Exchange (ETDEWEB) Endo, M [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Yoshioka, K [Kyoto Univ. (Japan). Dept. of Physics 2008-04-15 We present a new class of scenarios with the gaugino mass unification at the weak scale. The unification conditions are generally classified and then, the mirage gauge mediation is explored where gaugino masses are naturally unified and scalar partners of quarks and leptons have no mass hierarchy. The low-energy mass spectrum is governed by the mirage of unified gauge coupling which is seen by low-energy observers. We also study several explicit models for dynamically realizing the TeV-scale unification. (orig.) 12. Post LHC7 SUSY benchmark points for ILC physics Energy Technology Data Exchange (ETDEWEB) Baer, Howard [Oklahoma Univ., Norman, OK (United States); List, Jenny [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany) 2012-05-15 We re-evaluate prospects for supersymmetry at the proposed International Linear e{sup +}e{sup -} Collider (ILC) in light of the first year of serious data taking at LHC with {radical}(s)=7 TeV and {proportional_to}5 fb{sup -1} of pp collisions (LHC7). Strong new limits from LHC SUSY searches, along with a hint of a Higgs boson signal around m{sub h}{proportional_to}125 GeV, suggest a paradigm shift from previously popular models to ones with new and compelling signatures. We present a variety of new ILC benchmark models, including: natural SUSY, hidden SUSY, NUHM2 with low m{sub A}, non-universal gaugino mass (NUGM) model, pMSSM, Kallosh-Linde model, Bruemmer-Buchmueller model, normal scalar mass hierarchy (NMH) plus one surviving case from mSUGRA/CMSSM in the far focus point region. While all these models at present elude the latest LHC limits, they do offer intriguing case study possibilities for ILC operating at {radical}(s){proportional_to}0.25-1 TeV, and present a view of some of the diverse SUSY phenomena which might be expected at both LHC and ILC in the post LHC7 era. 13. Post LHC7 SUSY benchmark points for ILC physics International Nuclear Information System (INIS) Baer, Howard; List, Jenny 2012-05-01 We re-evaluate prospects for supersymmetry at the proposed International Linear e + e - Collider (ILC) in light of the first year of serious data taking at LHC with √(s)=7 TeV and ∝5 fb -1 of pp collisions (LHC7). Strong new limits from LHC SUSY searches, along with a hint of a Higgs boson signal around m h ∝125 GeV, suggest a paradigm shift from previously popular models to ones with new and compelling signatures. We present a variety of new ILC benchmark models, including: natural SUSY, hidden SUSY, NUHM2 with low m A , non-universal gaugino mass (NUGM) model, pMSSM, Kallosh-Linde model, Bruemmer-Buchmueller model, normal scalar mass hierarchy (NMH) plus one surviving case from mSUGRA/CMSSM in the far focus point region. While all these models at present elude the latest LHC limits, they do offer intriguing case study possibilities for ILC operating at √(s)∝0.25-1 TeV, and present a view of some of the diverse SUSY phenomena which might be expected at both LHC and ILC in the post LHC7 era. 14. METing SUSY on the Z peak Energy Technology Data Exchange (ETDEWEB) Barenboim, G.; Bernabeu, J.; Vives, O. [Universitat de Valencia, Departament de Fisica Teorica, Burjassot (Spain); Universitat de Valencia-CSIC, Parc Cientific U.V., IFIC, Paterna (Spain); Mitsou, V.A.; Romero, E. [Universitat de Valencia-CSIC, Parc Cientific U.V., IFIC, Paterna (Spain) 2016-02-15 Recently the ATLAS experiment announced a 3 σ excess at the Z-peak consisting of 29 pairs of leptons together with two or more jets, E{sub T}{sup miss} > 225 GeV and HT > 600 GeV, to be compared with 10.6 ± 3.2 expected lepton pairs in the Standard Model. No excess outside the Z-peak was observed. By trying to explain this signal with SUSY we find that only relatively light gluinos, m{sub g} or similar 400 GeV decaying predominantly to Z-boson plus a light gravitino, such that nearly every gluino produces at least one Z-boson in its decay chain, could reproduce the excess. We construct an explicit general gauge mediation model able to reproduce the observed signal overcoming all the experimental limits. Needless to say, more sophisticated models could also reproduce the signal, however, any model would have to exhibit the following features: light gluinos, or heavy particles with a strong production cross section, producing at least one Z-boson in its decay chain. The implications of our findings for the Run II at LHC with the scaling on the Z peak, as well as for the direct search of gluinos and other SUSY particles, are pointed out. (orig.) 15. METing SUSY on the Z peak International Nuclear Information System (INIS) Barenboim, G.; Bernabeu, J.; Vives, O.; Mitsou, V.A.; Romero, E. 2016-01-01 Recently the ATLAS experiment announced a 3 σ excess at the Z-peak consisting of 29 pairs of leptons together with two or more jets, E T miss > 225 GeV and HT > 600 GeV, to be compared with 10.6 ± 3.2 expected lepton pairs in the Standard Model. No excess outside the Z-peak was observed. By trying to explain this signal with SUSY we find that only relatively light gluinos, m g or similar 400 GeV decaying predominantly to Z-boson plus a light gravitino, such that nearly every gluino produces at least one Z-boson in its decay chain, could reproduce the excess. We construct an explicit general gauge mediation model able to reproduce the observed signal overcoming all the experimental limits. Needless to say, more sophisticated models could also reproduce the signal, however, any model would have to exhibit the following features: light gluinos, or heavy particles with a strong production cross section, producing at least one Z-boson in its decay chain. The implications of our findings for the Run II at LHC with the scaling on the Z peak, as well as for the direct search of gluinos and other SUSY particles, are pointed out. (orig.) 16. Search for compressed SUSY scenarios with the ATLAS detector CERN Document Server Maurer, Julien; The ATLAS collaboration 2017-01-01 Scenarios where multiple SUSY states are nearly degenerate in mass produce soft decay products, and they represent an experimental challenge for ATLAS. This talk presents recent results of analyses explicitly targeting such “compressed” scenarios with a variety of experimental techniques. All results make use of proton-proton collisions collected at a centre of mass of 13 TeV with the ATLAS detector. 17. Search for compressed SUSY scenarios with the ATLAS detector CERN Document Server Maurer, Julien; The ATLAS collaboration 2017-01-01 Scenarios where multiple SUSY states are nearly degenerate in mass produce soft decay products, and they represent an experimental challenge for ATLAS. This contribution presented recent results of analyses explicitly targeting such compressed'' scenarios with a variety of experimental techniques. All results made use of proton-proton collisions collected at a centre-of-mass energy of 13 TeV with the ATLAS detector at the LHC. 18. Post LHC8 SUSY benchmark points for ILC physics Energy Technology Data Exchange (ETDEWEB) Baer, Howard [Oklahoma Univ., Norman, OK (United States); List, Jenny [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany) 2013-07-15 We re-evaluate prospects for supersymmetry at the proposed International Linear e{sup +}e{sup -} Collider (ILC) in light of the first two years of serious data taking at LHC: LHC7 with {proportional_to}5 fb{sup -1} of pp collisions at {radical}(s)=7 TeV and LHC8 with {proportional_to}20 fb{sup -1} at {radical}(s)=8 TeV. Strong new limits from LHC8 SUSY searches, along with the discovery of a Higgs boson with m{sub h}{approx_equal}125 GeV, suggest a paradigm shift from previously popular models to ones with new and compelling signatures. After a review of the current status of supersymmetry, we present a variety of new ILC benchmark models, including: natural SUSY, radiatively-driven natural SUSY (RNS), NUHM2 with low m{sub A}, a focus point case from mSUGRA/CMSSM, non-universal gaugino mass (NUGM) model, {tau}-coannihilation, Kallosh-Linde/spread SUSY model, mixed gauge-gravity mediation, normal scalar mass hierarchy (NMH), and one example with the recently discovered Higgs boson being the heavy CP-even state H. While all these models at present elude the latest LHC8 limits, they do offer intriguing case study possibilities for ILC operating at {radical}(s){approx_equal} 0.25-1 TeV. The benchmark points also present a view of the widely diverse SUSY phenomena which might still be expected in the post LHC8 era at both LHC and ILC. 19. On dark matter selected high-scale supersymmetry Energy Technology Data Exchange (ETDEWEB) Zheng, Sibo [Department of Physics, Chongqing University,Chongqing 401331 (China) 2015-03-11 The prediction for the Higgs mass in the dark matter selected high-scale SUSY is explored. We show the bounds on SUSY-breaking scale in models of SM +w-tilde and SM +h-tilde/s-tilde due to the observed Higgs mass at the LHC. We propose that effective theory below scale m-tilde described by SM +w-tilde is possibly realized in gauge mediation with multiple spurion fields that exhibit significant mass hierarchy, and that by SM +h-tilde/s-tilde can be realized with direct singlet-messenger-messenger coupling for singlet Yukawa coupling λ∼(v/m-tilde){sup 1/2}g{sub SM}. Finally, the constraint on high-scale SUSY is investigated in the light of inflation physics if these two subjects are directly related. 20. Status of SUSY searches at the LHC (including SUSY Higgs bosons) CERN Document Server Marshall, Zach; The ATLAS collaboration 2017-01-01 We review the status of SUSY searches at the LHC, including searches for SUSY Higgs Bosons. ATLAS and CMS have both prepared a large number of search results on the full 2015+2016 dataset, pushing the bounds on SUSY further than ever before. 1. Neutrino mass as the probe of intermediate mass scales International Nuclear Information System (INIS) Senjanovic, G. 1980-01-01 A discussion of the calculability of neutrino mass is presented. The possibility of neutrinos being either Dirac or Majorana particles is analyzed in detail. Arguments are offered in favor of the Majorana case: the smallness of neutrino mass is linked to the maximality of parity violation in weak interactions. It is shown how the measured value of neutrino mass would probe the existence of an intermediate mass scale, presumably in the TeV region, at which parity is supposed to become a good symmetry. Experimental consequences of the proposed scheme are discussed, in particular the neutrino-less double β decay, where observation would provide a crucial test of the model, and rare muon decays such as μ → eγ and μ → ee anti e. Finally, the embedding of this model in an O(10) grand unified theory is analyzed, with the emphasis on the implications for intermediate mass scales that it offers. It is concluded that the proposed scheme provides a distinct and testable alternative for understanding the smallness of neutrino mass. 4 figures 2. Neutrino mass as the probe of intermediate mass scales Energy Technology Data Exchange (ETDEWEB) Senjanovic, G. 1980-01-01 A discussion of the calculability of neutrino mass is presented. The possibility of neutrinos being either Dirac or Majorana particles is analyzed in detail. Arguments are offered in favor of the Majorana case: the smallness of neutrino mass is linked to the maximality of parity violation in weak interactions. It is shown how the measured value of neutrino mass would probe the existence of an intermediate mass scale, presumably in the TeV region, at which parity is supposed to become a good symmetry. Experimental consequences of the proposed scheme are discussed, in particular the neutrino-less double ..beta.. decay, where observation would provide a crucial test of the model, and rare muon decays such as ..mu.. ..-->.. e..gamma.. and ..mu.. ..-->.. ee anti e. Finally, the embedding of this model in an O(10) grand unified theory is analyzed, with the emphasis on the implications for intermediate mass scales that it offers. It is concluded that the proposed scheme provides a distinct and testable alternative for understanding the smallness of neutrino mass. 4 figures. 3. The Challenge of Determining SUSY Parameters in Focus-Point-Inspired Cases CERN Document Server Rolbiecki, K.; Kalinowski, J.; Moortgat-Pick, G. 2006-01-01 We discuss the potential of combined LHC and ILC experiments for SUSY searches in a difficult region of the parameter space, in which all sfermion masses are above the TeV scale. Precision analyses of cross sections of light chargino production and forward--backward asymmetries of decay leptons and hadrons at the ILC, together with mass information on \\tilde{\\chi}^0_2 and squarks from the LHC, allow us to fit rather precisely the underlying fundamental gaugino/higgsino MSSM parameters and to constrain the masses of the heavy virtual sparticles. For such analyses the complete spin correlations between the production and decay processes have to be taken into account. We also took into account expected experimental uncertainties. 4. Scaling analysis of meteorite shower mass distributions DEFF Research Database (Denmark) Oddershede, Lene; Meibom, A.; Bohr, Jakob 1998-01-01 Meteorite showers are the remains of extraterrestrial objects which are captivated by the gravitational field of the Earth. We have analyzed the mass distribution of fragments from 16 meteorite showers for scaling. The distributions exhibit distinct scaling behavior over several orders of magnetude......; the observed scaling exponents vary from shower to shower. Half of the analyzed showers show a single scaling region while the orther half show multiple scaling regimes. Such an analysis can provide knowledge about the fragmentation process and about the original meteoroid. We also suggest to compare...... the observed scaling exponents to exponents observed in laboratory experiments and discuss the possibility that one can derive insight into the original shapes of the meteoroids.... 5. Where is SUSY? Indian Academy of Sciences (India) Amitava Datta 2017-10-05 Oct 5, 2017 ... out in details how the production of strongly interacting sparticles can ... C2 is large have masses ∼1 TeV (see [1] for a lucid exposition ... the Planck satellites have accurately measured the. DM relic .... plane corresponding to. 6. Supersymmetric grand unified theories from quarks to strings via SUSY GUTs CERN Document Server Raby, Stuart 2017-01-01 These course-tested lectures provide a technical introduction to Supersymmetric Grand Unified Theories (SUSY GUTs), as well as a personal view on the topic by one of the pioneers in the field. While the Standard Model of Particle Physics is incredibly successful in describing the known universe it is, nevertheless, an incomplete theory with many free parameters and open issues. An elegant solution to all of these quandaries is the proposed theory of SUSY GUTs. In a GUT, quarks and leptons are related in a simple way by the unifying symmetry and their electric charges are quantized, further the relative strength of the strong, weak and electromagnetic forces are predicted. SUSY GUTs additionally provide a framework for understanding particle masses and offer candidates for dark matter. Finally, with the extension of SUSY GUTs to string theory, a quantum-mechanically consistent unification of the four known forces (including gravity) is obtained. The book is organized in three sections: the first section contai... 7. Instantons versus SUSY International Nuclear Information System (INIS) Shifman, M.A.; Vainstejn, A.I.; Zakharov, V.I. 1985-01-01 This survey is a written version of lectures given at the Bakuriani Workshop on High Energy Physics, January, 1985. The authors discuss the recent discovery on a new phenomenon - dynamical symmetry breaking in supersymmetric gauge theories with matter - which is generated by instantons. Under a certain choice of the matter multiplets the gauge invariance is inevitably spontaneously broken, gauge bosons acquire masses, the evolution of the running coupling constant is frozen and there is a weak coupling regime. Sometimes the pattern includes also spontaneous supersymmetry breaking. Both basic aspects of the mechanism and particular dynamical scenarios realized in typical models are described 8. SLAM, a Mathematica interface for SUSY spectrum generators International Nuclear Information System (INIS) Marquard, Peter; Zerf, Nikolai 2013-09-01 We present and publish a Mathematica package, which can be used to automatically obtain any numerical MSSM input parameter from SUSY spectrum generators, which follow the SLHA standard, like SPheno, SOFTSUSY or Suspect. The package enables a very comfortable way of numerical evaluations within the MSSM using Mathematica. It implements easy to use predefined high scale and low scale scenarios like mSUGRA or m h max and if needed enables the user to directly specify the input required by the spectrum generators. In addition it supports an automatic saving and loading of SUSY spectra to and from a SQL data base, avoiding the rerun of a spectrum generator for a known spectrum. 9. SLAM, a Mathematica interface for SUSY spectrum generators Energy Technology Data Exchange (ETDEWEB) Marquard, Peter [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Zerf, Nikolai [Alberta Univ., Edmonton, AB (Canada). Dept. of Physics 2013-09-15 We present and publish a Mathematica package, which can be used to automatically obtain any numerical MSSM input parameter from SUSY spectrum generators, which follow the SLHA standard, like SPheno, SOFTSUSY or Suspect. The package enables a very comfortable way of numerical evaluations within the MSSM using Mathematica. It implements easy to use predefined high scale and low scale scenarios like mSUGRA or m{sub h}{sup max} and if needed enables the user to directly specify the input required by the spectrum generators. In addition it supports an automatic saving and loading of SUSY spectra to and from a SQL data base, avoiding the rerun of a spectrum generator for a known spectrum. 10. Fixed mass and scaling sum rules International Nuclear Information System (INIS) Ward, B.F.L. 1975-01-01 Using the correspondence principle (continuity in dynamics), the approach of Keppell-Jones-Ward-Taha to fixed mass and scaling current algebraic sum rules is extended so as to consider explicitly the contributions of all classes of intermediate states. A natural, generalized formulation of the truncation ideas of Cornwall, Corrigan, and Norton is introduced as a by-product of this extension. The formalism is illustrated in the familiar case of the spin independent Schwinger term sum rule. New sum rules are derived which relate the Regge residue functions of the respective structure functions to their fixed hadronic mass limits for q 2 → infinity. (Auth.) 11. Highlights on SUSY phenomenology International Nuclear Information System (INIS) Masiero, Antonio 2004-01-01 In spite of the extraordinary success of the Standard Model (SM) supplemented with massive neutrinos in accounting for the whole huge bulk of phenomenology which has been accumulating in the last three decades, there exist strong theoretical reasons in particle physics and significant 'observational' hints in astroparticle physics for new physics beyond it. My lecture is devoted to a critical assessment of our belief in such new physics at the electroweak scale, in particular identifying it with low-energy supersymmetric extensions of the SM. I'll explain why we have concrete hopes that this decade will shed definite light on what stands behind the phenomenon of electroweak symmetry breaking 12. Where is SUSY? International Nuclear Information System (INIS) Datta, Amitava 2017-01-01 The searches for supersymmetry at the Large Hadron Collider (LHC) have so far yielded only null results and have considerably tightened the bounds on the sparticle masses. This has generated some skepticism in the literature regarding the ‘naturalness of SUSY’ which qualitatively requires some sparticles to be relatively light. Re-examining some of the bounds from LHC searches, it is argued with specific examples that the above skepticism is a red herring because (i) a quantitative and universally accepted definition of ‘naturalness’ is not available and (ii) even if some conventional definitions of naturalness is accepted at their face values, the alleged tension with the apparently stringent LHC bounds wither away once the strong assumptions, by no means compelling, underlying such bounds are relaxed. (author) 13. Rencontres de Moriond QCD 2012: Searches for Dark Matter, SUSY and other exotic particles CERN Multimedia CERN Bulletin 2012-01-01 The fact that SUSY and other new physics signals do not seem to hide in “obvious” places is bringing a healthy excitement to Moriond. Yesterday’s presentations confirmed that, with the 2012 LHC data, experiments will concentrate on searches for exotic particles that might decay into yet unexplored modes. In the meantime, they are setting unprecedented boundaries to regions where new particles (not just SUSY) could exist. The limits of what particle accelerators can bring to enlighten the mystery of Dark Matter were also presented and discussed. Each bar on the picture represents a decay channel that the ATLAS Collaboration (top) and the CMS Collaborations (bottom) have analysed. The value indicated on the scale (or on the relevant bar) defines the maximum mass that the particle in that search cannot have. Not knowing what kind of new physics we should really expect, and given the fact that it does not seem to be hiding in any of the obvious places, e... 14. Fine-tuning implications for complementary dark matter and LHC SUSY searches CERN Document Server Cassel, S; Kraml, S; Lessa, A; Ross, G G 2011-01-01 The requirement that SUSY should solve the hierarchy problem without undue fine-tuning imposes severe constraints on the new supersymmetric states. With the MSSM spectrum and soft SUSY breaking originating from universal scalar and gaugino masses at the Grand Unification scale, we show that the low-fine-tuned regions fall into two classes that will require complementary collider and dark matter searches to explore in the near future. The first class has relatively light gluinos or squarks which should be found by the LHC in its first run. We identify the multijet plus E_T^miss signal as the optimal channel and determine the discovery potential in the first run. The second class has heavier gluinos and squarks but the LSP has a significant Higgsino component and should be seen by the next generation of direct dark matter detection experiments. The combined information from the 7 TeV LHC run and the next generation of direct detection experiments can test almost all of the CMSSM parameter space consistent with ... 15. Natural X-ray lines from the low scale supersymmetry breaking Energy Technology Data Exchange (ETDEWEB) Kang, Zhaofeng, E-mail: [email protected] [Center for High-Energy Physics, Peking University, Beijing 100871 (China); School of Physics, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of); Ko, P., E-mail: [email protected] [School of Physics, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of); Li, Tianjun, E-mail: [email protected] [State Key Laboratory of Theoretical Physics and Kavli Institute for Theoretical Physics China (KITPC), Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing 100190 (China); School of Physical Electronics, University of Electronic Science and Technology of China, Chengdu 610054 (China); Liu, Yandong, E-mail: [email protected] [State Key Laboratory of Theoretical Physics and Kavli Institute for Theoretical Physics China (KITPC), Institute of Theoretical Physics, Chinese Academy of Sciences, Beijing 100190 (China) 2015-03-06 In the supersymmetric models with low scale supersymmetry (SUSY) breaking where the gravitino mass is around keV, we show that the 3.5 keV X-ray lines can be explained naturally through several different mechanisms: (I) a keV scale dark gaugino plays the role of sterile neutrino in the presence of bilinear R-parity violation. Because the light dark gaugino obtains Majorana mass only via gravity mediation, it is a decaying warm dark matter (DM) candidate; (II) the compressed cold DM states, whose mass degeneracy is broken by gravity mediated SUSY breaking, emit such a line via the heavier one decay into the lighter one plus photon(s). A highly supersymmetric dark sector may readily provide such kind of system; (III) the light axino, whose mass again is around the gravitino mass, decays to neutrino plus gamma in the R-parity violating SUSY. Moreover, we comment on dark radiation from dark gaugino. 16. Implications of low and high energy measurements on SUSY models Energy Technology Data Exchange (ETDEWEB) Jegerlehner, Fred [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik 2012-04-15 New Physics searches at the LHC have increased significantly lower bounds on unknown particle masses. This increases quite dramatically the tension in the interpretation of the data: low energy precision data which are predicted accurately by the SM (LEP observables like M{sub W} or loop induced rare processes like B {yields}X{sub s}{gamma} or B{sub s}{yields}{mu}{sup +}{mu}{sup -}) and quantities exhibiting an observed discrepancy between SM theory and experiment, most significantly found for the muon g-2 seem to be in conflict now. (g-2){sub {mu}} appears to be the most precisely understood observable which at the same time reveals a 3-4 {sigma} deviation between theory and experiment and thus requires a significant new physics contribution. The hints for a Higgs of mass about 125 GeV, which is precisely what SUSY extensions of the SM predict, seem to provide a strong indication for SUSY. At the same time it brings into serious trouble the interpretation of the (g-2){sub {mu}} deviation as a SUSY contribution. 17. Search for SUSY in the AMSB scenario with the DELPHI detector CERN Document Server Abdallah, J.; Adam, W.; Adzic, P.; Albrecht, T.; Alderweireld, T.; Alemany-Fernandez, R.; Allmendinger, T.; Allport, P.P.; Amaldi, U.; Amapane, N.; Amato, S.; Anashkin, E.; Andreazza, A.; Andringa, S.; Anjos, N.; Antilogus, P.; Apel, W.D.; Arnoud, Y.; Ask, S.; Asman, B.; Augustin, J.E.; Augustinus, A.; Baillon, P.; Ballestrero, A.; Bambade, P.; Barbier, R.; Bardin, D.; Barker, G.; Baroncelli, A.; Battaglia, M.; Baubillier, M.; Becks, K.H.; Begalli, M.; Behrmann, A.; Ben-Haim, E.; Benekos, N.; Benvenuti, A.; Berat, C.; Berggren, M.; Berntzon, L.; Bertrand, D.; Besancon, M.; Besson, N.; Bloch, D.; Blom, M.; Bluj, M.; Bonesini, M.; Boonekamp, M.; Booth, P.S.L.; Borisov, G.; Botner, O.; Bouquet, B.; Bowcock, T.J.V.; Boyko, I.; Bracko, M.; Brenner, R.; Brodet, E.; Bruckman, P.; Brunet, J.M.; Bugge, L.; Buschmann, P.; Calvi, M.; Camporesi, T.; Canale, V.; Carena, F.; Castro, Nuno Filipe; Cavallo, F.; Chapkin, M.; Charpentier, Ph.; Checchia, P.; Chierici, R.; Chliapnikov, P.; Chudoba, J.; Chung, S.U.; Cieslik, K.; Collins, P.; Contri, R.; Cosme, G.; Cossutti, F.; Costa, M.J.; Crennell, D.; Cuevas, J.; D'Hondt, J.; Dalmau, J.; da Silva, T.; Da Silva, W.; Della Ricca, G.; De Angelis, A.; De Boer, W.; De Clercq, C.; De Lotto, B.; De Maria, N.; De Min, A.; de Paula, L.; Di Ciaccio, L.; Di Simone, A.; Doroba, K.; Drees, J.; Dris, M.; Eigen, G.; Ekelof, T.; Ellert, M.; Elsing, M.; Espirito Santo, M.C.; Fanourakis, G.; Fassouliotis, D.; Feindt, M.; Fernandez, J.; Ferrer, A.; Ferro, F.; Flagmeyer, U.; Foeth, H.; Fokitis, E.; Fulda-Quenzer, F.; Fuster, J.; Gandelman, M.; Garcia, C.; Gavillet, Ph.; Gazis, Evangelos; Gokieli, R.; Golob, B.; Gomez-Ceballos, G.; Goncalves, P.; Graziani, E.; Grosdidier, G.; Grzelak, K.; Guy, J.; Haag, C.; Hallgren, A.; Hamacher, K.; Hamilton, K.; Haug, S.; Hauler, F.; Hedberg, V.; Hennecke, M.; Herr, H.; Hoffman, J.; Holmgren, S.O.; Holt, P.J.; Houlden, M.A.; Hultqvist, K.; Jackson, John Neil; Jarlskog, G.; Jarry, P.; Jeans, D.; Johansson, Erik Karl; Johansson, P.D.; Jonsson, P.; Joram, C.; Jungermann, L.; Kapusta, Frederic; Katsanevas, S.; Katsoufis, E.; Kernel, G.; Kersevan, B.P.; Kerzel, U.; Kiiskinen, A.; King, B.T.; Kjaer, N.J.; Kluit, P.; Kokkinias, P.; Kourkoumelis, C.; Kouznetsov, O.; Krumstein, Z.; Kucharczyk, M.; Lamsa, J.; Leder, G.; Ledroit, Fabienne; Leinonen, L.; Leitner, R.; Lemonne, J.; Lepeltier, V.; Lesiak, T.; Liebig, W.; Liko, D.; Lipniacka, A.; Lopes, J.H.; Lopez, J.M.; Loukas, D.; Lutz, P.; Lyons, L.; MacNaughton, J.; Malek, A.; Maltezos, S.; Mandl, F.; Marco, J.; Marco, R.; Marechal, B.; Margoni, M.; Marin, J.C.; Mariotti, C.; Markou, A.; Martinez-Rivero, C.; Masik, J.; Mastroyiannopoulos, N.; Matorras, F.; Matteuzzi, C.; Mazzucato, F.; Mazzucato, M.; McNulty, R.; Meroni, C.; Migliore, E.; Mitaroff, W.; Mjoernmark, U.; Moa, T.; Moch, M.; Monig, Klaus; Monge, R.; Montenegro, J.; Moraes, D.; Moreno, S.; Morettini, P.; Mueller, U.; Muenich, K.; Mulders, M.; Mundim, L.; Murray, W.; Muryn, B.; Myatt, G.; Myklebust, T.; Nassiakou, M.; Navarria, F.; Nawrocki, K.; Nicolaidou, R.; Nikolenko, M.; Oblakowska-Mucha, A.; Obraztsov, V.; Olshevski, A.; Onofre, A.; Orava, R.; Osterberg, K.; Ouraou, A.; Oyanguren, A.; Paganoni, M.; Paiano, S.; Palacios, J.P.; Palka, H.; Papadopoulou, Th.D.; Pape, L.; Parkes, C.; Parodi, F.; Parzefall, U.; Passeri, A.; Passon, O.; Peralta, L.; Perepelitsa, V.; Perrotta, A.; Petrolini, A.; Piedra, J.; Pieri, L.; Pierre, F.; Pimenta, M.; Piotto, E.; Podobnik, T.; Poireau, V.; Pol, M.E.; Polok, G.; Poropat, P.; Pozdniakov, V.; Pukhaeva, N.; Pullia, A.; Rames, J.; Ramler, L.; Read, Alexander L.; Rebecchi, P.; Rehn, J.; Reid, D.; Reinhardt, R.; Renton, P.; Richard, F.; Ridky, J.; Rivero, M.; Rodriguez, D.; Romero, A.; Ronchese, P.; Roudeau, P.; Rovelli, T.; Ruhlmann-Kleider, V.; Ryabtchikov, D.; Sadovsky, A.; Salmi, L.; Salt, J.; Savoy-Navarro, A.; Schwickerath, U.; Segar, A.; Sekulin, R.; Siebel, M.; Sisakian, A.; Smadja, G.; Smirnova, O.; Sokolov, A.; Sopczak, A.; Sosnowski, R.; Spassov, T.; Stanitzki, M.; Stocchi, A.; Strauss, J.; Stugu, B.; Szczekowski, M.; Szeptycka, M.; Szumlak, T.; Tabarelli, T.; Taffard, A.C.; Tegenfeldt, F.; Timmermans, Jan; Tkatchev, L.; Tobin, M.; Todorovova, S.; Tome, B.; Tonazzo, A.; Tortosa, P.; Travnicek, P.; Treille, D.; Tristram, G.; Trochimczuk, M.; Troncon, C.; Turluer, M.L.; Tyapkin, I.A.; Tyapkin, P.; Tzamarias, S.; Uvarov, V.; Valenti, G.; Van Dam, Piet; Van Eldik, J.; Van Lysebetten, A.; van Remortel, N.; Van Vulpen, I.; Vegni, G.; Veloso, F.; Venus, W.; Verdier, P.; Verzi, V.; Vilanova, D.; Vitale, L.; Vrba, V.; Wahlen, H.; Washbrook, A.J.; Weiser, C.; Wicke, D.; Wickens, J.; Wilkinson, G.; Winter, M.; Witek, M.; Yushchenko, O.; Zalewska, A.; Zalewski, P.; Zavrtanik, D.; Zhuravlov, V.; Zimine, N.I.; Zintchenko, A.; Zupan, M. 2004-01-01 The DELPHI experiment at the LEP e+e- collider collected almost 700 pb^-1 at centre-of-mass energies above the Z0 mass pole and up to 208 GeV. Those data were used to search for SUSY in the Anomaly Mediated SUSY Breaking (AMSB) scenario with a flavour independent common sfermion mass parameter. The searches covered several possible signatures experimentally accessible at LEP, with either the neutralino, the sneutrino or the stau being the Lightest Supersymmetric Particle (LSP). They included: the search for nearly mass-degenerate chargino and neutralino, which is a typical feature of AMSB; the search for Standard-Model-like or invisibly decaying Higgs boson; the search for stable staus; the search for cascade decays of SUSY particles resulting in the LSP and a low multiplicity final state containing neutrinos. No evidence of a signal was found, and thus constraints were set in the space of the parameters of the model. 18. Muon g−2 in anomaly mediated SUSY breaking Energy Technology Data Exchange (ETDEWEB) Chowdhury, Debtosh; Yokozaki, Norimi [Istituto Nazionale di Fisica Nucleare, Sezione di Roma,Piazzale Aldo Moro 2, I-00185 Rome (Italy) 2015-08-24 Motivated by two experimental facts, the muon g−2 anomaly and the observed Higgs boson mass around 125 GeV, we propose a simple model of anomaly mediation, which can be seen as a generalization of mixed modulus-anomaly mediation. In our model, the discrepancy of the muon g−2 and the Higgs boson mass around 125 GeV are easily accommodated. The required mass splitting between the strongly and weakly interacting SUSY particles are naturally achieved by the contribution from anomaly mediation. This model is easily consistent with SU(5) or SO(10) grand unified theory. 19. Muon g−2 in anomaly mediated SUSY breaking International Nuclear Information System (INIS) Chowdhury, Debtosh; Yokozaki, Norimi 2015-01-01 Motivated by two experimental facts, the muon g−2 anomaly and the observed Higgs boson mass around 125 GeV, we propose a simple model of anomaly mediation, which can be seen as a generalization of mixed modulus-anomaly mediation. In our model, the discrepancy of the muon g−2 and the Higgs boson mass around 125 GeV are easily accommodated. The required mass splitting between the strongly and weakly interacting SUSY particles are naturally achieved by the contribution from anomaly mediation. This model is easily consistent with SU(5) or SO(10) grand unified theory. 20. SUSY searches at$\\sqrt{s}=13$TeV with two same-sign leptons or three leptons, jets and$E_T^{miss}$at the ATLAS detector - Background estimation and latest analysis results. CERN Document Server Tornambe, Peter; The ATLAS collaboration 2017-01-01 Supersymmetry (SUSY) is one of the most studied theories to extend the Standard Model (SM) beyond the electroweak scale. If R-parity is conserved, SUSY particles are produced in pairs and the lightest supersymmetric particle (LSP), which is typically the lightest neutrino$\\tilde{\\chi}_1^0, is stable. In many models the LSP can be a suitable candidate for dark matter. This poster presents a search for supersymmetric phenomena in final states with two leptons (electrons or muons) of the same electric charge or three leptons, jets and missing transverse energy. While the same-sign or three leptons signature is present in many SUSY scenarios, SM processes leading to such events have very small cross-sections. Therefore, this analysis benefits from a small SM background in the signal regions leading to a good sensitivity especially in SUSY scenarios with compressed mass spectra or in which the R-parity is not conserved. Except from the prompt production of same-sign lepton pairs or three leptons, the main source... 1. Precision natural SUSY at CEPC, FCC-ee, and ILC International Nuclear Information System (INIS) Fan, JiJi; Reece, Matthew; Wang, Lian-Tao 2015-01-01 Testing the idea of naturalness is and will continue to be one of the most important goals of high energy physics experiments. It will play a central role in the physics program of future colliders. In this paper, we present projections of the reach of natural SUSY at future lepton colliders: CEPC, FCC-ee and ILC. We focus on the observables which give the strongest reach, the electroweak precision observables (for left-handed stops), and Higgs to gluon and photon decay rates (for both left- and right-handed stops). There is a “blind spot” when the stop mixing parameter X t is approximately equal to the average stop mass. We argue that in natural scenarios, bounds on the heavy Higgs bosons from tree-level mixing effects that modify the hbb̄ coupling together with bounds from b→sγ play a complementary role in probing the blind spot region. For specific natural SUSY scenarios such as folded SUSY in which the top partners do not carry Standard Model color charges, electroweak precision observables could be the most sensitive probe. In all the scenarios discussed in this paper, the combined set of precision measurements will probe down to a few percent in fine-tuning. 2. Nucleon decay in a realistic SO(10) SUSY GUT International Nuclear Information System (INIS) Lucas, V.; Raby, S. 1997-01-01 In this paper, we calculate neutron and proton decay rates and branching ratios in a predictive SO(10) SUSY GUT which agrees well with low energy data. We show that the nucleon lifetimes are consistent with the experimental bounds. The nucleon decay rates are calculated using all one-loop chargino and gluino-dressed diagrams regardless of their chiral structure. We show that the four-fermion operator C jk (u R d jR )(d kL ν τL ), commonly neglected in previous nucleon decay calculations, not only contributes significantly to nucleon decay, but, for many values of the initial GUT parameters and for large tanβ, actually dominates the decay rate. As a consequence, we find that τ p /τ n is often substantially larger than the prediction obtained in small tanβ models. We also find that gluino-dressed diagrams, often neglected in nucleon decay calculations, contribute significantly to nucleon decay. In addition we find that the branching ratios obtained from this realistic SO(10) SUSY GUT differ significantly from the predictions obtained from open-quotes genericclose quotes SU(5) SUSY GUT close-quote s. Thus, nucleon decay branching ratios, when observed, can be used to test theories of fermion masses. copyright 1997 The American Physical Society 3. SUSY see-saw and NMSO(10)GUT inflation after BICEP2 International Nuclear Information System (INIS) Garg, Ila 2016-01-01 Supersymmetric see-saw slow roll inflection point inflation occurs along a MSSM D-flat direction associated with gauge invariant combination of Higgs, s lepton and right-handed s neutrino at a scale set by the right-handed neutrino mass M vc ∼ 10 6 -10 13 GeV. The tensor to scalar perturbation ratio r ∼ 10 -3 can be achieved in this scenario. However, this scenario faced difficulty in being embedded in the realistic new minimal supersymmetric SO(10) grand unified theory (NMSO(10)GUT). The recent discovery of B-mode polarization by BICEP2, changes the prospects of NMSO(10) GUT inflation. Inflection point models become strongly disfavoured, as the trilinear coupling of SUSY see-saw inflation potential gets suppressed relative to the mass parameter favoured by BICEP2. Large values of r ≈ 0.2 can be achieved with super-Planck scale inflaton values and mass scales of inflaton ≥10 13 GeV. In NMSO(10)GUT, this can be made possible with an admixture of heavy Higgs doublet fields, i.e., other than MSSM Higgs field, which are present and have masses of order GUT scale. (author) 4. Beyond the Standard Model: The Weak Scale, Neutrino Mass, and the Dark Sector International Nuclear Information System (INIS) Weiner, Neal 2010-01-01 The goal of this proposal was to advance theoretical studies into questions of collider physics at the weak scale, models and signals of dark matter, and connections between neutrino mass and dark energy. The project was a significant success, with a number of developments well beyond what could have been anticipated at the outset. A total of 35 published papers and preprints were produced, with new ideas and signals for LHC physics and dark matter experiments, in particular. A number of new ideas have been found on the possible indirect signals of models of dark matter which relate to the INTEGRAL signal of astrophysical positron production, high energy positrons seen at PAMELA and Fermi, studies into anomalous gamma rays at Fermi, collider signatures of sneutrino dark matter, scenarios of Higgs physics arising in SUSY models, the implications of galaxy cluster surveys for photon-axion conversion models, previously unconsidered collider phenomenology in the form of 'lepton jets' and a very significant result for flavor physics in supersymmetric theories. Progress continues on all fronts, including development of models with dramatic implications for direct dark matter searches, dynamics of dark matter with various excited states, flavor physics, and consequences of modified missing energy signals for collider searches at the LHC. 5. The flavour of natural SUSY Energy Technology Data Exchange (ETDEWEB) Bruemmer, Felix [SISSA/ISAS, Trieste (Italy); Kraml, Sabine; Kulkarni, Suchita; Smith, Christopher [Universite Grenoble-Alpes, CNRS/IN2P3, Laboratoire de Physique Subatomique et de Cosmologie, Grenoble Cedex (France) 2014-09-15 An inverted mass hierarchy in the squark sector, as in so-called ''natural supersymmetry'', requires non-universal boundary conditions at the mediation scale of supersymmetry breaking. We propose a formalism to define such boundary conditions in a basis-independent manner and apply it to generic scenarios where the third-generation squarks are light, while the first two-generation squarks are heavy and near-degenerate. We show that not only is our formalism particularly well suited to study such hierarchical squark mass patterns, but in addition the resulting soft terms at the TeV scale are manifestly compatible with the principle of minimal flavour violation, and thus automatically obey constraints from flavour physics. (orig.) 6. Signatures of High-Scale Supersymmetry at the LHC CERN Multimedia CERN. Geneva; Spiropulu, Maria; Treille, D 2004-01-01 I will discuss the experimental signatures at the LHC of a novel paradigm-shift away from naturalness, suggested by the cosmological constant problem and the multitude of vacua in string theory. In the new paradigm supersymmetry can be broken near the unification scale, and the only light superparticles are the gauginos and higgsinos, which account for the successful unification of gauge couplings. This framework removes all the phenomenological difficulties of standard SUSY. The mass of the Higgs is in the range 120-160 GeV. Measuring the couplings of the Higgs to the gauginos and higgsinos precicely tests for high-scale SUSY. The gluino is strikingly long lived, and a measurement of its lifetime can determine the SUSY breaking scale. Signatures at the LHC detectors include out-of-time energy depositions, displaced vertices, and intermittent tracks. 7. Impact of physical properties at very high energy scales on the superparticle mass spectrum International Nuclear Information System (INIS) Baer, H.; Diaz, M.; Quintana, P.; Tata, X. 2000-01-01 We survey a variety of proposals for new physics at high scales that serve to relate the multitude of soft supersymmetry breaking parameters of the MSSM. We focus on models where the new physics results in non-universal soft parameters, in sharp contrast with the usually assumed mSUGRA framework. These include (i) SU(5) and SO(10) grand unified (GUT) models, (ii) the MSSM plus a right-handed neutrino, (iii) models with effective supersymmetry, (iv) models with anomaly-mediated SUSY breaking and gaugino mediated SUSY breaking, (v) models with non-universal soft terms due to string dynamics, and (vi) models based on M-theory. We outline the physics behind these models, point out some distinctive features of the weak scale sparticle spectrum, and allude to implications for collider experiments. To facilitate future studies, for each of these scenarios, we describe how collider events can be generated using the program ISAJET. Our hope is that detailed studies of a variety of alternatives will help point to the physics underlying SUSY breaking and how this is mediated to the observable sector, once sparticles are discovered and their properties measured. (author) 8. On SUSY inspired minimal lepton number violation International Nuclear Information System (INIS) Chkareuli, J.L.; Gogoladze, I.G.; Green, M.G.; Hutchroft, D.E.; Kobakhidze, A.B. 2000-03-01 A minimal lepton number violation (LNV) is proposed which could naturally appear in SUSY theories, if Yukawa and LNV couplings had a common origin. According to this idea properly implemented into MSSM with an additional abelian flavor symmetry the prototype LNV appears due to a mixing of leptons with superheavy Higgs doublet mediating Yukawa couplings. As a result, all significant physical manifestations of LNV reduce to those of the effective trilinear couplings LLE-bar and LQD-bar aligned, by magnitude and orientation in a flavor space, with the down fermion (charged lepton and down quark) effective Yukawa couplings, while the effective bilinear terms appear generically suppressed relative to an ordinary μ-term of MSSM. Detailed phenomenology of the model related to the flavor-changing processes both in quark and lepton sectors, radiatively induced neutrino masses and decays of the LSP is presented. Remarkably, the model can straightforwardly be extended to a Grand Unified framework and an explicit example with SU(7) GUT is thoroughly discussed. (author) 9. Long-lived and compressed SUSY searches at CMS and ATLAS CERN Document Server Barlow, Nick; The ATLAS collaboration 2015-01-01 Two challenging scenarios for SUSY searches at the LHC are when there are small mass differences between particles in the decay chain ("compressed" spectra) and where the SUSY particles have a non-negligible lifetime. The compressed case can be addressed by looking at events containing Initial State Radiation (ISR), while long-lifetimes can give rise to a wide range of possible detector signatures. This talk describes these diverse and interesting searches, performed by the ATLAS and CMS collaborations on the Run 1 LHC data. 10. Beyond the standard seesaw neutrino masses from Kahler operators and broken supersymmetry CERN Document Server Brignole, Andrea; Rossi, Anna 2010-01-01 We investigate supersymmetric scenarios in which neutrino masses are generated by effective d=6 operators in the Kahler potential, rather than by the standard d=5 superpotential operator. First, we discuss some general features of such effective operators, also including SUSY-breaking insertions, and compute the relevant renormalization group equations. Contributions to neutrino masses arise at low energy both at the tree level and through finite threshold corrections. In the second part we present simple explicit realizations in which those Kahler operators arise by integrating out heavy SU(2)_W triplets, as in the type II seesaw. Distinct scenarios emerge, depending on the mechanism and the scale of SUSY-breaking mediation. In particular, we propose an appealing and economical picture in which the heavy seesaw mediators are also messengers of SUSY breaking. In this case, strong correlations exist among neutrino parameters, sparticle and Higgs masses, as well as lepton flavour violating processes. Hence, thi... 11. Improved determination of the Higgs mass in the MSSM with heavy superpartners Energy Technology Data Exchange (ETDEWEB) Bagnaschi, Emanuele [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pardo Vega, Javier [Abdus Salam International Centre for Theoretical Physics, Trieste (Italy); SISSA International School for Advanced Studies, Trieste (Italy); INFN, Trieste (Italy); Slavich, Pietro [UPMC Univ. Paris 06 Sorbonne Univs., Paris (France). LPTHE; CNRS, Paris (France). LPTHE 2017-03-15 We present several advances in the effective field theory calculation of the Higgs mass in MSSM scenarios with heavy superparticles. In particular, we compute the dominant two-loop threshold corrections to the quartic Higgs coupling for generic values of the relevant SUSY-breaking parameters, including all contributions controlled by the strong gauge coupling and by the third-family Yukawa couplings. We also study the effects of a representative subset of dimension-six operators in the effective theory valid below the SUSY scale. Our results will allow for an improved determination of the Higgs mass and of the associated theoretical uncertainty. 12. Improved determination of the Higgs mass in the MSSM with heavy superpartners. Science.gov (United States) Bagnaschi, Emanuele; Vega, Javier Pardo; Slavich, Pietro 2017-01-01 We present several advances in the effective field theory calculation of the Higgs mass in MSSM scenarios with heavy superparticles. In particular, we compute the dominant two-loop threshold corrections to the quartic Higgs coupling for generic values of the relevant SUSY-breaking parameters, including all contributions controlled by the strong gauge coupling and by the third-family Yukawa couplings. We also study the effects of a representative subset of dimension-six operators in the effective theory valid below the SUSY scale. Our results will allow for an improved determination of the Higgs mass and of the associated theoretical uncertainty. 13. Improved determination of the Higgs mass in the MSSM with heavy superpartners Energy Technology Data Exchange (ETDEWEB) Bagnaschi, Emanuele [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Vega, Javier Pardo [Abdus Salam International Centre for Theoretical Physics, Trieste (Italy); SISSA International School for Advanced Studies, Trieste (Italy); INFN Trieste, Trieste (Italy); Slavich, Pietro [LPTHE, UPMC Univ. Paris 06, Sorbonne Universites, Paris (France); LPTHE, CNRS, Paris (France) 2017-05-15 We present several advances in the effective field theory calculation of the Higgs mass in MSSM scenarios with heavy superparticles. In particular, we compute the dominant two-loop threshold corrections to the quartic Higgs coupling for generic values of the relevant SUSY-breaking parameters, including all contributions controlled by the strong gauge coupling and by the third-family Yukawa couplings. We also study the effects of a representative subset of dimension-six operators in the effective theory valid below the SUSY scale. Our results will allow for an improved determination of the Higgs mass and of the associated theoretical uncertainty. (orig.) 14. Large tan β in gauge-mediated SUSY-breaking models International Nuclear Information System (INIS) Rattazzi, R. 1997-01-01 We explore some topics in the phenomenology of gauge-mediated SUSY-breaking scenarios having a large hierarchy of Higgs VEVs, v U /v D = tan β>>1. Some motivation for this scenario is first presented. We then use a systematic, analytic expansion (including some threshold corrections) to calculate the μ-parameter needed for proper electroweak breaking and the radiative corrections to the B-parameter, which fortuitously cancel at leading order. If B = 0 at the messenger scale then tan β is naturally large and calculable; we calculate it. We then confront this prediction with classical and quantum vacuum stability constraints arising from the Higgs-slepton potential, and indicate the preferred values of the top quark mass and messenger scale(s). The possibility of vacuum instability in a different direction yields an upper bound on the messenger mass scale complementary to the familiar bound from gravitino relic abundance. Next, we calculate the rate for b→sγ and show the possibility of large deviations (in the direction currently favored by experiment) from standard-model and small tan β predictions. Finally, we discuss the implications of these findings and their applicability to future, broader and more detailed investigations. (orig.) 15. A realistic extension of gauge-mediated SUSY-breaking model with superconformal hidden sector International Nuclear Information System (INIS) Asano, Masaki; Hisano, Junji; Okada, Takashi; Sugiyama, Shohei 2009-01-01 The sequestering of supersymmetry (SUSY) breaking parameters, which is induced by superconformal hidden sector, is one of the solutions for the μ/B μ problem in gauge-mediated SUSY-breaking scenario. However, it is found that the minimal messenger model does not derive the correct electroweak symmetry breaking. In this Letter we present a model which has the coupling of the messengers with the SO(10) GUT-symmetry breaking Higgs fields. The model is one of the realistic extensions of the gauge mediation model with superconformal hidden sector. It is shown that the extension is applicable for a broad range of conformality breaking scale 16. The minimal SUSY B−L model: simultaneous Wilson lines and string thresholds Energy Technology Data Exchange (ETDEWEB) Deen, Rehan; Ovrut, Burt A. [Department of Physics, University of Pennsylvania,209 South 33rd Street, Philadelphia, PA 19104-6396 (United States); Purves, Austin [Department of Physics, University of Pennsylvania,209 South 33rd Street, Philadelphia, PA 19104-6396 (United States); Department of Physics, Manhattanville College,2900 Purchase Street, Purchase, NY 10577 (United States) 2016-07-08 In previous work, we presented a statistical scan over the soft supersymmetry breaking parameters of the minimal SUSY B−L model. For specificity of calculation, unification of the gauge parameters was enforced by allowing the two ℤ{sub 3}×ℤ{sub 3} Wilson lines to have mass scales separated by approximately an order of magnitude. This introduced an additional “left-right” sector below the unification scale. In this paper, for three important reasons, we modify our previous analysis by demanding that the mass scales of the two Wilson lines be simultaneous and equal to an “average unification” mass 〈M{sub U}〉. The present analysis is 1) more “natural” than the previous calculations, which were only valid in a very specific region of the Calabi-Yau moduli space, 2) the theory is conceptually simpler in that the left-right sector has been removed and 3) in the present analysis the lack of gauge unification is due to threshold effects — particularly heavy string thresholds, which we calculate statistically in detail. As in our previous work, the theory is renormalization group evolved from 〈M{sub U}〉 to the electroweak scale — being subjected, sequentially, to the requirement of radiative B−L and electroweak symmetry breaking, the present experimental lower bounds on the B−L vector boson and sparticle masses, as well as the lightest neutral Higgs mass of ∼125 GeV. The subspace of soft supersymmetry breaking masses that satisfies all such constraints is presented and shown to be substantial. 17. Planck-scale physics and neutrino masses International Nuclear Information System (INIS) Akhmedov, E.Kh.; Senjanovic, G.; Berezhiani, Z.G. 1992-05-01 We discuss gravitationally induced masses and mass splittings of Majorana, Zeldovich-Konopinski-Mahmoud and Dirac neutrinos. Among other implications, these effects can provide a solution of the solar neutrino puzzle. In particular, we show how this may work in the 17 keV neutrino picture. (author). 18 refs 18. Recent results on SUSY searches from CMS CERN Multimedia CERN. Geneva 2013-01-01 The latest results on searches for Supersymmetry from CMS are reviewed. We present searches for direct stop production, searches in final states with four W bosons and multiple b-quarks, and searches for R-Parity violating SUSY. The results use up to 20/fb of data from the 8 TeV LHC run of 2012. 19. Kepribadian Dan Komunikasi Susi Pudjiastuti Dalam Membentuk Personal Branding Directory of Open Access Journals (Sweden) Stevani 2017-07-01 Full Text Available The life story of Susi Pudjiastuti is admired by many people for her hard work, until becoming successful by having so much company in the field of aviation and fisheries. Susi Pudjiastuti is also well known to the public for his work in the ministry. Good performance makes Susi Pudjiastuti popular among Jokowi's working cabinet. Currently, the Brand Name in humans is personal branding which is the trend of the formation of self-image and the creation of good perception from others to us. This research will discuss about personality, communication and personal branding Susi Pudjiastuti with qualitative research method. Good personality makes Susi Pudjiastuti has the ability to communicate well and liked by the community. Personality and communication can form a personal branding Susi Pudjiastuti a natural. By exposing the personality and communication of Susi Pudjiastuti in forming personal branding, then people will realize the importance of personality and Communication in forming a natural personal branding. Kisah hidup Susi Pudjiastuti banyak dikagumi oleh banyak orang atas kerja kerasnya hingga menjadi sukses dengan memiliki banyak perusahaan di bidang penerbangan dan perikanan. Susi Pudjiastuti juga dikenal baik oleh masyarakat akan kinerjanya dalam bekerja di kementerian. Kinerja yang baik menjadikan Susi Pudjiastuti popular diantara kabinet kerja Jokowi. Saat ini, Sebutan merek pada manusia adalah personal branding yang merupakan trend dari pembentukan pencitraan diri dan penciptaan persepsi yang baik dari orang lain kepada kita. Penelitian ini akan membahas mengenai kepribadian, komunikasi serta personal branding Susi Pudjiastuti dengan metode penelitian kualitatif. Kepribadian yang baik menjadikan Susi Pudjiastuti memiliki kemampuan berkomunikasi dengan baik dan disenangi oleh masyarakat. Kepribadian dan komunikasi tersebut dapat membentuk personal branding Susi Pudjiastuti yang alami. Dengan memaparkan kepribadian dan komunikasi Susi 20. Probing the Absolute Mass Scale of Neutrinos International Nuclear Information System (INIS) Formaggio, Joseph A. 2011-01-01 The experimental efforts of the Neutrino Physics Group at MIT center primarily around the exploration of neutrino mass and its significance within the context of nuclear physics, particle physics, and cosmology. The group has played a prominent role in the Sudbury Neutrino Observatory, a neutrino experiment dedicated to measure neutrino oscillations from 8B neutrinos created in the sun. The group is now focusing its efforts in the measurement of the neutrino mass directly via the use of tritium beta decay. The MIT group has primary responsibilities in the Karlsruhe Tritium Neutrino mass experiment, expected to begin data taking by 2013. Specifically, the MIT group is responsible for the design and development of the global Monte Carlo framework to be used by the KATRIN collaboration, as well as responsibilities directly associated with the construction of the focal plane detector. In addition, the MIT group is sponsoring a new research endeavor for neutrino mass measurements, known as Project 8, to push beyond the limitations of current neutrino mass experiments. 1. Influence of light-quark masses in dynamical scale breaking International Nuclear Information System (INIS) Barcelos Neto, J.; Chanda, R. 1984-01-01 It is demonstrated that light quark masses may significantly contribute to the logarithmic scale breaking in deep inelastic electromagnetic lepton-nucleon scattering. This is mainly due to the combination of scale variables together with large 'current' masses for u and d quarks, recently reported in the literature. Upper limits for current masses of u and d quarks, using positivity properties of the forward electromagnetic structure function F 2 of the nucleon are also estimated. (Author) [pt 2. Muon g - 2 through a flavor structure on soft SUSY terms International Nuclear Information System (INIS) Flores-Baez, F.V.; Gomez Bock, M.; Mondragon, M. 2016-01-01 In this work we analyze the possibility to explain the muon anomalous magnetic moment discrepancy within theory and experiment through lepton-flavor violation processes. We propose a flavor extended MSSM by considering a hierarchical family structure for the trilinear scalar soft-supersymmetric terms of the Lagrangian, present at the SUSY breaking scale. We obtain analytical results for the rotation mass matrix, with the consequence of having non-universal slepton masses and the possibility of leptonic flavor mixing. The one-loop supersymmetric contributions to the leptonic flavor violating process τ → μγ are calculated in the physical basis, instead of using the well-known mass-insertion method. The flavor violating processes BR(l_i → l_jγ) are also obtained, in particular τ → μγ is well within the experimental bounds. We present the regions in parameter space where the muon g - 2 problem is either entirely solved or partially reduced through the contribution of these flavor violating processes. (orig.) 3. Muon g - 2 through a flavor structure on soft SUSY terms Energy Technology Data Exchange (ETDEWEB) Flores-Baez, F.V. [Universidad Autonoma de Nuevo Leon, UANL Ciudad Universitaria, FCFM, San Nicolas de los Garza, Nuevo Leon (Mexico); Gomez Bock, M. [Universidad de las Americas Puebla, UDLAP, Ex-Hacienda Sta. Catarina Martir, DAFM, Cholula, Puebla (Mexico); Mondragon, M. [Universidad Nacional Autonoma de Mexico, Instituto de Fisica, Apdo. Postal 20-364, Mexico, D.F. (Mexico) 2016-10-15 In this work we analyze the possibility to explain the muon anomalous magnetic moment discrepancy within theory and experiment through lepton-flavor violation processes. We propose a flavor extended MSSM by considering a hierarchical family structure for the trilinear scalar soft-supersymmetric terms of the Lagrangian, present at the SUSY breaking scale. We obtain analytical results for the rotation mass matrix, with the consequence of having non-universal slepton masses and the possibility of leptonic flavor mixing. The one-loop supersymmetric contributions to the leptonic flavor violating process τ → μγ are calculated in the physical basis, instead of using the well-known mass-insertion method. The flavor violating processes BR(l{sub i} → l{sub j}γ) are also obtained, in particular τ → μγ is well within the experimental bounds. We present the regions in parameter space where the muon g - 2 problem is either entirely solved or partially reduced through the contribution of these flavor violating processes. (orig.) 4. SUSY-hierarchy of one-dimensional reflectionless potentials International Nuclear Information System (INIS) Maydanyuk, Sergei P. 2005-01-01 A class of one-dimensional reflectionless potentials is studied. It is found that all possible types of the reflectionless potentials can be combined into one SUSY-hierarchy with a constant potential. An approach for determination of a general form of the reflectionless potential on the basis of construction of such a hierarchy by the recurrent method is proposed. A general integral form of interdependence between superpotentials with neighboring numbers of this hierarchy, opening a possibility to find new reflectionless potentials, is found and has a simple analytical view. It is supposed that any possible type of the reflectionless potential can be expressed through finite number of elementary functions (unlike some presentations of the reflectionless potentials, which are constructed on the basis of soliton solutions or are shape invariant in one or many steps with involving scaling of parameters, and are expressed through series). An analysis of absolute transparency existence for the potential which has the inverse power dependence on space coordinate (and here tunneling is possible), i.e., which has the form V (x) = ± α/ vertical bar x-x 0 vertical bar n (where α and x 0 are constants, n is natural number), is fulfilled. It is shown that such a potential can be reflectionless at n = 2 only. A SUSY-hierarchy of the inverse power reflectionless potentials is constructed. Isospectral expansions of this hierarchy are analyzed 5. Low scale gravity as the source of neutrino masses? Energy Technology Data Exchange (ETDEWEB) Berezinsky, Veniamin [INFN, Laboratori Nazionali del Gran Sasso, I-67010 Assergi, AQ (Italy); Narayan, Mohan [INFN, Laboratori Nazionali del Gran Sasso, I-67010 Assergi, AQ (Italy); Vissani, Francesco [INFN, Laboratori Nazionali del Gran Sasso, I-67010 Assergi, AQ (Italy) 2005-04-01 We address the question whether low-scale gravity alone can generate the neutrino mass matrix needed to accommodate the observed phenomenology. In low-scale gravity the neutrino mass matrix in the flavor basis is characterized by one parameter (the gravity scale M{sub X}) and by an exact or approximate flavor blindness (namely, all elements of the mass matrix are of comparable size). Neutrino masses and mixings are consistent with the observational data for certain values of the matrix elements, but only when the spectrum of mass is inverted or degenerate. For the latter type of spectra the parameter M{sub ee} probed in double beta experiments and the mass parameter probed by cosmology are close to existing upper limits. 6. Low scale gravity as the source of neutrino masses? International Nuclear Information System (INIS) Berezinsky, Veniamin; Narayan, Mohan; Vissani, Francesco 2005-01-01 We address the question whether low-scale gravity alone can generate the neutrino mass matrix needed to accommodate the observed phenomenology. In low-scale gravity the neutrino mass matrix in the flavor basis is characterized by one parameter (the gravity scale M X ) and by an exact or approximate flavor blindness (namely, all elements of the mass matrix are of comparable size). Neutrino masses and mixings are consistent with the observational data for certain values of the matrix elements, but only when the spectrum of mass is inverted or degenerate. For the latter type of spectra the parameter M ee probed in double beta experiments and the mass parameter probed by cosmology are close to existing upper limits 7. On the diversity of gauge mediation: footprints of dynamical SUSY breaking International Nuclear Information System (INIS) Abel, Steven; Jaeckel, Joerg; Khoze, Valentin V.; Matos, Luis 2009-01-01 Recent progress in realising dynamical supersymmetry breaking allows the construction of simple and calculable models of gauge mediation. We discuss the phenomenology of the particularly minimal case in which the mediation is direct, and show that there are generic new and striking predictions. These include new particles with masses comparable to those of the Standard Model superpartners, associated with the pseudo-Goldstone modes of the dynamical SUSY breaking sector. Consequently there is an unavoidable departure from the MSSM. In addition the gaugino masses are typically significantly lighter than the sfermions, and their mass ratios can be different from the pattern dictated by the gauge couplings in standard (i.e. explicit) gauge mediation. We investigate these features in two distinct realisations of the dynamical SUSY breaking sector. 8. Local supersymmetry and the problem of the mass scales International Nuclear Information System (INIS) Nilles, H.P. 1983-02-01 Spontaneously broken supergravity might help us to understand the puzzle of the mass scales in grand unified models. We describe the general mechanism and point out the remaining problems. Some new results on local supercolor are presented 9. Status of the SUSY Les Houches Accord II Project International Nuclear Information System (INIS) Allanch, B.C.; Balazs, C.; Belanger, G.; Boudjema, F.; Choudhury, D.; Desch, K.; Ellwanger, U.; Gambino, P.; Godbole, R.; Guasch, J.; Guchait, M.; Heinemeyer, S.; Hugonie, C.; Hurth, T.; Kraml, S.; Lykken, J.; Mangano, M.; Moortgat, F.; Moretti, S.; Penaranda, S.; Porod, W.; Fermilab 2005-01-01 Supersymmetric (SUSY) spectrum generators, decay packages, Monte-Carlo programs, dark matter evaluators, and SUSY fitting programs often need to communicate in the process of an analysis. The SUSY Les Houches Accord provides a common interface that conveys spectral and decay information between the various packages. Here, we propose extensions of the conventions of the first SUSY Les Houches Accord to include various generalizations: violation of CP, R-parity and flavor as well as the simplest next-to-minimal supersymmetric standard model (NMSSM) 10. Natural inflation in SUSY and gauge-mediated curvature of the flat directions CERN Document Server Dvali, Gia 1996-01-01 Supersymmetric theories often include the non-compact directions in the field space along which the tree level potential grows only up to a certain limited value (determined by the mass scale of the theory) and then stays constant for the arbitrarily large expectation value of the field parametrizing the direction. Above the critical value, the tree-level curvature is large and positive in the other directions. Such plateaux are natural candidates for the hybrid inflaton. The non-zero F-term density along the plateau spontaneously breaks SUSY and induces the one-loop logarithmic slope for the inflaton potential. The coupling of the inflaton to the Higgs fields in the complex representations of the gauge group, may result in a radiatively induced Fayet--Iliopoulos D-term during inflation, which destabilizes some of the squark and slepton flat directions. Corresponding soft masses can be larger than the Hubble parameter and thus, play a crucial role for the Affleck--Dine baryogenesis. 11. Verifiable origin of neutrino mass at TeV scale International Nuclear Information System (INIS) Ma, Ernest 2002-01-01 The physics responsible for neutrino mass may reside at or below the TeV energy scale. The neutrino mass matrix in the (ν e ν μ ν gt ) basis may then be deduced from future high-energy accelerator experiments. The newly observed excess in the muon anomalous magnetic moment may also be related 12. Large neutrino mixings in MSSM and SUSY GUTs: Democratic approach International Nuclear Information System (INIS) Shafi, Qaisar; Tavartkiladze, Zurab 2003-01-01 We show how, with aid from a U (1) flavor symmetry, the hierarchical structure in the charged fermion sector and a democratic approach for neutrinos that yields large solar and atmospheric neutrino mixings can be simultaneously realized in the MSSM framework. In SU(5), due to the unified multiplets, we encounter difficulties. Namely, democracy for the neutrinos leads to a wrong hierarchical pattern for charged fermion masses and mixings. We discuss how this is overcome in flipped SU(5). We then proceed to an example based on 5D SUSY SU(5) GUT in which the neutrino democracy idea can be realized. A crucial role is played by bulk states, the so-called 'copies', which are split by compactifying the fifth dimension on an S(1)/Z2 x Z'2 orbifold 13. SUSY S4×SU(5) revisited International Nuclear Information System (INIS) Hagedorn, Claudia; King, Stephen F.; Luhn, Christoph 2012-01-01 Following the recent results from Daya Bay and RENO, which measure the lepton mixing angle θ 13 l ≈0.15, we revisit a supersymmetric (SUSY) S 4 ×SU(5) model, which predicts tri-bimaximal (TB) mixing in the neutrino sector with θ 13 l being too small in its original version. We show that introducing one additional S 4 singlet flavon into the model gives rise to a sizable θ 13 l via an operator which leads to the breaking of one of the two Z 2 symmetries preserved in the neutrino sector at leading order (LO). The results of the original model for fermion masses, quark mixing and the solar mixing angle are maintained to good precision. The atmospheric and solar mixing angle deviations from TB mixing are subject to simple sum rule bounds. 14. Flavour and collider interplay for SUSY at LHC7 International Nuclear Information System (INIS) Calibbi, L.; Hodgkinson, R.N.; Vives, O.; Jones Perez, J.; Masiero, A. 2012-01-01 The current 7 TeV run of the LHC experiment shall be able to probe gluino and squark masses up to values larger than 1 TeV. Assuming that hints for SUSY are found in the jets plus missing energy channel by the end of a 5 fb -1 run, we explore the flavour constraints on three models with a CMSSM-like spectrum: the CMSSM itself, a seesaw extension of the CMSSM, and Flavoured CMSSM. In particular, we focus on decays that might have been measured by the time the run is concluded, such as B s →μμ and μ→e γ. We also analyse constraints imposed by neutral meson bounds and electric dipole moments. The interplay between collider and flavour experiments is explored through the use of three benchmark scenarios, finding the flavour feedback useful in order to determine the model parameters and to test the consistency of the different models. (orig.) 15. Charm production and mass scales in deep inelastic processes International Nuclear Information System (INIS) Close, F.E.; Scott, D.M.; Sivers, D. 1976-07-01 Because of their large mass, the production of charmed particles offers the possibility of new insight into fundamental dynamics. An approach to deep inelastic processes is discussed in which Generalized Vector Meson Dominance is used to extend parton model results away from the strict Bjorken scaling limit into regions where mass scales play an important role. The processes e + e - annihilation, photoproduction, deep inelastic leptoproduction, photon-photon scattering and the production of lepton pairs in hadronic collisions are discussed. The GCMD approach provides a reasonably unified framework and makes specific predictions concerning the way in which these reactions reflect an underlying flavour symmetry, broken by large mass differences. (author) 16. Mesino oscillation in MFV SUSY Energy Technology Data Exchange (ETDEWEB) Berger, Joshua [Cornell University, Department of Physics, LEPP, Ithaca, NY (United States); SLAC National Accelerator Laboratory, Menlo Park, CA (United States); Csaki, Csaba; Grossman, Yuval; Heidenreich, Ben [Cornell University, Department of Physics, LEPP, Ithaca, NY (United States) 2013-04-15 R-parity violating supersymmetry in a Minimal Flavor Violation paradigm can produce same-sign dilepton signals via direct sbottom-LSP pair production. Such signals arise when the sbottom hadronizes and the resulting mesino oscillates into an antimesino. The first bounds on the sbottom mass are placed in this scenario using current LHC results. (orig.) 17. Radiative natural SUSY spectrum from deflected AMSB scenario with messenger-matter interactions Energy Technology Data Exchange (ETDEWEB) Wang, Fei [School of Physics, Zhengzhou University,Zhengzhou 450000 (China); State Key Laboratory of Theoretical Physics,Institute of Theoretical Physics, Chinese Academy of Sciences,Beijing 100080 (China); Yang, Jin Min [State Key Laboratory of Theoretical Physics,Institute of Theoretical Physics, Chinese Academy of Sciences,Beijing 100080 (China); Department of Physics, Tohoku University,Sendai 980-8578 (Japan); Zhang, Yang [State Key Laboratory of Theoretical Physics,Institute of Theoretical Physics, Chinese Academy of Sciences,Beijing 100080 (China) 2016-04-29 A radiative natural SUSY spectrum are proposed in the deflected anomaly mediation scenario with general messenger-matter interactions. Due to the contributions from the new interactions, positive slepton masses as well as a large |A{sub t}| term can naturally be obtained with either sign of deflection parameter and few messenger species (thus avoid the possible Landau pole problem). In this scenario, in contrast to the ordinary (radiative) natural SUSY scenario with under-abundance of dark matter (DM), the DM can be the mixed bino-higgsino and have the right relic density. The 125 GeV Higgs mass can also be easily obtained in our scenario. The majority of low EW fine tuning points can be covered by the XENON-1T direct detection experiments. 18. Calibrating the Planck cluster mass scale with CLASH Science.gov (United States) Penna-Lima, M.; Bartlett, J. G.; Rozo, E.; Melin, J.-B.; Merten, J.; Evrard, A. E.; Postman, M.; Rykoff, E. 2017-08-01 We determine the mass scale of Planck galaxy clusters using gravitational lensing mass measurements from the Cluster Lensing And Supernova survey with Hubble (CLASH). We have compared the lensing masses to the Planck Sunyaev-Zeldovich (SZ) mass proxy for 21 clusters in common, employing a Bayesian analysis to simultaneously fit an idealized CLASH selection function and the distribution between the measured observables and true cluster mass. We used a tiered analysis strategy to explicitly demonstrate the importance of priors on weak lensing mass accuracy. In the case of an assumed constant bias, bSZ, between true cluster mass, M500, and the Planck mass proxy, MPL, our analysis constrains 1-bSZ = 0.73 ± 0.10 when moderate priors on weak lensing accuracy are used, including a zero-mean Gaussian with standard deviation of 8% to account for possible bias in lensing mass estimations. Our analysis explicitly accounts for possible selection bias effects in this calibration sourced by the CLASH selection function. Our constraint on the cluster mass scale is consistent with recent results from the Weighing the Giants program and the Canadian Cluster Comparison Project. It is also consistent, at 1.34σ, with the value needed to reconcile the Planck SZ cluster counts with Planck's base ΛCDM model fit to the primary cosmic microwave background anisotropies. 19. SUSY-hierarchy of one-dimensional reflectionless potentials CERN Document Server Maydanyuk, Sergei P 2004-01-01 A class of one-dimensional reflectionless potentials, an absolute transparency of which is concerned with their belonging to one SUSY-hierarchy with a constant potential, is studied. An approach for determination of a general form of the reflectionless potential on the basis of construction of such a hierarchy by the recurrent method is proposed. A general form of interdependence between superpotentials with neighboring numbers of this hierarchy, opening a possibility to find new reflectionless potentials, have a simple analytical view and are expressed through finite number of elementary functions (unlike some reflectionless potentials, which are constructed on the basis of soliton solutions or are shape invariant in one or many steps with involving scaling of parameters, and are expressed through series), is obtained. An analysis of absolute transparency existence for the potential which has the inverse power dependence on space coordinate (and here tunneling is possible), i.e. which has the formV(x) = \\p...
20. Recent SUSY Results from CMS
CERN Multimedia
CERN. Geneva
2012-01-01
We present a summary of the recent results of searches for supersymmetry conducted by the CMS experiment. Several searches are reported using complementary final states and methods. The results presented include searches for stops and sbottoms, production of charginos and neutralinos, and R-parity violating signatures. Several of them are the first results of their kind from CMS, while others increased the mass reach significantly over previously published results from the LHC.
1. Results from GRACE/SUSY at one-loop
We report the recent development on the SUSY calculations with the help of GRACE system. GRACE/SUSY/1LOOP is the computer code which can generate Feynman diagrams in the MSSM automatically and compute one-loop amplitudes in the numerical way. We present new results of various two-body decay widths ...
2. A low energy dynamical SUSY breaking scenario motivated from superstring derived unification
CERN Document Server
Faraggi, Alon E.
1996-01-01
Recently there has been a resurgence of interest in gauge mediated dynamical supersymmetry breaking scenarios. I investigate how low energy dynamical SUSY breaking may arise from superstring models. In a three generation string derived model I propose that the unbroken hidden non--Abelian gauge group at the string scale is SU(3)_H with matter multiplets. Due to the small gauge content of the hidden gauge group the supersymmetry breaking scale may be consistent with the dynamical SUSY breaking scenarios. The messenger states are obtained in the superstring model from sectors which arise due to the Wilson--line'' breaking of the unifying non--Abelian gauge symmetry. An important property of the string motivated messenger states is the absence of superpotential terms with the Standard Model states. The stringy symmetries therefore forbid the flavor changing processes which may arise due to couplings between the messenger sector states and the Standard Model states. Motivated from the problem of string gauge co...
3. The fine-tuning cost of the likelihood in SUSY models
International Nuclear Information System (INIS)
Ghilencea, D.M.; Ross, G.G.
2013-01-01
In SUSY models, the fine-tuning of the electroweak (EW) scale with respect to their parameters γ i ={m 0 ,m 1/2 ,μ 0 ,A 0 ,B 0 ,…} and the maximal likelihood L to fit the experimental data are usually regarded as two different problems. We show that, if one regards the EW minimum conditions as constraints that fix the EW scale, this commonly held view is not correct and that the likelihood contains all the information about fine-tuning. In this case we show that the corrected likelihood is equal to the ratio L/Δ of the usual likelihood L and the traditional fine-tuning measure Δ of the EW scale. A similar result is obtained for the integrated likelihood over the set {γ i }, that can be written as a surface integral of the ratio L/Δ, with the surface in γ i space determined by the EW minimum constraints. As a result, a large likelihood actually demands a large ratio L/Δ or equivalently, a small χ new 2 =χ old 2 +2lnΔ. This shows the fine-tuning cost to the likelihood (χ new 2 ) of the EW scale stability enforced by SUSY, that is ignored in data fits. A good χ new 2 /d.o.f.≈1 thus demands SUSY models have a fine-tuning amount Δ≪exp(d.o.f./2), which provides a model-independent criterion for acceptable fine-tuning. If this criterion is not met, one can thus rule out SUSY models without a further χ 2 /d.o.f. analysis. Numerical methods to fit the data can easily be adapted to account for this effect.
4. Relative scale and the strength and deformability of rock masses
Science.gov (United States)
Schultz, Richard A.
1996-09-01
The strength and deformation of rocks depend strongly on the degree of fracturing, which can be assessed in the field and related systematically to these properties. Appropriate Mohr envelopes obtained from the Rock Mass Rating (RMR) classification system and the Hoek-Brown criterion for outcrops and other large-scale exposures of fractured rocks show that rock-mass cohesive strength, tensile strength, and unconfined compressive strength can be reduced by as much as a factor often relative to values for the unfractured material. The rock-mass deformation modulus is also reduced relative to Young's modulus. A "cook-book" example illustrates the use of RMR in field applications. The smaller values of rock-mass strength and deformability imply that there is a particular scale of observation whose identification is critical to applying laboratory measurements and associated failure criteria to geologic structures.
5. SUSY searches in early CMS data
International Nuclear Information System (INIS)
Tricomi, A
2008-01-01
In the first year of data taking at LHC, the CMS experiment expects to collect about 1 fb -1 of data, which make possible the first searches for new phenomena. All such searches require however the measurement of the SM background and a detailed understanding of the detector performance, reconstruction algorithms and triggering. The CMS efforts are hence addressed to designing a realistic analysis plan in preparation to the data taking. In this paper, the CMS perspectives and analysis strategies for Supersymmetry (SUSY) discovery with early data are presented
6. Higgs mass naturalness and scale invariance in the UV
CERN Document Server
Tavares, Gustavo Marques; Skiba, Witold
2014-01-01
It has been suggested that electroweak symmetry breaking in the Standard Model may be natural if the Standard Model merges into a conformal field theory (CFT) at short distances. In such a scenario the Higgs mass would be protected from quantum corrections by the scale invariance of the CFT. In order for the Standard Model to merge into a CFT at least one new ultraviolet (UV) scale is required at which the couplings turn over from their usual Standard Model running to the fixed point behavior. We argue that the Higgs mass is sensitive to such a turn-over scale even if there are no associated massive particles and the scale arises purely from dimensional transmutation. We demonstrate this sensitivity to the turnover scale explicitly in toy models. Thus if scale invariance is responsible for Higgs mass naturalness, then the transition to CFT dynamics must occur near the TeV scale with observable consequences at colliders. In addition, the UV fixed point theory in such a scenario must be interacting because loga...
7. Viable and testable SUSY GUTs with Yukawa unification the case of split trilinears
CERN Document Server
2009-01-01
We explore general SUSY GUT models with exact third-generation Yukawa unification, but where the requirement of universal soft terms at the GUT scale is relaxed. We consider the scenario in which the breaking of universality inherits from the Yukawa couplings, i.e. is of minimal flavor violating (MFV) type. In particular, the MFV principle allows for a splitting between the up-type and the down-type soft trilinear couplings. We explore the viability of this trilinear splitting scenario by means of a fitting procedure to electroweak observables, quark masses as well as flavor-changing neutral current processes. Phenomenological viability singles out one main scenario. This scenario is characterized by a sizable splitting between the trilinear soft terms and a large mu term. Remarkably, this scenario does not invoke a partial decoupling of the sparticle spectrum, as in the case of universal soft terms, but instead it requires part of the spectrum, notably the lightest stop, the gluino and the lightest charginos...
8. Effective Planck Mass and the Scale of Inflation
CERN Document Server
Kleban, Matthew; Porrati, Massimo
2016-01-11
A recent paper argued that it is not possible to infer the energy scale of inflation from the amplitude of tensor fluctuations in the Cosmic Microwave Background, because the usual connection is substantially altered if there are a large number of universally coupled fields present during inflation, with mass less than the inflationary Hubble scale. We give a simple argument demonstrating that this is incorrect.
9. Leptogenesis in a Δ(27)×SO(10) SUSY GUT
Energy Technology Data Exchange (ETDEWEB)
Björkeroth, Fredrik [School of Physics and Astronomy, University of Southampton,SO17 1BJ Southampton (United Kingdom); Anda, Francisco J. de [Departamento de Física, CUCEI, Universidad de Guadalajara,Guadalajara (Mexico); Varzielas, Ivo de Medeiros; King, Stephen F. [School of Physics and Astronomy, University of Southampton,SO17 1BJ Southampton (United Kingdom)
2017-01-17
Although SO(10) Supersymmetric (SUSY) Grand Unification Theories (GUTs) are very attractive for neutrino mass and mixing, it is often quite difficult to achieve successful leptogenesis from the lightest right-handed neutrino N{sub 1} due to the strong relations between neutrino and up-type quark Yukawa couplings. We show that in a realistic model these constraints are relaxed, making N{sub 1} leptogenesis viable. To illustrate this, we calculate the baryon asymmetry of the Universe Y{sub B} from flavoured N{sub 1} leptogenesis in a recently proposed Δ(27)×SO(10) SUSY GUT. The flavoured Boltzmann equations are solved numerically, and comparison with the observed Y{sub B} places constraints on the allowed values of right-handed neutrino masses and neutrino Yukawa couplings. The flavoured SO(10) SUSY GUT is not only fairly complete and predictive in the lepton sector, but can also explain the BAU through leptogenesis with natural values in the lepton sector albeit with some tuning in the quark sector.
10. Geoelectrical Measurement of Multi-Scale Mass Transfer Parameters
Energy Technology Data Exchange (ETDEWEB)
Day-Lewis, Frederick David [US Geological Survey, Storrs, CT (United States); Singha, Kamini [Colorado School of Mines, Golden, CO (United States); Johnson, Timothy C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Haggerty, Roy [Oregon State Univ., Corvallis, OR (United States); Binley, Andrew [Lancaster Univ. (United Kingdom); Lane, John W. [US Geological Survey, Storrs, CT (United States)
2014-11-25
Mass transfer affects contaminant transport and is thought to control the efficiency of aquifer remediation at a number of sites within the Department of Energy (DOE) complex. An improved understanding of mass transfer is critical to meeting the enormous scientific and engineering challenges currently facing DOE. Informed design of site remedies and long-term stewardship of radionuclide-contaminated sites will require new cost-effective laboratory and field techniques to measure the parameters controlling mass transfer spatially and across a range of scales. In this project, we sought to capitalize on the geophysical signatures of mass transfer. Previous numerical modeling and pilot-scale field experiments suggested that mass transfer produces a geoelectrical signature—a hysteretic relation between sampled (mobile-domain) fluid conductivity and bulk (mobile + immobile) conductivity—over a range of scales relevant to aquifer remediation. In this work, we investigated the geoelectrical signature of mass transfer during tracer transport in a series of controlled experiments to determine the operation of controlling parameters, and also investigated the use of complex-resistivity (CR) as a means of quantifying mass transfer parameters in situ without tracer experiments. In an add-on component to our grant, we additionally considered nuclear magnetic resonance (NMR) to help parse mobile from immobile porosities. Including the NMR component, our revised study objectives were to: 1. Develop and demonstrate geophysical approaches to measure mass-transfer parameters spatially and over a range of scales, including the combination of electrical resistivity monitoring, tracer tests, complex resistivity, nuclear magnetic resonance, and materials characterization; and 2. Provide mass-transfer estimates for improved understanding of contaminant fate and transport at DOE sites, such as uranium transport at the Hanford 300 Area. To achieve our objectives, we implemented a 3
11. Supersymmetry production from a TeV scale black hole at CERN LHC
International Nuclear Information System (INIS)
Chamblin, Andrew; Cooper, Fred; Nayak, Gouranga C.
2004-01-01
If the fundamental Planck scale is near a TeV, then we should expect to see TeV scale black holes at the CERN LHC. Similarly, if the scale of supersymmetry (SUSY) breaking is sufficiently low, then we might expect to see light supersymmetric particles in the next generation of colliders. If the mass of the supersymmetric particle is of order a TeV and is comparable to the temperature of a typical TeV scale black hole, then such sparticles will be copiously produced via Hawking radiation: The black hole will act as a resonance for sparticles, among other things. In this paper we compare various signatures for SUSY production at LHC, and we contrast the situation where the sparticles are produced directly via parton fusion processes with the situation where they are produced indirectly through black hole resonances. We found that black hole resonances provide a larger source for heavy mass SUSY (squark and gluino) production than the direct perturbative QCD-SUSY production via parton fusion processes depending on the values of the Planck mass and black hole mass. Hence black hole production at LHC may indirectly act as a dominant channel for SUSY production. We also found that the differential cross section dσ/dp t for SUSY production increases as a function of the p t (up to p t equal to about 1 TeV or more) of the SUSY particles (squarks and gluinos), which is in sharp contrast with the pQCD predictions where the differential cross section dσ/dp t decreases as p t increases for high p t about 1 TeV or higher. This is a feature for any particle emission from a TeV scale black hole as long as the temperature of the black hole is very high (∼TeV). Hence the measurement of increase of dσ/dp t with p t for p t up to about 1 TeV or higher for final state particles might be a useful signature for black hole production at LHC
12. Implicit Priors in Galaxy Cluster Mass and Scaling Relation Determinations
Science.gov (United States)
Mantz, A.; Allen, S. W.
2011-01-01
Deriving the total masses of galaxy clusters from observations of the intracluster medium (ICM) generally requires some prior information, in addition to the assumptions of hydrostatic equilibrium and spherical symmetry. Often, this information takes the form of particular parametrized functions used to describe the cluster gas density and temperature profiles. In this paper, we investigate the implicit priors on hydrostatic masses that result from this fully parametric approach, and the implications of such priors for scaling relations formed from those masses. We show that the application of such fully parametric models of the ICM naturally imposes a prior on the slopes of the derived scaling relations, favoring the self-similar model, and argue that this prior may be influential in practice. In contrast, this bias does not exist for techniques which adopt an explicit prior on the form of the mass profile but describe the ICM non-parametrically. Constraints on the slope of the cluster mass-temperature relation in the literature show a separation based the approach employed, with the results from fully parametric ICM modeling clustering nearer the self-similar value. Given that a primary goal of scaling relation analyses is to test the self-similar model, the application of methods subject to strong, implicit priors should be avoided. Alternative methods and best practices are discussed.
13. HMC algorithm with multiple time scale integration and mass preconditioning
Science.gov (United States)
Urbach, C.; Jansen, K.; Shindler, A.; Wenger, U.
2006-01-01
We present a variant of the HMC algorithm with mass preconditioning (Hasenbusch acceleration) and multiple time scale integration. We have tested this variant for standard Wilson fermions at β=5.6 and at pion masses ranging from 380 to 680 MeV. We show that in this situation its performance is comparable to the recently proposed HMC variant with domain decomposition as preconditioner. We give an update of the "Berlin Wall" figure, comparing the performance of our variant of the HMC algorithm to other published performance data. Advantages of the HMC algorithm with mass preconditioning and multiple time scale integration are that it is straightforward to implement and can be used in combination with a wide variety of lattice Dirac operators.
14. GUT scale and superpartner masses from anomaly mediated supersymmetry breaking
International Nuclear Information System (INIS)
Chacko, Z.; Luty, Markus A.; Ponton, Eduardo; Shadmi, Yael; Shirman, Yuri
2001-01-01
We consider models of anomaly-mediated supersymmetry breaking (AMSB) in which the grand unification (GUT) scale is determined by the vacuum expectation value of a chiral superfield. If the anomaly-mediated contributions to the potential are balanced by gravitational-strength interactions, a GUT scale of M Planck /(16π 2 ) can be generated. The GUT threshold also affects superpartner masses, and can easily give rise to realistic predictions if the GUT gauge group is asymptotically free. We give an explicit example of a model with these features, in which the doublet-triplet splitting problem is solved. The resulting superpartner spectrum is very different from that of previously considered AMSB models, with gaugino masses typically unifying at the GUT scale
15. Geoelectrical Measurement of Multi-Scale Mass Transfer Parameters
Energy Technology Data Exchange (ETDEWEB)
Day-Lewis, Frederick; Singha, Kamini; Haggerty, Roy; Johnson, Tim; Binley, Andrew; Lane, John
2014-01-16
Mass transfer affects contaminant transport and is thought to control the efficiency of aquifer remediation at a number of sites within the Department of Energy (DOE) complex. An improved understanding of mass transfer is critical to meeting the enormous scientific and engineering challenges currently facing DOE. Informed design of site remedies and long-term stewardship of radionuclide-contaminated sites will require new cost-effective laboratory and field techniques to measure the parameters controlling mass transfer spatially and across a range of scales. In this project, we sought to capitalize on the geophysical signatures of mass transfer. Previous numerical modeling and pilot-scale field experiments suggested that mass transfer produces a geoelectrical signature—a hysteretic relation between sampled (mobile-domain) fluid conductivity and bulk (mobile + immobile) conductivity—over a range of scales relevant to aquifer remediation. In this work, we investigated the geoelectrical signature of mass transfer during tracer transport in a series of controlled experiments to determine the operation of controlling parameters, and also investigated the use of complex-resistivity (CR) as a means of quantifying mass transfer parameters in situ without tracer experiments. In an add-on component to our grant, we additionally considered nuclear magnetic resonance (NMR) to help parse mobile from immobile porosities. Including the NMR component, our revised study objectives were to: 1. Develop and demonstrate geophysical approaches to measure mass-transfer parameters spatially and over a range of scales, including the combination of electrical resistivity monitoring, tracer tests, complex resistivity, nuclear magnetic resonance, and materials characterization; and 2. Provide mass-transfer estimates for improved understanding of contaminant fate and transport at DOE sites, such as uranium transport at the Hanford 300 Area. To achieve our objectives, we implemented a 3
16. Finite N=1 SUSY gauge field theories
International Nuclear Information System (INIS)
Kazakov, D.I.
1986-01-01
The authors give a detailed description of the method to construct finite N=1 SUSY gauge field theories in the framework of N=1 superfields within dimensional regularization. The finiteness of all Green functions is based on supersymmetry and gauge invariance and is achieved by a proper choice of matter content of the theory and Yukawa couplings in the form Y i =f i (ε)g, where g is the gauge coupling, and the function f i (ε) is regular at ε=0 and is calculated in perturbation theory. Necessary and sufficient conditions for finiteness are determined already in the one-loop approximation. The correspondence with an earlier proposed approach to construct finite theories based on aigenvalue solutions of renormalization-group equations is established
17. One-loop stabilization of the fuzzy four-sphere via softly broken SUSY
Energy Technology Data Exchange (ETDEWEB)
Steinacker, Harold C. [Faculty of Physics, University of Vienna,Boltzmanngasse 5, A-1090 Vienna (Austria)
2015-12-17
We describe a stabilization mechanism for fuzzy S{sub N}{sup 4} in the Euclidean IIB matrix model due to vacuum energy in the presence of a positive mass term. The one-loop effective potential for the radius contains an attractive contribution attributed to supergravity, while the mass term induces a repulsive contribution for small radius due to SUSY breaking. This leads to a stabilization of the radius. The mechanism should be pertinent to recent results on the genesis of 3+1-dimensional space-time in the Minkowskian IIB model.
18. Neutralino Dark Matter in non-universal and non-minimal SUSY
International Nuclear Information System (INIS)
King, S.F.
2010-01-01
We discuss neutralino dark matter in non-universal SUSY including the NUHM, SU(5) with non-universal gauginos. In the MSSM we argue from naturalness that non-universal soft mass parameters are preferred, with non-universal gaugino masses enabling supernatural dark matter beyond the MSSM, we also discuss neutralino dark matter in the U SSM and E 6 SSM. In the E 6 SSM a light neutralino LSP coming from the inert Higgsino and singlino sector is unavoidable and makes an attractive dark matter candidate.
19. Lightest Higgs boson mass in split supersymmetry with the seesaw mechanism
International Nuclear Information System (INIS)
Cao Junjie; Yang Jinmin
2005-01-01
In the minimal supersymmetric standard model extended by including right-handed neutrinos with seesaw mechanism, the neutrino Yukaka couplings can be as large as the top-quark Yukawa couplings and thus the neutrino/sneutrino may cause sizable effects in Higgs boson self-energy loops. Our explicit one-loop calculations show that the neutrino/sneutrino effects may have an opposite sign to top/stop effects and thus lighten the lightest Higgs boson. If the soft-breaking mass of the right-handed neutrino is very large (at the order of Majorana mass scale), such as in the split-supersymmetry (SUSY) scenario, the effects can lower the lightest Higgs boson mass by a few tens of GeV. So the Higgs mass bound of about 150 GeV in split-SUSY may be lowered significantly if right-handed neutrinos come into play with seesaw mechanism
20. Search for the decay stau --> tau + gravitino in the framework of the Minimal Gauge Mediated SUSY Breaking models
CERN Document Server
Cavallo, F R
1997-01-01
A search for these decays was carried out in the context of Gauge Mediated SUSY Breaking models, using the data collected by DELPHI in 1995 and 1996 at the center of mass energies of 133, 161 and 172 GeV. No evidence of these processes was found for a decay length ranging from ~ 1mm to ~ 20cm and limits were derived on the gravitino and scalar tau masses.
1. Concordia elas tuleviku arvelt / Mart Susi ; interv. Krister Kivi
Index Scriptorium Estoniae
Susi, Mart, 1965-
2003-01-01
Ilmunud ka: Infopress 21. märts nr. 12 lk. 30-31. Concordia Ülikooli rektor Mart Susi räägib kooli senisest juhtimisest ning asjaoludest, mis on põhjustanud pankroti. Tabel: Concordia kronoloogia
2. Search for non-standard SUSY signatures in CMS
International Nuclear Information System (INIS)
Teyssier, Daniel
2008-01-01
New studies of the CMS collaboration are presented on the sensitivity to searches for non-standard signatures of particular SUSY scenarios. These signatures include non-pointing photons as well as pairs of prompt photons as expected GMSB SUSY models, as well as heavy stable charged particles produced in split supersymmetry models, long lived staus from GMSB SUSY and long lived stops in other SUSY scenarios. Detailed detector simulation is used for the study, and all relevant Standard Model background and detector effects that can mimic these special signatures are included. It is shown that with already with less than 100 pb -1 the CMS sensitivity will probe an interesting as yet by data unexplored parameter range of these models.
3. Scales of guide field reconnection at the hydrogen mass ratio
International Nuclear Information System (INIS)
Lapenta, G.; Markidis, S.; Divin, A.; Goldman, M.; Newman, D.
2010-01-01
We analyze the signatures of component reconnection for a Harris current sheet with a guide field using the physical mass ratio of hydrogen. The study uses the fully kinetic particle in cell code IPIC3D to investigate the scaling with mass ratio of the following three main component reconnection features: electron density cavities along the separatrices, channels of fast electron flow within the cavities, and electron phase space holes due to the Buneman instability in the electron high speed channels. The width and strength of the electron holes and of the electron cavities are studied up the mass ratio proper of hydrogen, considering the effect of the simulation box size, and of the boundary conditions. The results compare favorably with the existing data from the Cluster and Themis missions and provide quantitative predictions for realistic conditions to be encountered by the planned magnetospheric multiscale mission.
4. Results from GRACE/SUSY at one-loop
International Nuclear Information System (INIS)
Fujimoto, J.; Ishikawa, T.; Kurihara, Y.; Jimbo, M.; Yasui, Y.; Kaneko, T.; Kon, T.; Kuroda, M.; Shimizu, Y.
2007-01-01
We report the recent development on the SUSY calculations with the help of GRACE system. GRACE/SUSY/1LOOP is the computer code which can generate Feynman diagrams in the MSSM automatically and compute one-loop amplitudes in the numerical way. We present new results of various two-body widths and chargino pair production at ILC (international linear collider) at one-loop level. (author)
5. The effective potential in the presence of several mass scales
International Nuclear Information System (INIS)
Casas, J.A.; Di Clemente, V.; Quiros, M.
1999-01-01
We consider the problem of improving the effective potential in mass independent schemes, as e.g. the MS-bar or DR-bar renormalization scheme, in the presence of an arbitrary number of fields with PHI-dependent masses M i(PHI c ) . We use the decoupling theorem at the scales μ i M i (PHI c ) such that the matching between the effective (low energy) and complete (high energy) one-loop theories contains no thresholds. We find that for any value of PHI c , there is a convenient scale μ * ≡ min i M i (PHI c ), at which the loop expansion has the best behaviour and the effective potential has the least μ-dependence. Furthermore, at this scale the effective potential coincides with the (improved) tree-level one in the effective field theory. The decoupling method is explicitly illustrated with a simple Higgs-Yukawa model, along with its relationship with other decoupling prescriptions and with proposed multi-scale renormalization approaches. The procedure leads to a nice suppression of potentially large logarithms and can be easily adapted to include higher-loop effects, which is explicitly shown at the two-loop level
6. The evolving Planck mass in classically scale-invariant theories
Energy Technology Data Exchange (ETDEWEB)
Kannike, K.; Raidal, M.; Spethmann, C.; Veermäe, H. [National Institute of Chemical Physics and Biophysics,Rävala 10, 10143 Tallinn (Estonia)
2017-04-05
We consider classically scale-invariant theories with non-minimally coupled scalar fields, where the Planck mass and the hierarchy of physical scales are dynamically generated. The classical theories possess a fixed point, where scale invariance is spontaneously broken. In these theories, however, the Planck mass becomes unstable in the presence of explicit sources of scale invariance breaking, such as non-relativistic matter and cosmological constant terms. We quantify the constraints on such classical models from Big Bang Nucleosynthesis that lead to an upper bound on the non-minimal coupling and require trans-Planckian field values. We show that quantum corrections to the scalar potential can stabilise the fixed point close to the minimum of the Coleman-Weinberg potential. The time-averaged motion of the evolving fixed point is strongly suppressed, thus the limits on the evolving gravitational constant from Big Bang Nucleosynthesis and other measurements do not presently constrain this class of theories. Field oscillations around the fixed point, if not damped, contribute to the dark matter density of the Universe.
7. The evolving Planck mass in classically scale-invariant theories
Science.gov (United States)
Kannike, K.; Raidal, M.; Spethmann, C.; Veermäe, H.
2017-04-01
We consider classically scale-invariant theories with non-minimally coupled scalar fields, where the Planck mass and the hierarchy of physical scales are dynamically generated. The classical theories possess a fixed point, where scale invariance is spontaneously broken. In these theories, however, the Planck mass becomes unstable in the presence of explicit sources of scale invariance breaking, such as non-relativistic matter and cosmological constant terms. We quantify the constraints on such classical models from Big Bang Nucleosynthesis that lead to an upper bound on the non-minimal coupling and require trans-Planckian field values. We show that quantum corrections to the scalar potential can stabilise the fixed point close to the minimum of the Coleman-Weinberg potential. The time-averaged motion of the evolving fixed point is strongly suppressed, thus the limits on the evolving gravitational constant from Big Bang Nucleosynthesis and other measurements do not presently constrain this class of theories. Field oscillations around the fixed point, if not damped, contribute to the dark matter density of the Universe.
8. Stable SUSY breaking model with O(10) eV gravitino from combined D-term gauge mediation and U(1)' mediation
International Nuclear Information System (INIS)
Nakayama, Yu
2008-01-01
We show a calculable example of stable supersymmetry (SUSY) breaking models with O(10) eV gravitino mass based on the combination of D-term gauge mediation and U(1)' mediation. A potential problem of the negative mass squared for the SUSY standard model (SSM) sfermions in the D-term gauge mediation is solved by the contribution from the U(1)' mediation. On the other hand, the splitting between the SSM gauginos and sfermions in the U(1)' mediation is circumvented by the contributions from the D-term gauge mediation. Since the U(1)' mediation does not introduce any new SUSY vacua, we achieve a completely stable model under thermal effects. Our model, therefore, has no cosmological difficulty
9. Predictions from a flavour GUT model combined with a SUSY breaking sector
Science.gov (United States)
Antusch, Stefan; Hohl, Christian
2017-10-01
We discuss how flavour GUT models in the context of supergravity can be completed with a simple SUSY breaking sector, such that the flavour-dependent (non-universal) soft breaking terms can be calculated. As an example, we discuss a model based on an SU(5) GUT symmetry and A 4 family symmetry, plus additional discrete "shaping symmetries" and a ℤ 4 R symmetry. We calculate the soft terms and identify the relevant high scale input parameters, and investigate the resulting predictions for the low scale observables, such as flavour violating processes, the sparticle spectrum and the dark matter relic density.
10. Searching for vortex solutions in graphene within an N=2 SUSY framework
International Nuclear Information System (INIS)
Abreu, Everton M.C.; Assis, Leonardo P.G. de; Helayel-Neto, Jose Abdalla; Nogueira, Alvaro L.M.A.; Paschoal, Ricardo C.
2011-01-01
Full text: In a recent work, we proposed an N=1-D=3 supersymmetric (SUSY) extension of Jackiw's et al. chiral gauge theory for graphene. As a first approach, we explored the idea that the chiral gauge formulation for Dirac fermions in graphene could be a sector of a wider SUSY theoretical setup, namely, the N=1 π 3 -QED. As a matter of fact, adding a superpotential operator to the N=1 π 3 -QED prescription, properly endowed with the constitutive chiral gauge and discrete symmetries that prevail in Jackiw's proposal, allows for the recognition of the Yukawa-like terms, along with spontaneous symmetry breaking configurations and corresponding non-null mass eigenvalues to the physical degrees of freedom. However, the additional requirement of invariance under a global phase transformation (GPT), meant to be associated to the electric charge, severely constrains the superpotential, leading to the exclusion of the sector that contains Jackiw's operators. As we proceed to investigate how the GP symmetry could be accommodated in a SUSY formulation, in the work of Ref. [E.M.C. Abreu, M.A. De Andrade, L.P.G. de Assis, J.A. Helayel-Neto, A.L.M.A. Nogueira and R.C. Paschoal, N=2-D=3 Supersymmetry and the Electric Charge in Graphene] we assess the straightforward N=1-generalization of Jackiw-Pi's chiral gauge theory, obtained at the cost of adding an extra superfield to the original SUSY-π 3 -QED field content. Moreover, we are able to construct an N=2-D=3 further extension of the chiral gauge theory for electrons in graphene. Such an N=2 SUSY framework provides an algebraic structure rich enough to imply a set of equations that minimizes the energy functional, namely, the well-known Bogomol'nyi equations. In this work, by taking the action of one of the supersymmetry charges to be trivial, we obtain the proper set of Bogomol'nyi equations. We finally impose a vortex-like trial solution, as we wish to discuss the resulting non-perturbative spectrum of the present N=2 setup
11. Searching for vortex solutions in graphene within an N=2 SUSY framework
Energy Technology Data Exchange (ETDEWEB)
Abreu, Everton M.C. [Universidade Federal Rural do Rio de Janeiro (UFRRJ), Seropedica, RJ (Brazil). Dept. de Fisica; Andrade, Marco A. de [Universidade do Estado do Rio de Janeiro (UERJ), Resende, RJ (Brazil); Grupo de Fisica Teorica Jose Leite Lopes (GFT-JLL), Petropolis, RJ (Brazil); Assis, Leonardo P.G. de [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); Helayel-Neto, Jose Abdalla [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); Grupo de Fisica Teorica Jose Leite Lopes (GFT-JLL), Petropolis, RJ (Brazil); Nogueira, Alvaro L.M.A.; Paschoal, Ricardo C. [Centro Federal de Educacao Tecnologica Celso Suckow da Fonseca (CEFET/RJ), Rio de Janeiro, RJ (Brazil); Grupo de Fisica Teorica Jose Leite Lopes (GFT-JLL), Petropolis, RJ (Brazil)
2011-07-01
Full text: In a recent work, we proposed an N=1-D=3 supersymmetric (SUSY) extension of Jackiw's et al. chiral gauge theory for graphene. As a first approach, we explored the idea that the chiral gauge formulation for Dirac fermions in graphene could be a sector of a wider SUSY theoretical setup, namely, the N=1 {pi}{sub 3}-QED. As a matter of fact, adding a superpotential operator to the N=1 {pi}{sub 3}-QED prescription, properly endowed with the constitutive chiral gauge and discrete symmetries that prevail in Jackiw's proposal, allows for the recognition of the Yukawa-like terms, along with spontaneous symmetry breaking configurations and corresponding non-null mass eigenvalues to the physical degrees of freedom. However, the additional requirement of invariance under a global phase transformation (GPT), meant to be associated to the electric charge, severely constrains the superpotential, leading to the exclusion of the sector that contains Jackiw's operators. As we proceed to investigate how the GP symmetry could be accommodated in a SUSY formulation, in the work of Ref. [E.M.C. Abreu, M.A. De Andrade, L.P.G. de Assis, J.A. Helayel-Neto, A.L.M.A. Nogueira and R.C. Paschoal, N=2-D=3 Supersymmetry and the Electric Charge in Graphene] we assess the straightforward N=1-generalization of Jackiw-Pi's chiral gauge theory, obtained at the cost of adding an extra superfield to the original SUSY-{pi}{sub 3}-QED field content. Moreover, we are able to construct an N=2-D=3 further extension of the chiral gauge theory for electrons in graphene. Such an N=2 SUSY framework provides an algebraic structure rich enough to imply a set of equations that minimizes the energy functional, namely, the well-known Bogomol'nyi equations. In this work, by taking the action of one of the supersymmetry charges to be trivial, we obtain the proper set of Bogomol'nyi equations. We finally impose a vortex-like trial solution, as we wish to discuss the resulting non
12. Large scale electromechanical transistor with application in mass sensing
Energy Technology Data Exchange (ETDEWEB)
Jin, Leisheng; Li, Lijie, E-mail: [email protected] [Multidisciplinary Nanotechnology Centre, College of Engineering, Swansea University, Swansea SA2 8PP (United Kingdom)
2014-12-07
Nanomechanical transistor (NMT) has evolved from the single electron transistor, a device that operates by shuttling electrons with a self-excited central conductor. The unfavoured aspects of the NMT are the complexity of the fabrication process and its signal processing unit, which could potentially be overcome by designing much larger devices. This paper reports a new design of large scale electromechanical transistor (LSEMT), still taking advantage of the principle of shuttling electrons. However, because of the large size, nonlinear electrostatic forces induced by the transistor itself are not sufficient to drive the mechanical member into vibration—an external force has to be used. In this paper, a LSEMT device is modelled, and its new application in mass sensing is postulated using two coupled mechanical cantilevers, with one of them being embedded in the transistor. The sensor is capable of detecting added mass using the eigenstate shifts method by reading the change of electrical current from the transistor, which has much higher sensitivity than conventional eigenfrequency shift approach used in classical cantilever based mass sensors. Numerical simulations are conducted to investigate the performance of the mass sensor.
13. Analytical expressions for radiatively corrected Higgs masses and couplings in the MSSM
International Nuclear Information System (INIS)
Carena, M.
1995-03-01
We propose, for the computation of the Higgs mass spectrum and couplings, a renormalization-group improved leading-log approximation, where the renormalization scale is fixed to the top-quark pole mass. For the case m A ∝M SUSY , our leading-log approximation differs by less than 2 GeV from previous results on the Higgs mass computed using a nearly scale independent renormalization-group improved effective potential up to next-to-leading order. Moreover, for the general case m A SUSY , we provide analytical formulae (including two-loop leading-log corrections) for all the masses and couplings in the Higgs sector. For M SUSY A , tan β and the stop mixing parameters, they reproduce the numerical renormalization-group improved leading-log result for the Higgs masses with an error of less than 3 GeV. For the Higgs couplings, our analytical formulae reproduce the numerical results equally well. Comparison with other methods is also performed. (orig.)
14. Prospects for mass unification at low energy scales
International Nuclear Information System (INIS)
Volkas, R.R.
1995-01-01
A simple Pati-Salam SU(4) model with a low symmetry breaking scale of about 1000 TeV is presented. The analysis concentrates on calculating radiative corrections to tree level mass relations for third generation fermions. The tree-level relation m b /m τ = 1 predicted by such models can receive large radiative corrections up to about 50% due to threshold effects at the mass unification scale. These corrections are thus of about the same importance as those that give rise to renormalisation group running. The high figure of 50% can be achieved because l-loop graphs involving the physical charged Higgs boson give corrections to m τ -m b that are proportional to the large top quark mass. These corrections can either increase or decrease m b /m τ depending on the value of an unknown parameter. They can also be made to vanish through a fine-tuning. A related model of tree-level t-b-τ unification which uses the identification of SU(2) R with custodial SU(2) is then discussed. A curious relation m b ∼ √2m τ is found to be satisfied at tree-level in this model. The overall conclusion of this work is that the tree-level relation m b =m τ at low scales such as 1000 TeV or somewhat higher can produce a successful value for m b /m τ after corrections, but one must be mindful that radiative corrections beyond those incorporated through the renormalisation group can be very important. 14 refs., 7 figs
15. Prospects for mass unification at low energy scales
Energy Technology Data Exchange (ETDEWEB)
Volkas, R.R.
1995-12-31
A simple Pati-Salam SU(4) model with a low symmetry breaking scale of about 1000 TeV is presented. The analysis concentrates on calculating radiative corrections to tree level mass relations for third generation fermions. The tree-level relation m{sub b}/m{sub {tau}} = 1 predicted by such models can receive large radiative corrections up to about 50% due to threshold effects at the mass unification scale. These corrections are thus of about the same importance as those that give rise to renormalisation group running. The high figure of 50% can be achieved because l-loop graphs involving the physical charged Higgs boson give corrections to m{sub {tau}} -m{sub b} that are proportional to the large top quark mass. These corrections can either increase or decrease m{sub b}/m{sub {tau}} depending on the value of an unknown parameter. They can also be made to vanish through a fine-tuning. A related model of tree-level t-b-{tau} unification which uses the identification of SU(2){sub R} with custodial SU(2) is then discussed. A curious relation m{sub b}{approx} {radical}2m{sub {tau}} is found to be satisfied at tree-level in this model. The overall conclusion of this work is that the tree-level relation m{sub b}=m{sub {tau}} at low scales such as 1000 TeV or somewhat higher can produce a successful value for m{sub b}/m{sub {tau}} after corrections, but one must be mindful that radiative corrections beyond those incorporated through the renormalisation group can be very important. 14 refs., 7 figs.
16. On Two-Scale Modelling of Heat and Mass Transfer
International Nuclear Information System (INIS)
Vala, J.; Stastnik, S.
2008-01-01
Modelling of macroscopic behaviour of materials, consisting of several layers or components, whose microscopic (at least stochastic) analysis is available, as well as (more general) simulation of non-local phenomena, complicated coupled processes, etc., requires both deeper understanding of physical principles and development of mathematical theories and software algorithms. Starting from the (relatively simple) example of phase transformation in substitutional alloys, this paper sketches the general formulation of a nonlinear system of partial differential equations of evolution for the heat and mass transfer (useful in mechanical and civil engineering, etc.), corresponding to conservation principles of thermodynamics, both at the micro- and at the macroscopic level, and suggests an algorithm for scale-bridging, based on the robust finite element techniques. Some existence and convergence questions, namely those based on the construction of sequences of Rothe and on the mathematical theory of two-scale convergence, are discussed together with references to useful generalizations, required by new technologies.
17. On Two-Scale Modelling of Heat and Mass Transfer
Science.gov (United States)
Vala, J.; Št'astník, S.
2008-09-01
Modelling of macroscopic behaviour of materials, consisting of several layers or components, whose microscopic (at least stochastic) analysis is available, as well as (more general) simulation of non-local phenomena, complicated coupled processes, etc., requires both deeper understanding of physical principles and development of mathematical theories and software algorithms. Starting from the (relatively simple) example of phase transformation in substitutional alloys, this paper sketches the general formulation of a nonlinear system of partial differential equations of evolution for the heat and mass transfer (useful in mechanical and civil engineering, etc.), corresponding to conservation principles of thermodynamics, both at the micro- and at the macroscopic level, and suggests an algorithm for scale-bridging, based on the robust finite element techniques. Some existence and convergence questions, namely those based on the construction of sequences of Rothe and on the mathematical theory of two-scale convergence, are discussed together with references to useful generalizations, required by new technologies.
18. Evidence of ghost suppression in gluon mass scale dynamics
Science.gov (United States)
Aguilar, A. C.; Binosi, D.; Figueiredo, C. T.; Papavassiliou, J.
2018-03-01
In this work we study the impact that the ghost sector of pure Yang-Mills theories may have on the generation of a dynamical gauge boson mass scale, which hinges on the appearance of massless poles in the fundamental vertices of the theory, and the subsequent realization of the well-known Schwinger mechanism. The process responsible for the formation of such structures is itself dynamical in nature, and is governed by a set of Bethe-Salpeter type of integral equations. While in previous studies the presence of massless poles was assumed to be exclusively associated with the background-gauge three-gluon vertex, in the present analysis we allow them to appear also in the corresponding ghost-gluon vertex. The full analysis of the resulting Bethe-Salpeter system reveals that the contribution of the poles associated with the ghost-gluon vertex are particularly suppressed, their sole discernible effect being a slight modification in the running of the gluon mass scale, for momenta larger than a few GeV. In addition, we examine the behavior of the (background-gauge) ghost-gluon vertex in the limit of vanishing ghost momentum, and derive the corresponding version of Taylor's theorem. These considerations, together with a suitable Ansatz, permit us the full reconstruction of the pole sector of the two vertices involved.
19. Mart ja Mari-Ann Susi taotlevad omanikena Concordia pankrotti / Andri Maimets
Index Scriptorium Estoniae
Maimets, Andri, 1979-
2003-01-01
Concordia Ülikooli rektor Mart Susi esitas kohtule avalduse, milles taotleb ülikooli pidanud Concordia Varahalduse OÜ pankroti väljakuulutamist. Vt. samas: Mari-Ann Susi õigustas ülikooli raha kasutamist
20. Search for SUSY with two same-sign leptons or three leptons and jets at $\\sqrt{s} = 13 \\text{ TeV}$ with the ATLAS Detector
CERN Document Server
Liu, Yang; The ATLAS collaboration
2017-01-01
Supersymmetry (SUSY) is a well motivated extension of the Standard Model (SM) that postulates the existence of a superpartner for each SM particle. A search for strongly produced SUSY particles decaying to a pair of two isolated \\textbf{same-sign leptons (SS)} or \\textbf{three leptons (3L)} has been carried out using the complete data set collected by the ATLAS experiment in 2015-16 at 13 TeV ($36.5 fb^{-1}$). The analysis benefits from a low SM background and uses looser kinematic requirements compared to other beyond the SM (BSM) searches which increases its sensitivity to scenarios with small mass differences between the SUSY particles, or in which R-parity is not conserved. The results are interpreted in the context of \\textbf{R-parity conserving (RPC)} or \\textbf{R-parity violating (RPV)} simplified signal models
1. Automated calculation of sinθ{sub W} and M{sub W} from muon decay within FlexibleSUSY
Energy Technology Data Exchange (ETDEWEB)
Bach, Markus; Stoeckinger, Dominik [IKTP, TU Dresden (Germany); Voigt, Alexander [DESY, Hamburg (Germany)
2016-07-01
The spectrum generator generator FlexibleSUSY can be utilized to investigate a variety of supersymmetric and non-supersymmetric models. We present an implementation which calculates the weak mixing angle from the precisely measured muon decay, especially taking vertex and box diagram corrections of the respective model into account. This framework also offers a prediction of the W boson mass which can be compared to the experimental value and thus used to exclude parameter regions.
2. Susy Les Houches accord: Interfacing SUSY spectrum calculators, decay packages, and event generators
International Nuclear Information System (INIS)
Skands, P.; Allanach, B.C.; Baer, H.
2003-11-01
An accord specifying generic file structures for 1) supersymmetric model specifications and input parameters, 2) electroweak scale supersymmetric mass and coupling spectra, and 3) decay tables is defined, to provide a universal interface between spectrum calculation programs, decay packages, and high energy physics event generators. (orig.)
3. Global-scale hydrological response to future glacier mass loss
Science.gov (United States)
Huss, Matthias; Hock, Regine
2018-01-01
Worldwide glacier retreat and associated future runoff changes raise major concerns over the sustainability of global water resources1-4, but global-scale assessments of glacier decline and the resulting hydrological consequences are scarce5,6. Here we compute global glacier runoff changes for 56 large-scale glacierized drainage basins to 2100 and analyse the glacial impact on streamflow. In roughly half of the investigated basins, the modelled annual glacier runoff continues to rise until a maximum (peak water') is reached, beyond which runoff steadily declines. In the remaining basins, this tipping point has already been passed. Peak water occurs later in basins with larger glaciers and higher ice-cover fractions. Typically, future glacier runoff increases in early summer but decreases in late summer. Although most of the 56 basins have less than 2% ice coverage, by 2100 one-third of them might experience runoff decreases greater than 10% due to glacier mass loss in at least one month of the melt season, with the largest reductions in central Asia and the Andes. We conclude that, even in large-scale basins with minimal ice-cover fraction, the downstream hydrological effects of continued glacier wastage can be substantial, but the magnitudes vary greatly among basins and throughout the melt season.
4. Dark matter and Bs→μ+μ- with minimal SO10 soft SUSY breaking
International Nuclear Information System (INIS)
Dermisek, R.; Roszkowski, L.; Ruiz de Austri, R.; Raby, S.
2003-01-01
CMSSM boundary conditions are usually used when calculating cosmological dark matter densities. In this paper we calculate the cosmological density of dark matter in the MSSM using minimal SO 10 soft SUSY breaking boundary conditions. These boundary conditions incorporate several attractive features: they are consistent with SO 10 Yukawa unification, they result in a 'natural' inverted scalar mass hierarchy and they reduce the dimension 5 operator contribution to the proton decay rate. With regards to dark matter, on the other hand, this is to a large extent an unexplored territory with large squark and slepton masses m 16 , large A 0 and small {μ,M 1/2 }. We find that in most regions of parameter space the cosmological density of dark matter is considerably less than required by the data. However there is a well-defined, narrow region of parameter space which provides the observed relic density of dark matter, as well as a good fit to precision electroweak data, including top, bottom and tau masses, and acceptable bounds on the branching fraction of B s →μ + μ - . We present predictions for Higgs and SUSY spectra, the dark matter detection cross section and the branching ratio BR(B s →μ + μ - ) in this region of parameter space. (author)
5. Validation and operational measurements with SUSIE – A sar ice motion processing chain developed within promice (Programme for monitoring of Greenland ice-sheet)
DEFF Research Database (Denmark)
Merryman Boncori, John Peter; Dall, Jørgen; Ahlstrøm, A. P.
2010-01-01
This paper describes the validation of an ice-motion processing chain developed for the PROMICE project – a long-term program funded by the Danish ministry of Climate and Energy to monitor the mass budget of the Greenland ice-sheet. The processor, named SUSIE, (Scripts and Utilities for SAR Ice...
6. Coupling between scattering channels with SUSY transformations for equal thresholds
International Nuclear Information System (INIS)
Pupasov, Andrey M; Samsonov, Boris F; Sparenberg, Jean-Marc; Baye, Daniel
2009-01-01
Supersymmetric (SUSY) transformations of the multichannel Schroedinger equation with equal thresholds and arbitrary partial waves in all channels are studied. The structures of the transformation function and the superpotential are analysed. Relations between Jost and scattering matrices of superpartner potentials are obtained. In particular, we show that a special type of SUSY transformation allows us to introduce a coupling between scattering channels starting from a potential with an uncoupled scattering matrix. The possibility for this coupling to be trivial is discussed. We show that the transformation introduces bound and virtual states with a definite degeneracy at the factorization energy. A detailed study of the potential and scattering matrices is given for the 2 x 2 case. The possibility of inverting coupled-channel scattering data by such a SUSY transformation is demonstrated by several examples (s-s, s-p and s-d partial waves)
7. Low mass-scale parity restoration in expanded gauge theories
International Nuclear Information System (INIS)
Rajpoot, S.
1982-07-01
It is shown that schemes of grand unification with SU(2n) 4 gauge symmetry permit the embedding of the left-right symmetric SU(2)sub(L)xSU(2)sub(R)xU(1)xSU(3) intermediate symmetry at relatively low energies (between 250 GeV and 1 TeV) as well as allowing light unification mass-scales ( 5 TeV) if n>=3 for values of the weak angle Sin 2 thetasub(W) and the strong coupling αsub(s) in the ranges 0.20 2 thetasub(W)<=0.25, 0.10<=αsub(s)<=0.15. (author)
8. RPC Production at General Tecnica: a mass scale production
International Nuclear Information System (INIS)
Della Volpe, D.; Morganti, S.
2006-01-01
The construction of LHC has deeply changed the RPC production. The enormous amount of detector needed and the strong requirements on gas volume quality had a deep impact on the production chain and on the QC and QA at the production site. This basically has brought the RPC from an almost hand-crafted detector to a medium scale mass product. The most critical aspects of the production chain have been modified and/or improved introducing new and more rigorous QC and QA procedures to guarantee the detector quality and improve the management of storage and the procurement on materials. Here it will be presented the work carried on in the last four year at the production site to improve and check the quality and the results achieved. Something like 10000 RPC were produced between 2002 and 2005. Also a preliminary and rough analysis on the efficiencies of the various phases in the chain production based on ATLAS production will be presented
9. Membranes for nanometer-scale mass fast transport
Science.gov (United States)
Bakajin, Olgica [San Leandro, CA; Holt, Jason [Berkeley, CA; Noy, Aleksandr [Belmont, CA; Park, Hyung Gyu [Oakland, CA
2011-10-18
Nanoporous membranes comprising single walled, double walled, and multiwalled carbon nanotubes embedded in a matrix material were fabricated for fluid mechanics and mass transfer studies on the nanometer scale and commercial applications. Average pore size can be 2 nm to 20 nm, or seven nm or less, or two nanometers or less. The membrane can be free of large voids spanning the membrane such that transport of material such as gas or liquid occurs exclusively through the tubes. Fast fluid, vapor, and liquid transport are observed. Versatile micromachining methods can be used for membrane fabrication. A single chip can comprise multiple membranes. These membranes are a robust platform for the study of confined molecular transport, with applications in liquid and gas separations and chemical sensing including desalination, dialysis, and fabric formation.
10. Fixing the EW scale in supersymmetric models after the Higgs discovery
CERN Document Server
Ghilencea, D M
2013-01-01
TeV-scale supersymmetry was originally introduced to solve the hierarchy problem and therefore fix the electroweak (EW) scale in the presence of quantum corrections. Numerical methods testing the SUSY models often report a good likelihood L (or chi^2=-2ln L) to fit the data {\\it including} the EW scale itself (m_Z^0) with a {\\it simultaneously} large fine-tuning i.e. a large variation of this scale under a small variation of the SUSY parameters. We argue that this is inconsistent and we identify the origin of this problem. Our claim is that the likelihood (or chi^2) to fit the data that is usually reported in such models does not account for the chi^2 cost of fixing the EW scale. When this constraint is implemented, the likelihood (or chi^2) receives a significant correction (delta_chi^2) that worsens the current data fits of SUSY models. We estimate this correction for the models: constrained MSSM (CMSSM), models with non-universal gaugino masses (NUGM) or higgs soft masses (NUHM1, NUHM2), the NMSSM and the ...
11. Peter J Derrick and the Grand Scale 'Magnificent Mass Machine' mass spectrometer at Warwick.
Science.gov (United States)
Colburn, A W; Derrick, Peter J; Bowen, Richard D
2017-12-01
The value of the Grand Scale 'Magnificent Mass Machine' mass spectrometer in investigating the reactivity of ions in the gas phase is illustrated by a brief analysis of previously unpublished work on metastable ionised n-pentyl methyl ether, which loses predominantly methanol and an ethyl radical, with very minor contributions for elimination of ethane and water. Expulsion of an ethyl radical is interpreted in terms of isomerisation to ionised 3-pentyl methyl ether, via distonic ions and, possibly, an ion-neutral complex comprising ionised ethylcyclopropane and methanol. This explanation is consistent with the closely similar behaviour of the labelled analogues, C 3 H 7 CH 2 CD 2 OCH 3 +. and C 3 H 7 CD 2 CH 2 OCH 3 +. , and is supported by the greater kinetic energy release associated with loss of ethane from ionised n-propyl methyl ether compared to that starting from directly generated ionised 3-pentyl methyl ether.
12. Direct geoelectrical evidence of mass transfer at the laboratory scale
Science.gov (United States)
Swanson, Ryan D.; Singha, Kamini; Day-Lewis, Frederick D.; Binley, Andrew; Keating, Kristina; Haggerty, Roy
2012-10-01
Previous field-scale experimental data and numerical modeling suggest that the dual-domain mass transfer (DDMT) of electrolytic tracers has an observable geoelectrical signature. Here we present controlled laboratory experiments confirming the electrical signature of DDMT and demonstrate the use of time-lapse electrical measurements in conjunction with concentration measurements to estimate the parameters controlling DDMT, i.e., the mobile and immobile porosity and rate at which solute exchanges between mobile and immobile domains. We conducted column tracer tests on unconsolidated quartz sand and a material with a high secondary porosity: the zeolite clinoptilolite. During NaCl tracer tests we collected nearly colocated bulk direct-current electrical conductivity (σb) and fluid conductivity (σf) measurements. Our results for the zeolite show (1) extensive tailing and (2) a hysteretic relation between σf and σb, thus providing evidence of mass transfer not observed within the quartz sand. To identify best-fit parameters and evaluate parameter sensitivity, we performed over 2700 simulations of σf, varying the immobile and mobile domain and mass transfer rate. We emphasized the fit to late-time tailing by minimizing the Box-Cox power transformed root-mean square error between the observed and simulated σf. Low-field proton nuclear magnetic resonance (NMR) measurements provide an independent quantification of the volumes of the mobile and immobile domains. The best-fit parameters based on σf match the NMR measurements of the immobile and mobile domain porosities and provide the first direct electrical evidence for DDMT. Our results underscore the potential of using electrical measurements for DDMT parameter inference.
13. The SUSY oscillator from local geometry: Dynamics and coherent states
International Nuclear Information System (INIS)
Thienel, H.P.
1994-01-01
The choice of a coordinate chart on an analytical R n (R a n ) provides a representation of the n-dimensional SUSY oscillator. The corresponding Hilbert space is Cartan's exterior algebra endowed with a suitable scalar product. The exterior derivative gives rise to the algebra of the n-dimensional SUSY oscillator. Its euclidean dynamics is an inherent consequence of the geometry imposed by the Lie derivative generating the dilations, i.e. evolution of the quantum system corresponds to parametrization of a sequence of charts by euclidean time. Coherent states emerge as a natural structure related to the Lie derivative generating the translations. (orig.)
14. A Bottom-Up Approach to SUSY Analyses
Energy Technology Data Exchange (ETDEWEB)
Horn, Claus; /SLAC
2011-11-11
This paper proposes a new way to do event generation and analysis in searches for new physics at the LHC. An abstract notation is used to describe the new particles on a level which better corresponds to detector resolution of LHC experiments. In this way the SUSY discovery space can be decomposed into a small number of eigenmodes each with only a few parameters, which allows to investigate the SUSY parameter space in a model-independent way. By focusing on the experimental observables for each process investigated the Bottom-Up Approach allows to systematically study the boarders of the experimental efficiencies and thus to extend the sensitivity for new physics.
15. Reconstruction of tau leptons and prospects for SUSY in ATLAS
International Nuclear Information System (INIS)
Zendler, Carolin
2010-01-01
Final states with tau leptons may play a special role among the broad variety of signatures for the production of supersymmetric particles at the LHC. The algorithms for tau reconstruction and identification are discussed, which are essential ingredients to reject the huge background from QCD processes. The status of analyses of SUSY tau lepton final states within the ATLAS experiment at the LHC are presented, which range from a study of semi-inclusive discovery prospects to more exclusive processes with two tau leptons from χ-tilde 2 0 decays and their implications for the determination of SUSY parameters. Also, the prospects for exploiting tau lepton polarization are discussed.
16. Critical masses of bare metal spheres using SCALE/XSDRN
International Nuclear Information System (INIS)
Wright, R.Q.; Jordan, W.C.; Westfall, R.M.
2000-01-01
minimum critical masses. The minimum critical masses of metal spheres using the SCALE/XSDRN program have been calculated and are given in Sec. II of this paper. Results for reflected spheres are also available. Results for 28 actinides are included in Table 1; only 1 nuclide, 232 Pa (T 1/2 = 1.31 day), has a half-life <40 days
17. Testing SUSY at the LHC: Electroweak and Dark matter fine tuning at two-loop order
CERN Document Server
Cassel, S; Ross, G G
2010-01-01
In the framework of the Constrained Minimal Supersymmetric Standard Model (CMSSM) we evaluate the electroweak fine tuning measure that provides a quantitative test of supersymmetry as a solution to the hierarchy problem. Taking account of current experimental constraints we compute the fine tuning at two-loop order and determine the limits on the CMSSM parameter space and the measurements at the LHC most relevant in covering it. Without imposing the LEPII bound on the Higgs mass, it is shown that the fine tuning computed at two-loop has a minimum $\\Delta=8.8$ corresponding to a Higgs mass $m_h=114\\pm 2$ GeV. Adding the constraint that the SUSY dark matter relic density should be within present bounds we find $\\Delta=15$ corresponding to $m_h=114.7\\pm 2$ GeV and this rises to $\\Delta=17.8$ ($m_h=115.9\\pm 2$ GeV) for SUSY dark matter abundance within 3$\\sigma$ of the WMAP constraint. We extend the analysis to include the contribution of dark matter fine tuning. In this case the overall fine tuning and Higgs mas...
18. Bose-fermi symmetries and SUSY in nuclei
International Nuclear Information System (INIS)
Casten, R.F.
1986-01-01
Most of the comparison with theory has compared energy levels and we have seen many beautiful examples of one-to-one level correspondences, sometimes supported with a few B(E2) values. However, what we really need to check, the author thinks, is the structural correspondence, to make sure these levels really correspond to each other, and that the energy level agreement is not just accidental; for that we need to look at transfer reactions, and more B(E2)'s. This brings up the very important question of the transfer operator. The author hopes that its importance can be seen in recent cases where a few B(E2)'s for a few transfer strengths have substantially changed the correspondence between theoretical and experimental levels even though the overall energy level agreement is neither better or worse. So it's clearly sensitive to that question. Also cases have been seen now where several different supergroups have been applied to the same regions, U(6/4) and U(6/20) for example, to the mass 130 region, and so the question of the single-particle spaces and the single-particle energies is an important one. The question of microscopic understanding of the parameters and the interactions, these bose-fermi symmetries is important since it probes the underlying physical basis. And finally there have be some very interesting, what the author calls ''exotic'' extensions of bose-fermi symmetry ideas presented at this meeting. One is the extension to odd-odd nuclei, another is the generalized SUSY extension that can apply to transition regions, and this is the interesting beta decay calculations of Dobes that were reported yesterday, and probably some others the author has missed
19. From high-scale leptogenesis to low-scale one-loop neutrino mass generation
Science.gov (United States)
Zhou, Hang; Gu, Pei-Hong
2018-02-01
We show that a high-scale leptogenesis can be consistent with a low-scale one-loop neutrino mass generation. Our models are based on the SU(3)c × SU(2)L × U(1)Y × U(1) B - L gauge groups. Except a complex singlet scalar for the U(1) B - L symmetry breaking, the other new scalars and fermions (one scalar doublet, two or more real scalar singlets/triplets and three right-handed neutrinos) are odd under an unbroken Z2 discrete symmetry. The real scalar decays can produce an asymmetry stored in the new scalar doublet which subsequently decays into the standard model lepton doublets and the right-handed neutrinos. The lepton asymmetry in the standard model leptons then can be partially converted to a baryon asymmetry by the sphaleron processes. By integrating out the heavy scalar singlets/triplets, we can realize an effective theory to radiatively generate the small neutrino masses at the TeV scale. Furthermore, the lightest right-handed neutrino can serve as a dark matter candidate.
20. Micro-scale mass-transfer variations during electrodeposition
Energy Technology Data Exchange (ETDEWEB)
Sutija, D.P.
1991-08-01
Results of two studies on micro-scale mass-transfer enhancement are reported: (1) Profiled cross-sections of striated zinc surfaces deposited in laminar channel flow were analyzed with fast-fourier transforms (FFT) to determine preferred striation wavelengths. Striation frequency increases with current density until a minimum separation between striae of 150 {mu}m is reached. Beyond this point, independent of substrate used, striae meld together and form a relatively smooth, nodular deposit. Substrates equipped with artificial micron-sized protrusions result in significantly different macro-morphology in zinc deposits. Micro-patterned electrodes (MPE) with hemispherical protrusions 5 {mu}m in diameter yield thin zinc striae at current densities that ordinarily produce random nodular deposits. MPEs with artificial hemi-cylinders, 2.5 {mu}m in height and spaced 250 {mu}m apart, form striae with a period which matches the spacing of micron-sized ridges. (2) A novel, corrosion-resistant micromosaic electrode was fabricated on a silicon wafer. Measurements of mass-transport enhancement to a vertical micromosaic electrode caused by parallel bubble streams rising inside of the diffusion boundary-layer demonstrated the presence of two co-temporal enhancement mechanisms: surface-renewal increases the limiting current within five bubble diameters of the rising column, while bubble-induced laminar flows cause weaker enhancement over a much broader swath. The enhancement caused by bubble curtains is predicted accurately by linear superposition of single-column enhancements. Two columns of smaller H{sub 2} bubbles generated at the same volumetric rate as a single column of larger bubbles cause higher peak and far-field enhancements. 168 refs., 96 figs., 6 tabs.
1. A common source for neutrino and sparticle masses
CERN Document Server
Brignole, Andrea; Rossi, Anna
2010-01-01
We discuss supersymmetric scenarios in which neutrino masses arise from effective d=6 operators in the Kahler potential (including SUSY-breaking insertions). Simple explicit realizations of those Kahler operators are presented in the context of the type II seesaw. An appealing scenario emerges upon identifying the seesaw mediators with SUSY-breaking messengers.
2. Mass splittings within composite Goldstone supermultiplets from broken supersymmetry
International Nuclear Information System (INIS)
Clark, T.E.; Love, S.T.
1985-01-01
The supersymmetric (SUSY) Dashen formulas are modified to include effects of softly broken supersymmetry and are used to compute the mass splittings and differences in decay constants among the various components of a Goldstone supermultiplet. The general results are applied to chiral-symmetry breaking in two-flavor SUSY QCD
3. SUSY formalism for the symmetric double well potential
symmetric double well potential barrier we have obtained a class of exactly solvable potentials subject to moving boundary condition. The eigenstates are also obtained by the same technique. Keywords. SUSY; moving boundary condition; exactly solvable; symmetric double well; NH3 molecule. PACS Nos 02.30.Ik; 03.50.
4. F-theory, GUTs, and the weak scale
International Nuclear Information System (INIS)
Heckman, Jonathan J.; Vafa, Cumrun
2009-01-01
In this paper we study a deformation of gauge mediated supersymmetry breaking in a class of local F-theory GUT models where the scale of supersymmetry breaking determines the value of the μ term. Geometrically correlating these two scales constrains the soft SUSY breaking parameters of the MSSM. In this scenario, the hidden SUSY breaking sector involves an anomalous U(1) Peccei-Quinn symmetry which forbids bare μ and Bμ terms. This sector typically breaks supersymmetry at the desired range of energy scales through a simple stringy hybrid of a Fayet and Polonyi model. A variant of the Giudice-Masiero mechanism generates the value μ ∼ 10 2 -10 3 GeV when the hidden sector scale of supersymmetry breaking is F 1/2 ∼ 10 8.5 GeV. Further, the Bμ problem is solved due to the mild hierarchy between the GUT scale and Planck scale. These models relate SUSY breaking with the QCD axion, and solve the strong CP problem through an axion with decay constant f a ∼ M GUT cμ/Λ, where Λ ∼ 10 5 GeV is the characteristic scale of gaugino mass unification in gauge mediated models, and the ratio μ/Λ ∼ M GUT /M pl ∼ 10 -3 . We find f a ∼ 10 12 GeV, which is near the high end of the phenomenologically viable window. Here, the axino is the goldstino mode which is eaten by the gravitino. The gravitino is the LSP with a mass of about 10 1 -10 2 MeV, and a bino-like neutralino is (typically) the NLSP with mass of about 10 2 -10 3 GeV. Compatibility with electroweak symmetry breaking also determines the value of tanβ ∼ 30±7.
5. Non-simplified SUSY. {tau}-coannihilation at LHC and ILC
Energy Technology Data Exchange (ETDEWEB)
Berggren, M.; Cakir, A.; Krueger, D.; List, J.; Lobanov, A.; Melzer-Pellmann, I.A.
2013-07-15
Simplified models have become a widely used and important tool to cover the more diverse phenomenology beyond constrained SUSY models. However, they come with a substantial number of caveats themselves, and great care needs to be taken when drawing conclusions from limits based on the simplified approach. To illustrate this issue with a concrete example, we examine the applicability of simplified model results to a series of full SUSY model points which all feature a small {tau} -LSP mass difference, and are compatible with electroweak and flavor precision observables as well as current LHC results. Various channels have been studied using the Snowmass Combined LHC detector implementation in the Delphes simulation package, as well as the Letter of Intent or Technical Design Report simulations of the ILD detector concept at the ILC. We investigated both the LHC and ILC capabilities for discovery, separation and identification of all parts of the spectrum. While parts of the spectrum would be discovered at the LHC, there is substantial room for further discoveries and property determination at the ILC.
6. Squark production in R-symmetric SUSY with Dirac gluinos. NLO corrections
Energy Technology Data Exchange (ETDEWEB)
Diessner, Philip [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Kotlarski, Wojciech [Technische Univ. Dresden (Germany). Inst. fuer Kern- und Teilchenphysik; Warsaw Univ. (Poland). Faculty of Physics; Liebschner, Sebastian; Stoeckinger, Dominik [Technische Univ. Dresden (Germany). Inst. fuer Kern- und Teilchenphysik
2017-11-15
R-symmetry leads to a distinct realisation of SUSY with a significantly modified coloured sector featuring a Dirac gluino and a scalar colour octet (sgluon). We present the impact of R-symmetry on squark production at the 13 TeV LHC. We study the total cross sections and their NLO corrections from all strongly interacting states, their dependence on the Dirac gluino mass and sgluon mass as well as their systematics for selected benchmark points. We find that tree-level cross sections in the R-symmetric model are reduced compared to the MSSM but the NLO K-factors are generally larger in the order of ten to twenty per cent. In the course of this work we derive the required DREG → DRED transition counterterms and necessary on-shell renormalisation constants. The real corrections are treated using FKS subtraction, with results cross checked against an independent calculation employing the two cut phase space slicing method.
7. Squark production in R-symmetric SUSY with Dirac gluinos. NLO corrections
International Nuclear Information System (INIS)
Diessner, Philip; Kotlarski, Wojciech; Warsaw Univ.; Liebschner, Sebastian; Stoeckinger, Dominik
2017-11-01
R-symmetry leads to a distinct realisation of SUSY with a significantly modified coloured sector featuring a Dirac gluino and a scalar colour octet (sgluon). We present the impact of R-symmetry on squark production at the 13 TeV LHC. We study the total cross sections and their NLO corrections from all strongly interacting states, their dependence on the Dirac gluino mass and sgluon mass as well as their systematics for selected benchmark points. We find that tree-level cross sections in the R-symmetric model are reduced compared to the MSSM but the NLO K-factors are generally larger in the order of ten to twenty per cent. In the course of this work we derive the required DREG → DRED transition counterterms and necessary on-shell renormalisation constants. The real corrections are treated using FKS subtraction, with results cross checked against an independent calculation employing the two cut phase space slicing method.
8. Search for resonant sneutrino production in R-parity violating SUSY scenarios with CMS
Energy Technology Data Exchange (ETDEWEB)
Keller, Henning; Erdweg, Soeren; Gueth, Andreas; Hebbeker, Thomas; Meyer, Arnd; Mukherjee, Swagata [III. Physikalisches Institut A, RWTH Aachen (Germany)
2016-07-01
Supersymmetric models are among the most promising extensions of the standard model. In many models R-parity is said to be conserved. However, allowing R-parity violation can permit interesting final states and signatures that are not covered by SUSY scenarios with R-parity conservation. The decay of a resonant sneutrino to two standard model leptons of different flavour is analyzed. The focus lies on the electron-muon final state investigating the R-parity violating couplings and the mass of the resonantly produced sneutrino. The analysis is based on the 2015 data of proton-proton collisions corresponding to an integrated luminosity of 2.5 fb{sup -1} at a centre-of-mass energy of 13 TeV recorded with the CMS detector at the LHC.
9. Scaling Factor Estimation Using an Optimized Mass Change Strategy, Part 1: Theory
DEFF Research Database (Denmark)
Aenlle, Manuel López; Fernández, Pelayo Fernández; Brincker, Rune
2007-01-01
In natural input modal analysis, only un-scaled mode shapes can be obtained. The mass change method is, in many cases, the simplest way to estimate the scaling factors, which involves repeated modal testing after changing the mass in different points of the structure where the mode shapes are known....... The scaling factors are determined using the natural frequencies and mode shapes of both the modified and the unmodified structure. However, the uncertainty on the scaling factor estimation depends on the modal analysis and the mass change strategy (number, magnitude and location of the masses) used to modify...
10. Exercise-induced maximum metabolic rate scaled to body mass by ...
African Journals Online (AJOL)
Exercise-induced maximum metabolic rate scaled to body mass by the fractal ... rate scaling is that exercise-induced maximum aerobic metabolic rate (MMR) is ... muscle stress limitation, and maximized oxygen delivery and metabolic rates.
11. Calibrating the Planck Cluster Mass Scale with Cluster Velocity Dispersions
Science.gov (United States)
Amodeo, Stefania; Mei, Simona; Stanford, Spencer A.; Bartlett, James G.; Melin, Jean-Baptiste; Lawrence, Charles R.; Chary, Ranga-Ram; Shim, Hyunjin; Marleau, Francine; Stern, Daniel
2017-08-01
We measure the Planck cluster mass bias using dynamical mass measurements based on velocity dispersions of a subsample of 17 Planck-detected clusters. The velocity dispersions were calculated using redshifts determined from spectra that were obtained at the Gemini observatory with the GMOS multi-object spectrograph. We correct our estimates for effects due to finite aperture, Eddington bias, and correlated scatter between velocity dispersion and the Planck mass proxy. The result for the mass bias parameter, (1-b), depends on the value of the galaxy velocity bias, {b}{{v}}, adopted from simulations: (1-b)=(0.51+/- 0.09){b}{{v}}3. Using a velocity bias of {b}{{v}}=1.08 from Munari et al., we obtain (1-b)=0.64+/- 0.11, I.e., an error of 17% on the mass bias measurement with 17 clusters. This mass bias value is consistent with most previous weak-lensing determinations. It lies within 1σ of the value that is needed to reconcile the Planck cluster counts with the Planck primary cosmic microwave background constraints. We emphasize that uncertainty in the velocity bias severely hampers the precision of the measurements of the mass bias using velocity dispersions. On the other hand, when we fix the Planck mass bias using the constraints from Penna-Lima et al., based on weak-lensing measurements, we obtain a positive velocity bias of {b}{{v}}≳ 0.9 at 3σ .
12. Heavy colored SUSY partners from deflected anomaly mediation
Energy Technology Data Exchange (ETDEWEB)
Wang, Fei [Department of Physics and Engineering, Zhengzhou University,Zhengzhou 450000 (China); State Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Academia Sinica,Beijing 100190 (China); Wang, Wenyu [Institute of Theoretical Physics, College of Applied Science, Beijing University of Technology,Beijing 100124 (China); Yang, Jin Min; Zhang, Yang [State Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Academia Sinica,Beijing 100190 (China)
2015-07-27
We propose a deflected anomaly mediation scenario from SUSY QCD which can lead to both positive and negative deflection parameters (there is a smooth transition between these two deflection parameter regions by adjusting certain couplings). Such a scenario can naturally give a SUSY spectrum in which all the colored sparticles are heavy while the sleptons are light. As a result, the discrepancy between the Brookheaven g{sub μ}−2 experiment and LHC data can be reconciled in this scenario. We also find that the parameter space for explaining the g{sub μ}−2 anomaly at 1σ level can be fully covered by the future LUX-ZEPLIN 7.2 Ton experiment.
13. Finding viable models in SUSY parameter spaces with signal specific discovery potential
Science.gov (United States)
Burgess, Thomas; Lindroos, Jan Øye; Lipniacka, Anna; Sandaker, Heidi
2013-08-01
Recent results from ATLAS giving a Higgs mass of 125.5 GeV, further constrain already highly constrained supersymmetric models such as pMSSM or CMSSM/mSUGRA. As a consequence, finding potentially discoverable and non-excluded regions of model parameter space is becoming increasingly difficult. Several groups have invested large effort in studying the consequences of Higgs mass bounds, upper limits on rare B-meson decays, and limits on relic dark matter density on constrained models, aiming at predicting superpartner masses, and establishing likelihood of SUSY models compared to that of the Standard Model vis-á-vis experimental data. In this paper a framework for efficient search for discoverable, non-excluded regions of different SUSY spaces giving specific experimental signature of interest is presented. The method employs an improved Markov Chain Monte Carlo (MCMC) scheme exploiting an iteratively updated likelihood function to guide search for viable models. Existing experimental and theoretical bounds as well as the LHC discovery potential are taken into account. This includes recent bounds on relic dark matter density, the Higgs sector and rare B-mesons decays. A clustering algorithm is applied to classify selected models according to expected phenomenology enabling automated choice of experimental benchmarks and regions to be used for optimizing searches. The aim is to provide experimentalist with a viable tool helping to target experimental signatures to search for, once a class of models of interest is established. As an example a search for viable CMSSM models with τ-lepton signatures observable with the 2012 LHC data set is presented. In the search 105209 unique models were probed. From these, ten reference benchmark points covering different ranges of phenomenological observables at the LHC were selected.
14. New two-dimensional integrable quantum models from SUSY intertwining
International Nuclear Information System (INIS)
Ioffe, M V; Negro, J; Nieto, L M; Nishnianidze, D N
2006-01-01
Supersymmetrical intertwining relations of second order in the derivatives are investigated for the case of supercharges with deformed hyperbolic metric g ik = diag(1, - a 2 ). Several classes of particular solutions of these relations are found. The corresponding Hamiltonians do not allow the conventional separation of variables, but they commute with symmetry operators of fourth order in momenta. For some of these models the specific SUSY procedure of separation of variables is applied
15. SUSY Flat Directions - to get a VEV or not?
International Nuclear Information System (INIS)
Basboell, Anders
2010-01-01
We investigate the potential of SUSY flat directions (FDs). Large FD vacuum expectation values (VEVs) can delay thermalisation and solve the gravitino problem--if FDs decay perturbatively. This depends on how many and which directions get the VEVs. Recently the decay of the FDs have been studied with the VEVs as input. Here we look at how the VEVs come about--statistically and analytically.
16. Electroweak contributions to SUSY particle production processes at the LHC
International Nuclear Information System (INIS)
Mirabella, Edoardo
2009-01-01
In this thesis we have computed the electroweak contributions of O(α s α), O(α 2 ) and O(α s 2 ) to three different classes of processes leading to the hadronic production of the SUSY partners of quarks and gluons, i.e. squarks and gluinos. The theoretical framework is the Minimal Supersymmetric extension of the Standard Model, the MSSM. The three processes are gluino pair production, diagonal squark-antisquark and associated squark-gluino production.
17. Flavour symmetries and SUSY soft breaking in the LHC era
International Nuclear Information System (INIS)
Vives, O
2008-01-01
The so-called supersymmetric flavour problem does not exist in isolation to the Standard Model flavour problem. We show that a realistic flavour symmetry can simultaneously solve both problems without ad hoc modifications of the SUSY model. Furthermore, departures from the SM expectations in these models can be used to discriminate among different possibilities. In particular we present the expected values for the electron EDM in a flavour model solving the supersymmetric flavour and CP problems
18. Hidden SUSY from precision gauge unification
Energy Technology Data Exchange (ETDEWEB)
Krippendorf, Sven; Nilles, Hans Peter [Bonn Univ. (Germany). Bethe Center for Theoretical Physics; Bonn Univ. (Germany). Physikalisches Inst.; Ratz, Michael [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Winkler, Martin Wolfgang [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2013-06-15
We revisit the implications of naturalness and gauge unification in the MSSM. We find that precision unification of the couplings in connection with a small {mu} parameter requires a highly compressed gaugino pattern as it is realized in mirage mediation. Due to the small mass difference between gluino and LSP, collider limits on the gluino mass are drastically relaxed. Without further assumptions, the relic density of the LSP is very close to the observed dark matter density due to coannihilation effects.
19. Hidden SUSY from precision gauge unification
International Nuclear Information System (INIS)
Krippendorf, Sven; Nilles, Hans Peter
2013-06-01
We revisit the implications of naturalness and gauge unification in the MSSM. We find that precision unification of the couplings in connection with a small μ parameter requires a highly compressed gaugino pattern as it is realized in mirage mediation. Due to the small mass difference between gluino and LSP, collider limits on the gluino mass are drastically relaxed. Without further assumptions, the relic density of the LSP is very close to the observed dark matter density due to coannihilation effects.
20. A large scale double beta and dark matter experiment: On the physics potential of GENIUS
International Nuclear Information System (INIS)
Klapdor-Kleingrothaus, H.V.; Hirsch, M.
1997-01-01
The physics potential of GENIUS, a recently proposed double beta decay anddark matter experiment is discussed. The experiment will allow to probe neutrino masses down to 10 -(2-3) eV. GENIUS will test the structure of the neutrino mass matrix, and therefore implicitly neutrino oscillation parameters comparable or superior in sensitivity to the best proposed dedicated terrestrial neutrino oscillation experiments. If the 10 -3 eV level is reached, GENIUS will even allow to test the large angle MSW solution of the solar neutrino problem. Even in its first stage GENIUS will confirm or rule out degenerate or inverted neutrino mass scenarios, which have been widely discussed in the literature as a possible solution to current hints on finite neutrino masses and also test the ν e ν μ hypothesis of the atmospheric neutrino problem.GENIUS would contribute to the search for R-parity violating SUSY and right-handed W-bosons on a scale similar or superior to LHC. In addition, GENIUS would largely improve the current 0νββ decay searches for R-parity conserving SUSY and leptoquarks. Concerning cold dark matter (CDM) search, the low background anticipated for GENIUS would, for thefirst time ever, allow to cover the complete MSSM neutralino parameter space, making GENIUS competitive to LHC in SUSY discovery. If GENIUS could find SUSY CDM as a by-product it would confirm that R-parity must be conserved exactly. GENIUS will thus be a major tool for future non-accelerator particle physics. (orig.)
1. Optimization of Markov chains for a SUSY fitter: Fittino
Energy Technology Data Exchange (ETDEWEB)
Prudent, Xavier [IKTP, Technische Universitaet, Dresden (Germany); Bechtle, Philip [DESY, Hamburg (Germany); Desch, Klaus; Wienemann, Peter [Universitaet Bonn (Germany)
2010-07-01
A Markov chains is a ''random walk'' algorithm which allows an efficient scan of a given profile and the search of the absolute minimum, even when this profil suffers from the presence of many secondary minima. This property makes them particularly suited to the study of Supersymmetry (SUSY) models, where minima have to be found in up-to 18-dimensional space for the general MSSM. Hence the SUSY fitter ''Fittino'' uses a Metropolis*Hastings Markov chain in a frequentist interpretation to study the impact of current low -energy measurements, as well as expected measurements from LHC and ILC, on the SUSY parameter space. The expected properties of an optimal Markov chain should be the independence of final results with respect to the starting point and a fast convergence. These two points can be achieved by optimizing the width of the proposal distribution, that is the ''average step length'' between two links in the chain. We developped an algorithm for the optimization of the proposal width, by modifying iteratively the width so that the rejection rate be around fifty percent. This optimization leads to a starting point independent chain as well as a faster convergence.
2. Scale effects and morphological diversification in hindlimb segment mass proportions in neognath birds.
Science.gov (United States)
Kilbourne, Brandon M
2014-01-01
In spite of considerable work on the linear proportions of limbs in amniotes, it remains unknown whether differences in scale effects between proximal and distal limb segments has the potential to influence locomotor costs in amniote lineages and how changes in the mass proportions of limbs have factored into amniote diversification. To broaden our understanding of how the mass proportions of limbs vary within amniote lineages, I collected data on hindlimb segment masses - thigh, shank, pes, tarsometatarsal segment, and digits - from 38 species of neognath birds, one of the most speciose amniote clades. I scaled each of these traits against measures of body size (body mass) and hindlimb size (hindlimb length) to test for departures from isometry. Additionally, I applied two parameters of trait evolution (Pagel's λ and δ) to understand patterns of diversification in hindlimb segment mass in neognaths. All segment masses are positively allometric with body mass. Segment masses are isometric with hindlimb length. When examining scale effects in the neognath subclade Land Birds, segment masses were again positively allometric with body mass; however, shank, pedal, and tarsometatarsal segment masses were also positively allometric with hindlimb length. Methods of branch length scaling to detect phylogenetic signal (i.e., Pagel's λ) and increasing or decreasing rates of trait change over time (i.e., Pagel's δ) suffer from wide confidence intervals, likely due to small sample size and deep divergence times. The scaling of segment masses appears to be more strongly related to the scaling of limb bone mass as opposed to length, and the scaling of hindlimb mass distribution is more a function of scale effects in limb posture than proximo-distal differences in the scaling of limb segment mass. Though negative allometry of segment masses appears to be precluded by the need for mechanically sound limbs, the positive allometry of segment masses relative to body mass may
3. SUSY/non-SUSY duality in U(N gauge model with partially broken N=2 supersymmetry
Directory of Open Access Journals (Sweden)
Kazunobu Maruyoshi
2009-03-01
Full Text Available We study the vacuum structure of the U(N gauge model with partially broken N=2 supersymmetry. From the analysis of the classical vacua of this model, we point out that in addition to the ordinary N=1 supersymmetric vacua, there are vacua with negative gauge coupling constants, which preserve another N=1 supersymmetry. These latter vacua can be analyzed by using SUSY/non-SUSY duality which is recently proposed by Aganagic, Beem, Seo and Vafa. A dual description of these in UV is U(N gauge theory where the supersymmetry is broken by spurion superfields. Following them, we see that there are supersymmetry preserving vacua as well as supersymmetry breaking vacua of low energy effective theory.
4. Hadronic EDMs in SUSY SU(5) GUTs with right-handed neutrinos
International Nuclear Information System (INIS)
Hisano, Junji; Kakizaki, Mitsuru; Nagai, Minoru; Shimizu, Yasuhiro
2004-01-01
We discuss hadronic EDM constraints on the neutrino sector in the SUSY SU(5) GUT with the right-handed neutrinos. The hadronic EDMs are sensitive to the right-handed down-type squark mixings, especially between the second and third generations and between the first and third ones, compared with the other low-energy hadronic observables, and the flavor mixings are induced by the neutrino Yukawa interaction. The current experimental bound of the neutron EDM may imply that the right-handed tau neutrino mass is smaller than about 10 14 GeV in the minimal supergravity scenario, and it may be improved furthermore in future experiments, such as the deuteron EDM measurement
5. PySLHA: a Pythonic interface to SUSY Les Houches accord data
International Nuclear Information System (INIS)
Buckley, Andy
2015-01-01
This paper describes the PySLHA package, a Python language module and program collection for reading, writing and visualising SUSY model data in the SLHA format. PySLHA can read and write SLHA data in a very general way, including the official SLHA2 extension and user customisations, and with arbitrarily deep indexing of data block entries and a dedicated, intuitive interface for particle data and decay information. The draft SLHA3 XSECTION feature is also fully supported. PySLHA can additionally read and write the legacy ISAWIG model format, and provides format conversion scripts. A publication-quality mass spectrum and decay chain plotting tool, slhaplot, is included in the package. (orig.)
6. A low Fermi scale from a simple gaugino-scalar mass relation
Energy Technology Data Exchange (ETDEWEB)
Bruemmer, F. [International School for Advanced Studies, Trieste (Italy); Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Buchmueller, W. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2013-11-15
In supersymmetric extensions of the Standard Model, the Fermi scale of electroweak symmetry breaking is determined by the pattern of supersymmetry breaking. We present an example, motivated by a higher-dimensional GUT model, where a particular mass relation between the gauginos, third-generation squarks and Higgs fields of the MSSM leads to a Fermi scale smaller than the soft mass scale. This is in agreement with the measured Higgs boson mass. The {mu} parameter is generated independently of supersymmetry breaking, however the {mu} problem becomes less acute due to the little hierarchy between the soft mass scale and the Fermi scale as we argue. The resulting superparticle mass spectra depend on the localization of quark and lepton fields in higher dimensions. In one case, the squarks of the first two generations as well as the gauginos and higgsinos can be in the range of the LHC. Alternatively, only the higgsinos may be accessible at colliders. The lightest superparticle is the gravitino.
7. The Effective Planck Mass and the Scale of Inflation
CERN Document Server
2015-01-01
Observable quantities in cosmology are dimensionless, and therefore independent of the units in which they are measured. This is true of all physical quantities associated with the primordial perturbations that source cosmic microwave background anisotropies such as their amplitude and spectral properties. However, if one were to try and infer an absolute energy scale for inflation-- a priori, one of the more immediate corollaries of detecting primordial tensor modes-- one necessarily makes reference to a particular choice of units, the natural choice for which is Planck units. In this note, we discuss various aspects of how inferring the energy scale of inflation is complicated by the fact that the effective strength of gravity as seen by inflationary quanta necessarily differs from that seen by gravitational experiments at presently accessible scales. The uncertainty in the former relative to the latter has to do with the unknown spectrum of universally coupled particles between laboratory scales and the pu...
8. Complex scaling and residual flavour symmetry in the neutrino mass ...
Probir Roy
2017-10-09
Oct 9, 2017 ... Leptonic Dirac CP violation must be maximal while atmospheric neutrino mixing need not be exactly maximal. Each of the two Majorana phases, to be probed by the search for 0νββ decay, has to be zero or π and a normal neutrino mass hierarchy is allowed. Keywords. Neutrinos; residual flavour symmetry; ...
9. Cosmological origin of the grand-unification mass scale
International Nuclear Information System (INIS)
Brout, R.; Englert, F.; Spindel, P.
1979-01-01
The origin of the universe as a quantum phenomenon leads to a self-consistently generated space-time structure in which the mass of the created particles is O (kappa/sup -1/2/). We interpret the origin of the universe as a phase transition in which the grand unified symmetry is spontaneously broken
10. Experimental results on SUSY searches with top
CERN Document Server
Eifert, Till
2014-01-01
Searches for supersymmetric partner particles of the top and bottom quarks at the Large Hadron Collider are reviewed. The focus is on the status of searches for a relatively light partner of the top quark performed by the CMS and ATLAS Collaborations. No excess beyond Standard Model expectations is observed and exclusion limits are set on the masses of supersymmetric particles.
11. Higgs mass prediction in the MSSM at three-loop level in a pure DR context
Energy Technology Data Exchange (ETDEWEB)
Harlander, Robert V.; Klappert, Jonas; Voigt, Alexander [RWTH Aachen University, Institute for Theoretical Particle Physics and Cosmology, Aachen (Germany)
2017-12-15
The impact of the three-loop effects of order α{sub t}α{sub s}{sup 2} on the mass of the light CP-even Higgs boson in the MSSM is studied in a pure DR context. For this purpose, we implement the results of Kant et al. (JHEP 08:104, 2010) into the C++ module Himalaya and link it to FlexibleSUSY, a Mathematica and C++ package to create spectrum generators for BSM models. The three-loop result is compared to the fixed-order two-loop calculations of the original FlexibleSUSY and of FeynHiggs, as well as to the result based on an EFT approach. Aside from the expected reduction of the renormalization scale dependence with respect to the lower-order results, we find that the three-loop contributions significantly reduce the difference from the EFT prediction in the TeV-region of the SUSY scale M{sub S}. Himalaya can be linked also to other two-loop DR codes, thus allowing for the elevation of these codes to the three-loop level. (orig.)
12. Prospects for early SUSY searches at Lhc
International Nuclear Information System (INIS)
Borjanovic, I.
2009-01-01
Search for the physics beyond the Standard Model is one of the most relevant goals of the CMS and Atlas experiments at the Large Hadron Collider at CERN. Prospects for early R-parity conserving supersymmetry discovery and mass measurements with the CMS and Atlas detector for the first fb -1 of data are presented. All the presented studies are based on realistic Monte Carlo simulations.
13. Neutrino oscillations in a predictive SUSY GUT
International Nuclear Information System (INIS)
Blazek, T.; Raby, S.; Tobe, K.
1999-01-01
In this paper we present a predictive SO(10) supersymmetric grand unified theory with the family symmetry U(2)xU(1) which has several nice features. We are able to fit fermion masses and mixing angles, including recent neutrino data, with nine parameters in the charged fermion sector and four in the neutrino sector. The family symmetry plays a preeminent role. (i) The model is ''natural''--we include all terms allowed by the symmetry. It restricts the number of arbitrary parameters and enforces many zeros in the effective mass matrices. (ii) Family symmetry breaking from U(2)xU(1)→U(1)→ nothing generates the family hierarchy. It also constrains squark and slepton mass matrices, thus ameliorating flavor violation resulting from squark and slepton loop contributions. (iii) It naturally gives large angle ν μ -ν τ mixing describing atmospheric neutrino oscillation data and small angle ν e -ν s mixing, consistent with the small mixing angle Mikheyev-Smirnov-Wolfenstein (MSW) solution to solar neutrino data. (iv) Finally, in this paper we assume minimal family symmetry-breaking vacuum expectation values (VEV's). As a result we cannot obtain a three neutrino solution to both atmospheric and solar neutrino oscillations. In addition, the solution discussed here cannot fit liquid scintillation neutrino detector (LSND) data even though this solution requires a sterile neutrino ν s . It is important to note, however, that with nonminimal family symmetry-breaking VEV's, a three neutrino solution is possible with the small mixing angle MSW solution to solar neutrino data and large angle ν μ -ν τ mixing describing atmospheric neutrino oscillation data. In the four neutrino case, nonminimal family VEV's may also permit a solution for LSND. The results with nonminimal family breaking are still under investigation and will be reported in a future paper. (c) 1999 The American Physical Society
14. Searches for SUSY signals at ATLAS
CERN Document Server
Meloni, Federico; The ATLAS collaboration
2017-01-01
The High Luminosity-Large Hadron Collider (HL-LHC) is expected to start in 2026 and to pro- vide an integrated luminosity of 3000 fb−1 in ten years, a factor 10 more than what will be collected by 2023. This high statistics will allow ATLAS to improve searches for new physics at the TeV scale. The search prospects for Supersymmetry are presented, with a programme spanning from strong to electroweak production of sparticles.
15. Mart ja Mari-Ann Susi taotlevad omanikena Concordia pankrotti / Andri Maimets
Index Scriptorium Estoniae
Maimets, Andri
2003-01-01
Concordia Ülikooli rektori kohast loobunud Mart Susi ning prorektori ametikohalt lahkunud Mari-Ann Susi taotlevad neile kuuluvat ülikooli pidanud miljonivõlgades firma pankrotti. Hiljuti loodi õppejõududest, tudengitest js töötajatest mittetulundusühing Concordia Akadeemiline Ühisus (CAU), selle nõukogu esimees on Hagi Šein
16. Non-linear way to supersymmetry and N-extended SUSY
International Nuclear Information System (INIS)
Akulov, V.
2001-01-01
In this report I give a short historical review of some of the first steps that were done towards the invention of SUSY by the Kharkov team headed by D. Volkov. This article is dedicated to the memory of Prof. Yuri Golfand, whose ideas of SUSY inspired the most active developments in High Energy Physics over thirty years
17. Predicting {theta}{sub 13} and the neutrino mass scale from quark lepton mass hierarchies
Energy Technology Data Exchange (ETDEWEB)
Buchmueller, W.; Domcke, V.; Schmitz, K.
2011-11-15
Flavour symmetries of Froggatt-Nielsen type can naturally reconcile the large quark and charged lepton mass hierarchies and the small quark mixing angles with the observed small neutrino mass hierarchies and their large mixing angles. We point out that such a flavour structure, together with the measured neutrino mass squared differences and mixing angles, strongly constrains yet undetermined parameters of the neutrino sector. Treating unknown O(1) parameters as random variables, we obtain surprisingly accurate predictions for the smallest mixing angle, sin{sup 2}2{theta}{sub 13}=0.07{sup +0.11}{sub -0.05}, the smallest neutrino mass, m{sub 1}=2.5{sup +1.7}{sub -1.6} x 10{sup -3} eV, and one Majorana phase, {alpha}{sub 21}/{pi}=1.0{sup +0.2}{sub -0.2}. (orig.)
18. Structure and dating errors in the geologic time scale and periodicity in mass extinctions
Science.gov (United States)
Stothers, Richard B.
1989-01-01
Structure in the geologic time scale reflects a partly paleontological origin. As a result, ages of Cenozoic and Mesozoic stage boundaries exhibit a weak 28-Myr periodicity that is similar to the strong 26-Myr periodicity detected in mass extinctions of marine life by Raup and Sepkoski. Radiometric dating errors in the geologic time scale, to which the mass extinctions are stratigraphically tied, do not necessarily lessen the likelihood of a significant periodicity in mass extinctions, but do spread the acceptable values of the period over the range 25-27 Myr for the Harland et al. time scale or 25-30 Myr for the DNAG time scale. If the Odin time scale is adopted, acceptable periods fall between 24 and 33 Myr, but are not robust against dating errors. Some indirect evidence from independently-dated flood-basalt volcanic horizons tends to favor the Odin time scale.
19. A universal scaling relationship between body mass and proximal limb bone dimensions in quadrupedal terrestrial tetrapods.
Science.gov (United States)
Campione, Nicolás E; Evans, David C
2012-07-10
Body size is intimately related to the physiology and ecology of an organism. Therefore, accurate and consistent body mass estimates are essential for inferring numerous aspects of paleobiology in extinct taxa, and investigating large-scale evolutionary and ecological patterns in the history of life. Scaling relationships between skeletal measurements and body mass in birds and mammals are commonly used to predict body mass in extinct members of these crown clades, but the applicability of these models for predicting mass in more distantly related stem taxa, such as non-avian dinosaurs and non-mammalian synapsids, has been criticized on biomechanical grounds. Here we test the major criticisms of scaling methods for estimating body mass using an extensive dataset of mammalian and non-avian reptilian species derived from individual skeletons with live weights. Significant differences in the limb scaling of mammals and reptiles are noted in comparisons of limb proportions and limb length to body mass. Remarkably, however, the relationship between proximal (stylopodial) limb bone circumference and body mass is highly conserved in extant terrestrial mammals and reptiles, in spite of their disparate limb postures, gaits, and phylogenetic histories. As a result, we are able to conclusively reject the main criticisms of scaling methods that question the applicability of a universal scaling equation for estimating body mass in distantly related taxa. The conserved nature of the relationship between stylopodial circumference and body mass suggests that the minimum diaphyseal circumference of the major weight-bearing bones is only weakly influenced by the varied forces exerted on the limbs (that is, compression or torsion) and most strongly related to the mass of the animal. Our results, therefore, provide a much-needed, robust, phylogenetically corrected framework for accurate and consistent estimation of body mass in extinct terrestrial quadrupeds, which is important for a
20. A universal scaling relationship between body mass and proximal limb bone dimensions in quadrupedal terrestrial tetrapods
Directory of Open Access Journals (Sweden)
Campione Nicolás E
2012-07-01
Full Text Available Abstract Background Body size is intimately related to the physiology and ecology of an organism. Therefore, accurate and consistent body mass estimates are essential for inferring numerous aspects of paleobiology in extinct taxa, and investigating large-scale evolutionary and ecological patterns in the history of life. Scaling relationships between skeletal measurements and body mass in birds and mammals are commonly used to predict body mass in extinct members of these crown clades, but the applicability of these models for predicting mass in more distantly related stem taxa, such as non-avian dinosaurs and non-mammalian synapsids, has been criticized on biomechanical grounds. Here we test the major criticisms of scaling methods for estimating body mass using an extensive dataset of mammalian and non-avian reptilian species derived from individual skeletons with live weights. Results Significant differences in the limb scaling of mammals and reptiles are noted in comparisons of limb proportions and limb length to body mass. Remarkably, however, the relationship between proximal (stylopodial limb bone circumference and body mass is highly conserved in extant terrestrial mammals and reptiles, in spite of their disparate limb postures, gaits, and phylogenetic histories. As a result, we are able to conclusively reject the main criticisms of scaling methods that question the applicability of a universal scaling equation for estimating body mass in distantly related taxa. Conclusions The conserved nature of the relationship between stylopodial circumference and body mass suggests that the minimum diaphyseal circumference of the major weight-bearing bones is only weakly influenced by the varied forces exerted on the limbs (that is, compression or torsion and most strongly related to the mass of the animal. Our results, therefore, provide a much-needed, robust, phylogenetically corrected framework for accurate and consistent estimation of body mass in
1. Magnetic Origin of Black Hole Winds Across the Mass Scale
Science.gov (United States)
Fukumura, Keigo; Kazanas, Demosthenes; Shrader, Chris; Behar, Ehud; Tombesi, Francesco; Contopoulos, Ioannis
2017-01-01
Black hole accretion disks appear to produce invariably plasma outflows that result in blue-shifted absorption features in their spectra. The X-ray absorption-line properties of these outflows are quite diverse, ranging in velocity from non-relativistic (approx. 300 km/sec) to sub-relativistic (approx. 0.1c where c is the speed of light) and a similarly broad range in the ionization states of the wind plasma. We report here that semi-analytic, self-similar magnetohydrodynamic (MHD) wind models that have successfully accounted for the X-ray absorber properties of supermassive black holes, also fit well the high-resolution X-ray spectrum of the accreting stellar-mass black hole, GRO J1655-40. This provides an explicit theoretical argument of their MHD origin (aligned with earlier observational claims) and supports the notion of a universal magnetic structure of the observed winds across all known black hole sizes.
2. SUSY field theories in higher dimensions and integrable spin chains
International Nuclear Information System (INIS)
Gorsky, A.; Gukov, S.; Mironov, A.
1998-01-01
Five- and six-dimensional SUSY gauge theories, with one or two compactified directions, are discussed. The 5d theories with the matter hypermultiplets in the fundamental representation are associated with the twisted XXZ spin chain, while the group product case with bi-fundamental matter corresponds to the higher rank spin chains. The Riemann surfaces for 6d theories with fundamental matter and two compact directions are proposed to correspond to the XYZ spin chain based on the Sklyanin algebra. We also discuss the obtained results within the brane and geometrical engineering frameworks and explain the relation to the toric diagrams. (orig.)
3. Electroweak contributions to SUSY particle production processes at the LHC
Energy Technology Data Exchange (ETDEWEB)
Mirabella, Edoardo
2009-07-22
In this thesis we have computed the electroweak contributions of O({alpha}{sub s}{alpha}), O({alpha}{sup 2}) and O({alpha}{sub s}{sup 2}) to three different classes of processes leading to the hadronic production of the SUSY partners of quarks and gluons, i.e. squarks and gluinos. The theoretical framework is the Minimal Supersymmetric extension of the Standard Model, the MSSM. The three processes are gluino pair production, diagonal squark-antisquark and associated squark-gluino production.
4. Hilkka Punainen & Susi : mediakasvatuksellisen iPad-kirjan suunnittelu
OpenAIRE
Kontiola, Sanna
2012-01-01
Opinnäytetyön tavoitteena oli tehdä mediakasvatuksellinen iPad-kirja "Hilkka Punainen & Susi", jota voitaisiin käyttää kirjastoissa, kouluissa ja kotona mediakasvatuksen apuvälineenä. Mediakasvatus ei ole ainoastaan medioiden ja välineiden käyttötaidon opettelua, vaan myös sellaisten turvataitojen opettelua, joiden tarkoituksena on parantaa lasten taitoja selviytyä uhkaavissa tilanteissa ja ohjata heitä turvautumaan luotettaviin aikuisiin. Teoksella on useita mediakasvatuksellisia tasoja. Teo...
5. Mass-flux subgrid-scale parameterization in analogy with multi-component flows: a formulation towards scale independence
Directory of Open Access Journals (Sweden)
J.-I. Yano
2012-11-01
Full Text Available A generalized mass-flux formulation is presented, which no longer takes a limit of vanishing fractional areas for subgrid-scale components. The presented formulation is applicable to a~situation in which the scale separation is still satisfied, but fractional areas occupied by individual subgrid-scale components are no longer small. A self-consistent formulation is presented by generalizing the mass-flux formulation under the segmentally-constant approximation (SCA to the grid–scale variabilities. The present formulation is expected to alleviate problems arising from increasing resolutions of operational forecast models without invoking more extensive overhaul of parameterizations.
The present formulation leads to an analogy of the large-scale atmospheric flow with multi-component flows. This analogy allows a generality of including any subgrid-scale variability into the mass-flux parameterization under SCA. Those include stratiform clouds as well as cold pools in the boundary layer.
An important finding under the present formulation is that the subgrid-scale quantities are advected by the large-scale velocities characteristic of given subgrid-scale components (large-scale subcomponent flows, rather than by the total large-scale flows as simply defined by grid-box average. In this manner, each subgrid-scale component behaves as if like a component of multi-component flows. This formulation, as a result, ensures the lateral interaction of subgrid-scale variability crossing the grid boxes, which are missing in the current parameterizations based on vertical one-dimensional models, and leading to a reduction of the grid-size dependencies in its performance. It is shown that the large-scale subcomponent flows are driven by large-scale subcomponent pressure gradients. The formulation, as a result, furthermore includes a self-contained description of subgrid-scale momentum transport.
The main purpose of the present paper
6. From X-ray binaries to quasars black holes on all mass scales black holes on all mass scales
CERN Document Server
Ho, L C; Maccarone, T J
2005-01-01
This volume brings together contributions from many of the world's leading authorities on black hole accretion. The papers within represent part of a new movement to make use of the relative advantages of studying stellar mass and supermassive black holes and to bring together the knowledge gained from the two approaches. The topics discussed here run the gamut of the state of the art in black hole observational and theoretical work-variability, spectroscopy, disk-jet connections, and multi-wavelength campaigns on black holes are all covered. Reprinted from ASTROPHYSICS AND SPACE SCIENCE, 300:1-3 (2005)
7. Heat and mass transfer intensification and shape optimization a multi-scale approach
CERN Document Server
2013-01-01
Is the heat and mass transfer intensification defined as a new paradigm of process engineering, or is it just a common and old idea, renamed and given the current taste? Where might intensification occur? How to achieve intensification? How the shape optimization of thermal and fluidic devices leads to intensified heat and mass transfers? To answer these questions, Heat & Mass Transfer Intensification and Shape Optimization: A Multi-scale Approach clarifies the definition of the intensification by highlighting the potential role of the multi-scale structures, the specific interfacial area, the distribution of driving force, the modes of energy supply and the temporal aspects of processes. A reflection on the methods of process intensification or heat and mass transfer enhancement in multi-scale structures is provided, including porous media, heat exchangers, fluid distributors, mixers and reactors. A multi-scale approach to achieve intensification and shape optimization is developed and clearly expla...
8. Software in windows for staple compounding system of microcomputer nuclear mass scale
International Nuclear Information System (INIS)
Wang Yanting; Zhang Yongming; Wang Yu; Jin Dongping
1998-01-01
The software exploited in windows for staple compounding system of microcomputer nuclear mass scale is described. The staple compounding system is briefly narrated. The software structure and its realizing method are given
9. SUSY dark matter: Beyond the standard paradigm
International Nuclear Information System (INIS)
Sandick, Pearl
2016-01-01
Within the framework of the Minimal Supersymmetric Standard Model (MSSM), we explore a decoupling of the parameters into separate sectors that determine consistency with collider data, the abundance of dark matter, and potential signatures at direct dark matter searches. We consider weak-scale bino-like neutralino dark matter, and find that annihilations via light slepton exchange present a viable mechanism for obtaining the appropriate dark matter abundance assuming a thermal history. Constraints and prospects for discovery of these models are discussed, including the possibility that direct dark matter searches may be sensitive to these models if light squarks exhibit left-right mixing. Differences between the scenarios presented here and the typical expectations for the MSSM are discussed.
10. Reconciling EFT and hybrid calculations of the light MSSM Higgs-boson mass
Energy Technology Data Exchange (ETDEWEB)
Bahl, Henning; Hollik, Wolfgang [Max-Planck Institut fuer Physik, Munich (Germany); Heinemeyer, Sven [Campus of International Excellence UAM+CSIC, Madrid (Spain); Universidad Autonoma de Madrid, Instituto de Fisica Teorica, (UAM/CSIC), Madrid (Spain); Instituto de Fisica Cantabria (CSIC-UC), Santander (Spain); Weiglein, Georg [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany)
2018-01-15
Various methods are used in the literature for predicting the lightest CP-even Higgs boson mass in the Minimal Supersymmetric Standard Model (MSSM). Fixed-order diagrammatic calculations capture all effects at a given order and yield accurate results for scales of supersymmetric (SUSY) particles that are not separated too much from the weak scale. Effective field theory calculations allow a resummation of large logarithmic contributions up to all orders and therefore yield accurate results for a high SUSY scale. A hybrid approach, where both methods have been combined, is implemented in the computer code FeynHiggs. So far, however, at large scales sizeable differences have been observed between FeynHiggs and other pure EFT codes. In this work, the various approaches are analytically compared with each other in a simple scenario in which all SUSY mass scales are chosen to be equal to each other. Three main sources are identified that account for the major part of the observed differences. Firstly, it is shown that the scheme conversion of the input parameters that is commonly used for the comparison of fixed-order results is not adequate for the comparison of results containing a series of higher-order logarithms. Secondly, the treatment of higher-order terms arising from the determination of the Higgs propagator pole is addressed. Thirdly, the effect of different parametrizations in particular of the top Yukawa coupling in the non-logarithmic terms is investigated. Taking into account all of these effects, in the considered simple scenario very good agreement is found for scales above 1 TeV between the results obtained using the EFT approach and the hybrid approach of FeynHiggs. (orig.)
11. Reconciling EFT and hybrid calculations of the light MSSM Higgs-boson mass
International Nuclear Information System (INIS)
Bahl, Henning; Hollik, Wolfgang; Heinemeyer, Sven; Weiglein, Georg
2017-06-01
Various methods are used in the literature for predicting the lightest CP-even Higgs boson mass in the Minimal Supersymmetric Standard Model (MSSM). Fixed-order diagrammatic calculations capture all effects at a given order and yield accurate results for scales of supersymmetric (SUSY) particles that are not separated too much from the weak scale. Effective field theory calculations allow a resummation of large logarithmic contributions up to all orders and therefore yield accurate results for a high SUSY scale. A hybrid approach, where both methods have been combined, is implemented in the computer code FeynHiggs. So far, however, at large scales sizeable differences have been observed between FeynHiggs and other pure EFT codes. In this work, the various approaches are analytically compared with each other in a simple scenario in which all SUSY mass scales are chosen to be equal to each other. Three main sources are identified that account for the major part of the observed differences. Firstly, it is shown that the scheme conversion of the input parameters that is commonly used for the comparison of fixed-order results is not adequate for the comparison of results containing a series of higher-order logarithms. Secondly, the treatment of higher-order terms arising from the determination of the Higgs propagator pole is addressed. Thirdly, the effect of different parametrizations in particular of the top Yukawa coupling in the non-logarithmic terms is investigated. Taking into account all of these effects, in the considered simple scenario very good agreement is found for scales above 1 TeV between the results obtained using the EFT approach and the hybrid approach of FeynHiggs.
12. Reconciling EFT and hybrid calculations of the light MSSM Higgs-boson mass
Energy Technology Data Exchange (ETDEWEB)
Bahl, Henning; Hollik, Wolfgang [Max-Planck-Institut fuer Physik, Muenchen (Germany); Heinemeyer, Sven [Campus of International Excellence UAM+CSIC, Madrid (Spain); Univ. Autonoma de Madrid (Spain). Inst. de Fisica Teorica; Instituto de Fisica Cantabria (CSIC-UC), Santander (Spain); Weiglein, Georg [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2017-06-15
Various methods are used in the literature for predicting the lightest CP-even Higgs boson mass in the Minimal Supersymmetric Standard Model (MSSM). Fixed-order diagrammatic calculations capture all effects at a given order and yield accurate results for scales of supersymmetric (SUSY) particles that are not separated too much from the weak scale. Effective field theory calculations allow a resummation of large logarithmic contributions up to all orders and therefore yield accurate results for a high SUSY scale. A hybrid approach, where both methods have been combined, is implemented in the computer code FeynHiggs. So far, however, at large scales sizeable differences have been observed between FeynHiggs and other pure EFT codes. In this work, the various approaches are analytically compared with each other in a simple scenario in which all SUSY mass scales are chosen to be equal to each other. Three main sources are identified that account for the major part of the observed differences. Firstly, it is shown that the scheme conversion of the input parameters that is commonly used for the comparison of fixed-order results is not adequate for the comparison of results containing a series of higher-order logarithms. Secondly, the treatment of higher-order terms arising from the determination of the Higgs propagator pole is addressed. Thirdly, the effect of different parametrizations in particular of the top Yukawa coupling in the non-logarithmic terms is investigated. Taking into account all of these effects, in the considered simple scenario very good agreement is found for scales above 1 TeV between the results obtained using the EFT approach and the hybrid approach of FeynHiggs.
13. Top-squark in natural SUSY under current LHC run-2 data
Energy Technology Data Exchange (ETDEWEB)
Han, Chengcheng [University of Tokyo, Kavli IPMU (WPI), UTIAS, Kashiwa (Japan); Ren, Jie [Chinese Academy of Sciences, Computer Network Information Center, Beijing (China); Wu, Lei [Nanjing Normal University, Department of Physics and Institute of Theoretical Physics, Nanjing, Jiangsu (China); The University of Sydney, ARC Centre of Excellence for Particle Physics at the Terascale, School of Physics, Sydney, NSW (Australia); Yang, Jin Min [Chinese Academy of Sciences, Key Laboratory of Theoretical Physics, Institute of Theoretical Physics, Beijing (China); Zhang, Mengchao [Institute for Basic Science (IBS), Center for Theoretical Physics and Universe, Taejon (Korea, Republic of)
2017-02-15
We utilize the recent LHC-13 TeV data to study the lower mass bound on the top-squark (stop) in natural supersymmetry. We recast the LHC sparticle inclusive search of (≥1)jets + E{sub T} with α{sub T} variable, the direct stop pair search (1-lepton channel and all-hadronic channel) and the monojet analyses. We find that these searches are complementary depending on stop and higgsino masses: for a heavy stop the all-hadronic stop pair search provides the strongest bound, for an intermediate stop the inclusive SUSY analysis with α{sub T} variable is most efficient, while for a compressed stop-higgsino scenario the monojet search plays the key role. Finally, the lower mass bound on a stop is: (1) 320 GeV for compressed stop-higgsino scenario (mass splitting less than 20 GeV); (2) 765 (860) GeV for higgsinos lighter than 300 (100) GeV. (orig.)
14. Physics at the 100 GeV mass scale: Proceedings
Energy Technology Data Exchange (ETDEWEB)
Brennan, E.C. (ed.)
1990-01-01
This report contains the following papers: heavy quarks--experimental; the theory of heavy flavour production; precision experiments in electroweak interactions; theory of precision electroweak measurements; applications of QCD to hadron-hadron collisions; W{sup +}W{sup {minus}} interactions and the search for the Higgs Boson; electroweak symmetry breaking: Higgs/Whatever; electron-positron storage rings as heavy quark factories; prospects for next-generation e{sup +}e{sup {minus}} linear colliders; current prospects for hadron colliders; hadron colliders beyond the SSC; recent results on weak decays of charmed mesons from the Mark 3 experiment; recent CLEO results on bottom and charm; recent results on B-decays from ARGUE; a review of recent results on the hadron and photoproduction of charm; search for the top quark at UA1; recent results from the UA2 experiment at the CERN {bar p}p collider; selected preliminary results from CDF; new measurement of the phase difference {Phi}{sub 00} {minus} {Phi}{sub {plus minus}} in CP--violating K{sup 0} decays; a recent result on CP violation by E731 at Fermilab; rare kaon decay experiments; CP violation; inverse muon decay, neutrino dimuon production, and a search for neutral heavy leptons at the tevatron; first results from MACRO; a superstring theory underview; recent results from TRISTAN ; measurements of the Z boson resonance parameters at SLC; decays of the Z boson; and theory--weak neutral currents and the Z mass after the SLC.
15. Physics at the 100 GeV mass scale: Proceedings
International Nuclear Information System (INIS)
Brennan, E.C.
1990-01-01
This report contains the following papers: heavy quarks--experimental; the theory of heavy flavour production; precision experiments in electroweak interactions; theory of precision electroweak measurements; applications of QCD to hadron-hadron collisions; W + W - interactions and the search for the Higgs Boson; electroweak symmetry breaking: Higgs/Whatever; electron-positron storage rings as heavy quark factories; prospects for next-generation e + e - linear colliders; current prospects for hadron colliders; hadron colliders beyond the SSC; recent results on weak decays of charmed mesons from the Mark 3 experiment; recent CLEO results on bottom and charm; recent results on B-decays from ARGUE; a review of recent results on the hadron and photoproduction of charm; search for the top quark at UA1; recent results from the UA2 experiment at the CERN bar pp collider; selected preliminary results from CDF; new measurement of the phase difference Φ 00 - Φ ± in CP--violating K 0 decays; a recent result on CP violation by E731 at Fermilab; rare kaon decay experiments; CP violation; inverse muon decay, neutrino dimuon production, and a search for neutral heavy leptons at the tevatron; first results from MACRO; a superstring theory underview; recent results from TRISTAN; measurements of the Z boson resonance parameters at SLC; decays of the Z boson; and theory--weak neutral currents and the Z mass after the SLC
16. SUSY and Dark Matter Results from ATLAS
CERN Document Server
Sandaker, H
2013-01-01
New results from LHC are increasingly challenging the limits of the Standard Model of particle physics. Some of the most attractive scenarios for new physics are Supersymmet- ric models. In addition to solving some of the shortcomings of the Standard Model (e.g. hierarchy problem, Higgs mass corrections, gauge coupling unification) they also provide a suitable Dark Matter candidate, which could be produced at the LHC. We present the latest searches for Supersymmetry in events with high-energy final states and large missing transverse momentum for 4.7 fb−1 of proton-proton collisions at √s = 7 TeV as recorded by the ATLAS detector at the Large Hadron Collider. The data is interpreted in models where the Dark Matter candidate is dominantly produced in cascade decays of heavier unstable supersymmetric particles together with high-pT Standard Model parti- cles. We also present more model-independent searches for one single highly energetic jet or photon together with large amount of missing energy, showing th...
17. SUSY breaking mediation by throat fields
International Nuclear Information System (INIS)
Bruemmer, F.; Hebecker, A.; Trapletti, M.
2006-01-01
We investigate, in the general framework of KKLT, the mediation of supersymmetry breaking by fields propagating in the strongly warped region of the compactification manifold ('throat fields'). Such fields can couple both to the supersymmetry breaking sector at the IR end of the throat and to the visible sector at the UV end. We model the supersymmetry breaking sector by a chiral superfield which develops an F term vacuum expectation value (also responsible for the uplift). It turns out that the mediation effect of vector multiplets propagating in the throat can compete with modulus-anomaly mediation. Moreover, such vector fields are naturally present as the gauge fields arising from isometries of the throat (most notably the SO(4) isometry of the Klebanov-Strassler solution). Their mediation effect is important in spite of their large 4d mass. The latter is due to the breaking of the throat isometry by the compact manifold at the UV end of the throat. The contribution from heavy chiral superfields is found to be subdominant
18. Characterization and Upscaling of Pore Scale Hydrodynamic Mass Transfer
Science.gov (United States)
Gouze, P.; Roubinet, D.; Dentz, M.; Planes, V.; Russian, A.
2017-12-01
Imaging reservoir rocks in 3D using X-ray microtomography with spatial resolution ranging from about 1 to 10 mm provides us a unique opportunity not only to characterize pore space geometry but also for simulating hydrodynamical processes. Yet, pores and throats displaying sizes smaller than the resolution cannot be distinguished on the images and must be assigned to a so called microporous phase during the process of image segmentation. Accordingly one simulated mass transfers caused by advection and diffusion in the connected pores (mobile domain) and diffusion in the microporous clusters (immobile domain) using Time Domain Random Walk (TDRW) and developed a set of metrics that can be used to monitor the different mechanisms of transport in the sample, the final objective being of proposing a simple but accurate upscaled 1D model in which the particle travel times in the mobile and immobile domain and the number of mobile-immobile transfer events (called trapping events) are independently distributed random variables characterized by PDFs. For TDRW the solute concentration is represented by the density distribution of non-interacting point-like solute particles which move due to advection and dispersion. The set of metrics derives from different spatial and temporal statistical analyses of the particle motion, and is used for characterizing the particles transport (i) in the mobile domain in relation with the velocity field properties, (ii) in the immobile domain in relation with the structure and the properties of microporous phase and at the mobile-immobile interface. We specifically focused on how to model the trapping frequency and rate into the immobile domain in relation with the structure and the spatial distribution of the mobile-immobile domain interface. This thorough analysis of the particle motion for both simple artificial structures and real rock images allowed us to derive the parametrization of the upscaled 1D model.
19. Constraints on Dark Energy, Observable-mass Scaling Relations, Neutrino Properties and Gravity from Galaxy Clusters
DEFF Research Database (Denmark)
Rapetti Serra, David Angelo
Using a data set of 238 cluster detections drawn from the ROSAT All-Sky Survey and X-ray follow-up observations from the Chandra X-ray Observatory and/or ROSAT for 94 of those clusters we obtain tight constraints on dark energy, both luminosity-mass and temperature-mass scaling relations, neutrin...
20. Scaling Factor Estimation Using Optimized Mass Change Strategy, Part 2: Experimental Results
DEFF Research Database (Denmark)
Fernández, Pelayo Fernández; Aenlle, Manuel López; Garcia, Luis M. Villa
2007-01-01
The mass change method is used to estimate the scaling factors, the uncertainty is reduced when, for each mode, the frequency shift is maximized and the changes in the mode shapes are minimized, which in turn, depends on the mass change strategy chosen to modify the dynamic behavior of the struct...
1. Higgs mass prediction in the MSSM at three-loop level in a pure \\overline{{ {DR}}} context
Science.gov (United States)
Harlander, Robert V.; Klappert, Jonas; Voigt, Alexander
2017-12-01
The impact of the three-loop effects of order α _tα _s^2 on the mass of the light CP-even Higgs boson in the { {MSSM}} is studied in a pure \\overline{{ {DR}}} context. For this purpose, we implement the results of Kant et al. (JHEP 08:104, 2010) into the C++ module Himalaya and link it to FlexibleSUSY, a Mathematica and C++ package to create spectrum generators for BSM models. The three-loop result is compared to the fixed-order two-loop calculations of the original FlexibleSUSY and of FeynHiggs, as well as to the result based on an EFT approach. Aside from the expected reduction of the renormalization scale dependence with respect to the lower-order results, we find that the three-loop contributions significantly reduce the difference from the EFT prediction in the TeV-region of the { {SUSY}} scale {M_S}. Himalaya can be linked also to other two-loop \\overline{{ {DR}}} codes, thus allowing for the elevation of these codes to the three-loop level.
2. Multijet Background Estimation For SUSY Searches And Particle Flow Offline Reconstruction Using The ATLAS Detector At The LHC
CERN Document Server
AUTHOR|(SzGeCERN)731691
This thesis describes the jet smearing method, a data-driven technique for estimating the multijet background to Supersymmetry (SUSY) searches using the ATLAS detector at the Large Hadron Collider (LHC). The final 2011 and 2012 “ATLAS jets, missing transverse energy and zero leptons analysis” searches for SUSY are also documented. These analyses used the full ATLAS 2011 4.7 fb^{-1} $\\sqrt{s}$ = 7 TeV and 2012 20.3 fb$^{-1}$ $\\sqrt{s}$ = 8 TeV data sets. No statistically significant excess was found in either of these analyses; therefore, 95% C.L. mass exclusion limits were set on the mSUGRA/CMSSM m$_{0}$-m$_{1/2}$ and $m_{\\tilde{q}}$-$m_{\\tilde{g}}$ mass planes, and the simplified squark-gluino-neutralino pMSSM model. The jet smearing method was used in these analyses to estimate the multijet distributions of the Signal, Validation and Control Regions and also to calculate the multijet background Transfer Factors. This thesis also describes the missing transverse energy (E$_{miss}^{T}$ ) performance studi...
3. Non-SUSY Searches at the Tevatron
International Nuclear Information System (INIS)
Strologas, John
2011-01-01
We present recent results from searches for new physics beyond supersymmetry performed at the Tevatron accelerator at Fermilab. The CDF and D0 analyses presented here utilized data of integrated luminosity up to 6 fb -1 . We cover leptonic and bosonic resonances interpreted in the Randall-Sundrum graviton and new-boson models, rare final states, and the search for vector-like quarks. The search for new phenomena beyond the weak-scale supersymmetry is a vital part of the Fermilab program. Both CDF and D0 experiments at the Tevatron collider actively look for signals not expected by the standard model (SM) or minimal supersymmetric models. The searches can be sorted in three categories: (a) searches for generic resonances that can be interpreted in several new-physics models; (b) searches for exotic combinations of final-state objects or abnormal kinematics (not necessarily predicted by current theories); and (c) model-dependent searches that test a particular theory. We present here latest results from all these categories: searches for new dilepton and diboson resonances (interpreted as gravitons and new gauge bosons), searches for anomalous γ + E T + X production, and searches for vector-like quarks.
4. Leptogenesis after chaotic sneutrino inflation and the supersymmetry breaking scale
Directory of Open Access Journals (Sweden)
Fredrik Björkeroth
2017-03-01
Full Text Available We discuss resonant leptogenesis arising from the decays of two nearly-degenerate right-handed neutrinos, identified as the inflaton and stabiliser superfields in a model of chaotic sneutrino inflation. We compare an analytical estimate of the baryon asymmetry ηB in the Boltzmann approximation to a numerical solution of the full density matrix equations, and find that the analytical result fails to capture the correct physics in certain regions of parameter space. The observed baryon asymmetry can be realised for a breaking of the mass degeneracy as small as O(10−8. The origin of such a small mass splitting is explained by considering supersymmetry (SUSY breaking in supergravity, which requires a constant in the superpotential of the order of the gravitino mass m3/2 to cancel the cosmological constant. This yields additional terms in the (sneutrino mass matrices, lifting the degeneracy and linking ηB to the SUSY breaking scale. We find that achieving the correct baryon asymmetry requires a gravitino mass m3/2≥O(100 TeV.
5. Scaling of human body composition to stature: new insights into body mass index.
Science.gov (United States)
Heymsfield, Steven B; Gallagher, Dympna; Mayer, Laurel; Beetsch, Joel; Pietrobelli, Angelo
2007-07-01
Although Quetelet first reported in 1835 that adult weight scales to the square of stature, limited or no information is available on how anatomical body compartments, including adipose tissue (AT), scale to height. We examined the critical underlying assumptions of adiposity-body mass index (BMI) relations and extended these analyses to major anatomical compartments: skeletal muscle (SM), bone, residual mass, weight (AT+SM+bone), AT-free mass, and organs (liver, brain). This was a cross-sectional analysis of 2 body-composition databases: one including magnetic resonance imaging and dual-energy X-ray absorptiometry (DXA) estimates of evaluated components in adults (total n=411; organs=76) and the other a larger DXA database (n=1346) that included related estimates of fat, fat-free mass, and bone mineral mass. Weight, primary lean components (SM, residual mass, AT-free mass, and fat-free mass), and liver scaled to height with powers of approximately 2 (all P2 (2.31-2.48), and the fraction of weight as bone mineral mass was significantly (Pshort and tall subjects with equivalent BMIs have similar but not identical body composition, provide new insights into earlier BMI-related observations and thus establish a foundation for height-normalized indexes, and create an analytic framework for future studies.
6. Scaling of human body composition to stature: new insights into body mass index 123
Science.gov (United States)
Heymsfield, Steven B; Gallagher, Dympna; Mayer, Laurel; Beetsch, Joel; Pietrobelli, Angelo
2009-01-01
Background Although Quetelet first reported in 1835 that adult weight scales to the square of stature, limited or no information is available on how anatomical body compartments, including adipose tissue (AT), scale to height. Objective We examined the critical underlying assumptions of adiposity–body mass index (BMI) relations and extended these analyses to major anatomical compartments: skeletal muscle (SM), bone, residual mass, weight (AT+SM+bone), AT-free mass, and organs (liver, brain). Design This was a cross-sectional analysis of 2 body-composition databases: one including magnetic resonance imaging and dual-energy X-ray absorptiometry (DXA) estimates of evaluated components in adults (total n = 411; organs = 76) and the other a larger DXA database (n = 1346) that included related estimates of fat, fat-free mass, and bone mineral mass. Results Weight, primary lean components (SM, residual mass, AT-free mass, and fat-free mass), and liver scaled to height with powers of ≈2 (all P 2 (2.31–2.48), and the fraction of weight as bone mineral mass was significantly (P short and tall subjects with equivalent BMIs have similar but not identical body composition, provide new insights into earlier BMI-related observations and thus establish a foundation for height-normalized indexes, and create an analytic framework for future studies. PMID:17616766
7. Non-universal gaugino mass GUT models in the light of dark matter and LHC constraints
International Nuclear Information System (INIS)
Chakrabortty, Joydeep; Mohanty, Subhendra; Rao, Soumya
2014-01-01
We perform a comprehensive study of SU(5), SO(10) and E(6) supersymmetric GUT models where the gaugino masses are generated through the F-term breaking vacuum expectation values of the non-singlet scalar fields. In these models the gauginos are non-universal at the GUT scale unlike in the mSUGRA scenario. We discuss the properties of the LSP which is stable and a viable candidate for cold dark matter. We look for the GUT scale parameter space that leads to the the lightest SM like Higgs mass in the range of 122–127 GeV compatible with the observations at ATLAS and CMS, the relic density in the allowed range of WMAP-PLANCK and compatible with other constraints from colliders and direct detection experiments. We scan universal scalar (m 0 G ), trilinear coupling A 0 and SU(3) C gaugino mass (M 3 G ) as the independent free parameters for these models. Based on the gaugino mass ratios at the GUT scale, we classify 25 SUSY GUT models and find that of these only 13 models satisfy the dark matter and collider constraints. Out of these 13 models there is only one model where there is a sizeable SUSY contribution to muon (g−2)
8. Neutrino masses, scale-dependent growth, and redshift-space distortions
Energy Technology Data Exchange (ETDEWEB)
Hernández, Oscar F., E-mail: [email protected] [Marianopolis College, 4873 Westmount Ave., Westmount, QC H3Y 1X9 (Canada)
2017-06-01
Massive neutrinos leave a unique signature in the large scale clustering of matter. We investigate the wavenumber dependence of the growth factor arising from neutrino masses and use a Fisher analysis to determine the aspects of a galaxy survey needed to measure this scale dependence.
9. Does the planck mass run on the cosmological-horizon scale?
Science.gov (United States)
Robbers, Georg; Afshordi, Niayesh; Doran, Michael
2008-03-21
Einstein's theory of general relativity contains a universal value of the Planck mass. However, one may envisage that in alternative theories of gravity the effective value of the Planck mass (or Newton's constant), which quantifies the coupling of matter to metric perturbations, can run on the cosmological-horizon scale. In this Letter, we study the consequences of a glitch in the Planck mass from subhorizon to superhorizon scales. We show that current cosmological observations severely constrain this glitch to less than 1.2%.
10. Scanning of the supersymmetry breaking scale and the gravitino mass in supergravity
Energy Technology Data Exchange (ETDEWEB)
Farakos, Fotis [Dipartimento di Fisica “Galileo Galilei”, Universita di Padova,Via Marzolo 8, 35131 Padova (Italy); INFN, Sezione di Padova,Via Marzolo 8, 35131 Padova (Italy); Kehagias, Alex [Physics Division, National Technical University of Athens, 15780 Zografou Campus, Athens (Greece); Racco, Davide; Riotto, Antonio [Department of Theoretical Physics and Center for Astroparticle Physics (CAP),24 quai E. Ansermet, CH-1211 Geneva 4 (Switzerland)
2016-06-21
We consider the minimal three-form N=1 supergravity coupled to nilpotent three-form chiral superfields. The supersymmetry breaking is sourced by the three-forms of the chiral multiplets, while the value of the gravitino mass is controlled by the three-form of the supergravity multiplet. The three-forms can nucleate membranes which scan both the supersymmetry breaking scale and the gravitino mass. The peculiar supergravity feature that the cosmological constant is the sum of a positive contribution from the supersymmetry breaking scale and a negative contribution from the gravitino mass makes the cosmological constant jump. This can lead to a phenomenologically allowed small value of the cosmological constant even though the supersymmetry breaking scale and the gravitino mass are dynamically large.
11. Constraining SUSY models with Fittino using measurements before, with and beyond the LHC
Energy Technology Data Exchange (ETDEWEB)
Bechtle, Philip [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Desch, Klaus; Uhlenbrock, Mathias; Wienemann, Peter [Bonn Univ. (Germany). Physikalisches Inst.
2009-07-15
We investigate the constraints on Supersymmetry (SUSY) arising from available precision measurements using a global fit approach.When interpreted within minimal supergravity (mSUGRA), the data provide significant constraints on the masses of supersymmetric particles (sparticles), which are predicted to be light enough for an early discovery at the Large Hadron Collider (LHC). We provide predicted mass spectra including, for the first time, full uncertainty bands. The most stringent constraint is from the measurement of the anomalous magnetic moment of the muon. Using the results of these fits, we investigate to which precision mSUGRA and more general MSSM parameters can be measured by the LHC experiments with three different integrated luminosities for a parameter point which approximately lies in the region preferred by current data. The impact of the already available measurements on these precisions, when combined with LHC data, is also studied. We develop a method to treat ambiguities arising from different interpretations of the data within one model and provide a way to differentiate between values of different digital parameters of a model (e. g. sign({mu}) within mSUGRA). Finally, we show how measurements at a linear collider with up to 1 TeV centre-of-mass energy will help to improve precision by an order of magnitude. (orig.)
12. The QCD mass gap and quark deconfinement scales as mass bounds in strong gravity
Energy Technology Data Exchange (ETDEWEB)
Burikham, Piyabut [Chulalongkorn University, High Energy Physics Theory Group, Department of Physics, Faculty of Science, Bangkok (Thailand); Harko, Tiberiu [Babes-Bolyai University, Department of Physics, Cluj-Napoca (Romania); University College London, Department of Mathematics, London (United Kingdom); Lake, Matthew J. [Sun Yat-Sen University, School of Physics, Guangzhou (China); Nanyang Technological University, School of Physical and Mathematical Sciences, Singapore (Singapore); Naresuan University, The Institute for Fundamental Study, ' ' The Tah Poe Academia Institute' ' , Phitsanulok (Thailand); Thailand Center of Excellence in Physics, Ministry of Education, Bangkok (Thailand)
2017-11-15
Though not a part of mainstream physics, Salam's theory of strong gravity remains a viable effective model for the description of strong interactions in the gauge singlet sector of QCD, capable of producing particle confinement and asymptotic freedom, but not of reproducing interactions involving SU(3) color charge. It may therefore be used to explore the stability and confinement of gauge singlet hadrons, though not to describe scattering processes that require color interactions. It is a two-tensor theory of both strong interactions and gravity, in which the strong tensor field is governed by equations formally identical to the Einstein equations, apart from the coupling parameter, which is of order 1 GeV{sup -1}. We revisit the strong gravity theory and investigate the strong gravity field equations in the presence of a mixing term which induces an effective strong cosmological constant, Λ{sub f}. This introduces a strong de Sitter radius for strongly interacting fermions, producing a confining bubble, which allows us to identify Λ{sub f} with the 'bag constant' of the MIT bag model, B ≅ 2 x 10{sup 14} g cm{sup -3}. Assuming a static, spherically symmetric geometry, we derive the strong gravity TOV equation, which describes the equilibrium properties of compact hadronic objects. From this, we determine the generalized Buchdahl inequalities for a strong gravity 'particle', giving rise to upper and lower bounds on the mass/radius ratio of stable, compact, strongly interacting objects. We show, explicitly, that the existence of the lower mass bound is induced by the presence of Λ{sub f}, producing a mass gap, and that the upper bound corresponds to a deconfinement phase transition. The physical implications of our results for holographic duality in the context of the AdS/QCD and dS/QCD correspondences are also discussed. (orig.)
13. Possible constraints on SUSY-model parameters from direct dark matter search
International Nuclear Information System (INIS)
Bednyakov, V.A.; Kovalenko, S.G.
1993-01-01
We consider the SUSY-model neutralino as a dominant Dark Matter particle in the galactic halo and investigate some general issues of direct DM searches via elastic neutralino-nucleus scattering. On the basis of conventional assumptions about the nuclear and nucleon structure, without referring to a specific SUSY-model, we prove that it is impossible in principle to extract more than three constrains on fundamental SUSY-model parameters from the direct Dark Matter searches. Three types of Dark Matter detector probing different groups of parameters are recognized. 21 refs., 1 tab
14. The warm dark matter halo mass function below the cut-off scale
Science.gov (United States)
Angulo, Raul E.; Hahn, Oliver; Abel, Tom
2013-10-01
Warm dark matter (WDM) cosmologies are a viable alternative to the cold dark matter (CDM) scenario. Unfortunately, an accurate scrutiny of the WDM predictions with N-body simulations has proven difficult due to numerical artefacts. Here, we report on cosmological simulations that, for the first time, are devoid of those problems, and thus are able to accurately resolve the WDM halo mass function well below the cut-off. We discover a complex picture, with perturbations at different evolutionary stages populating different ranges in the halo mass function. On the smallest mass scales we can resolve, identified objects are typically centres of filaments that are starting to collapse. On intermediate mass scales, objects typically correspond to fluctuations that have collapsed and are in the process of relaxation, whereas the high-mass end is dominated by objects similar to haloes identified in CDM simulations. We then explicitly show how the formation of low-mass haloes is suppressed, which translates into a strong cut-off in the halo mass function. This disfavours some analytic formulations that predict a halo mass function that would extend well below the free streaming mass. We argue for a more detailed exploration of the formation of the smallest structures expected to form in a given cosmology, which, we foresee, will advance our overall understanding of structure formation.
15. Scaling Mode Shapes in Output-Only Structure by a Mass-Change-Based Method
Directory of Open Access Journals (Sweden)
Liangliang Yu
2017-01-01
Full Text Available A mass-change-based method based on output-only data for the rescaling of mode shapes in operational modal analysis (OMA is introduced. The mass distribution matrix, which is defined as a diagonal matrix whose diagonal elements represent the ratios among the diagonal elements of the mass matrix, is calculated using the unscaled mode shapes. Based on the theory of null space, the mass distribution vector or mass distribution matrix is obtained. A small mass with calibrated weight is added to a certain location of the structure, and then the mass distribution vector of the modified structure is estimated. The mass matrix is identified according to the difference of the mass distribution vectors between the original and modified structures. Additionally, the universal set of modes is unnecessary when calculating the mass distribution matrix, indicating that modal truncation is allowed in the proposed method. The mass-scaled mode shapes estimated in OMA according to the proposed method are compared with those obtained by experimental modal analysis. A simulation is employed to validate the feasibility of the method. Finally, the method is tested on output-only data from an experiment on a five-storey structure, and the results confirm the effectiveness of the method.
16. Conceptual Design and Demonstration of Space Scale for Measuring Mass in Microgravity Environment
Directory of Open Access Journals (Sweden)
Youn-Kyu Kim
2015-12-01
Full Text Available In this study, a new idea for developing a space scale for measuring mass in a microgravity environment was proposed by using the inertial force properties of an object to measure its mass. The space scale detected the momentum change of the specimen and reference masses by using a load-cell sensor as the force transducer based on Newton’s laws of motion. In addition, the space scale calculated the specimen mass by comparing the inertial forces of the specimen and reference masses in the same acceleration field. By using this concept, a space scale with a capacity of 3 kg based on the law of momentum conservation was implemented and demonstrated under microgravity conditions onboard International Space Station (ISS with an accuracy of ±1 g. By the performance analysis on the space scale, it was verified that an instrument with a compact size could be implemented and be quickly measured with a reasonable accuracy under microgravity conditions.
17. TESTING THE ASTEROSEISMIC MASS SCALE USING METAL-POOR STARS CHARACTERIZED WITH APOGEE AND KEPLER
Energy Technology Data Exchange (ETDEWEB)
Epstein, Courtney R.; Johnson, Jennifer A.; Tayar, Jamie; Pinsonneault, Marc [Department of Astronomy, Ohio State University, 140 W. 18th Avenue, Columbus, OH 43210 (United States); Elsworth, Yvonne P.; Chaplin, William J. [School of Physics and Astronomy, University of Birmingham, Edgbaston Park Road, West Midlands, Birmingham B15 2TT (United Kingdom); Shetrone, Matthew [McDonald Observatory, The University of Texas at Austin, 1 University Station, C1400, Austin, TX 78712-0259 (United States); Mosser, Benoît [LESIA, CNRS, Université Pierre et Marie Curie, Université Denis Diderot, Observatoire de Paris, F-92195 Meudon Cedex (France); Hekker, Saskia [Max-Planck-Institut für Sonnensystemforschung, Justus-von-Liebig-Weg 3, D-37077 Göttingen (Germany); Harding, Paul [Department of Astronomy, Case Western Reserve University, Cleveland, OH 44106-7215 (United States); Silva Aguirre, Víctor [Stellar Astrophysics Centre, Department of Physics and Astronomy, Aarhus University, Ny Munkegade 120, DK-8000 Aarhus C (Denmark); Basu, Sarbani [Department of Astronomy, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States); Beers, Timothy C. [National Optical Astronomy Observatory, Tucson, AZ 85719, USA and JINA: Joint Institute for Nuclear Astrophysics (United States); Bizyaev, Dmitry [Apache Point Observatory, Sunspot, NM 88349 (United States); Bedding, Timothy R. [Sydney Institute for Astronomy (SIfA), School of Physics, University of Sydney, NSW 2006 (Australia); Frinchaboy, Peter M. [Department of Physics and Astronomy, Texas Christian University, TCU Box 298840, Fort Worth, TX 76129 (United States); García, Rafael A. [Laboratoire AIM, CEA/DSM-CNRS, Universit Paris 7 Diderot, IRFU/SAp, Centre de Saclay, F-91191, Gif-sur-Yvette (France); Pérez, Ana E. García; Hearty, Fred R., E-mail: [email protected] [Department of Astronomy, University of Virginia, Charlottesville, VA 22904 (United States); and others
2014-04-20
Fundamental stellar properties, such as mass, radius, and age, can be inferred using asteroseismology. Cool stars with convective envelopes have turbulent motions that can stochastically drive and damp pulsations. The properties of the oscillation frequency power spectrum can be tied to mass and radius through solar-scaled asteroseismic relations. Stellar properties derived using these scaling relations need verification over a range of metallicities. Because the age and mass of halo stars are well-constrained by astrophysical priors, they provide an independent, empirical check on asteroseismic mass estimates in the low-metallicity regime. We identify nine metal-poor red giants (including six stars that are kinematically associated with the halo) from a sample observed by both the Kepler space telescope and the Sloan Digital Sky Survey-III APOGEE spectroscopic survey. We compare masses inferred using asteroseismology to those expected for halo and thick-disk stars. Although our sample is small, standard scaling relations, combined with asteroseismic parameters from the APOKASC Catalog, produce masses that are systematically higher (<ΔM > =0.17 ± 0.05 M {sub ☉}) than astrophysical expectations. The magnitude of the mass discrepancy is reduced by known theoretical corrections to the measured large frequency separation scaling relationship. Using alternative methods for measuring asteroseismic parameters induces systematic shifts at the 0.04 M {sub ☉} level. We also compare published asteroseismic analyses with scaling relationship masses to examine the impact of using the frequency of maximum power as a constraint. Upcoming APOKASC observations will provide a larger sample of ∼100 metal-poor stars, important for detailed asteroseismic characterization of Galactic stellar populations.
18. Naturalness and superpartner masses or when to give up on weak scale supersymmetry
International Nuclear Information System (INIS)
Anderson, G.W.; Castano, D.J.
1995-01-01
Superpartner masses cannot be arbitrarily heavy if supersymmetric extensions of the standard model explain the stability of the gauge hierarchy. This ancient and hallowed motivation for weak scale supersymmetry is often quoted, yet no reliable determination of this upper limit on superpartner masses exists. In this paper we compute upper bounds on superpartner masses in the minimal supersymmetric model, and we identify which values of the superpartner masses correspond to the most natural explanation of the hierarchy stability. We compare the most natural value of these masses and their upper limits to the physics reach of current and future colliders. As a result, we find that supersymmetry could explain weak scale stability naturally even if no superpartners are discovered at the CERN LEP II or the Fermilab Tevatron (even with the Main Injector upgrade). However, we find that supersymmetry cannot provide a complete explanation of weak scale stability, if squarks and gluinos have masses beyond the physics reach of the CERN LHC. Moreover, in the most natural scenarios, many sparticles, for example, charginos, squarks, and gluinos, lie within the physics reach of either LEP II or the Tevatron. Our analysis determines the most natural value of the chargino (squark) [(gluino)] mass consistent with current experimental constraints is ∼50 (250) [(250)] GeV and the corresponding theoretical upper bound is ∼250 (700) [(800)] GeV
19. UPDATED MASS SCALING RELATIONS FOR NUCLEAR STAR CLUSTERS AND A COMPARISON TO SUPERMASSIVE BLACK HOLES
International Nuclear Information System (INIS)
Scott, Nicholas; Graham, Alister W.
2013-01-01
We investigate whether or not nuclear star clusters and supermassive black holes (SMBHs) follow a common set of mass scaling relations with their host galaxy's properties, and hence can be considered to form a single class of central massive object (CMO). We have compiled a large sample of galaxies with measured nuclear star cluster masses and host galaxy properties from the literature and fit log-linear scaling relations. We find that nuclear star cluster mass, M NC , correlates most tightly with the host galaxy's velocity dispersion: log M NC = (2.11 ± 0.31)log (σ/54) + (6.63 ± 0.09), but has a slope dramatically shallower than the relation defined by SMBHs. We find that the nuclear star cluster mass relations involving host galaxy (and spheroid) luminosity and stellar and dynamical mass, intercept with but are in general shallower than the corresponding black hole scaling relations. In particular, M NC ∝M 0.55±0.15 Gal,dyn ; the nuclear cluster mass is not a constant fraction of its host galaxy or spheroid mass. We conclude that nuclear stellar clusters and SMBHs do not form a single family of CMOs.
20. SUSY searches in events with two opposite-sign same-flavor leptons, jets and MET with the CMS detector
CERN Document Server
Schulte, Jan-Frederik
2017-01-01
Searches for Supersymmetry (SUSY) in events with two opposite-sign same-flavour leptons offer sensitivity to the production of sleptons or Z bosons in the cascade decays of initially produced heavy SUSY particles. In the considered models, this signature is accompanied by the presence of several jets and high missing transverse energy. Analysing their respective datasets recorded at √ s = 8 TeV, the ATLAS and CMS collaborations previously reported deviations from the pre- dicted Standard Model backgrounds in this final state, with significances between 2.6 and 3.0 σ . However, these excesses had been observed in different regions of the dilepton invariant mass. The dataset recorded with the CMS detector at √ s = 13 TeV in 2015, corresponding to 2.3 fb − 1 , offers the opportunity to substantiate or refute these interesting hints for new phenomena. Unfor- tunately, no significant deviation from the background estimates are observed in either of the two selections which had shown excesses in the √ s = ...
1. SUSY breaking mediation mechanisms and (g-2)μ, B→Xsγ, B→Xsl+l- and Bs→μ+μ-
International Nuclear Information System (INIS)
Baek, Seungwon; Ko, P.; Song, Wan Young
2003-01-01
We show that there are qualitative differences in correlations among (g-2)μ, B→X s γ, B→X l + l - and B s →μ + μ - in various SUSY breaking mediation mechanisms: minimal supergravity (mSUGRA), gauge mediation (GMSB), anomaly mediation (AMSB), guagino mediation (g-tildeMSB), weakly and strongly interacting string theories, and D brane models. After imposing the direct search limits on the Higgs boson and SUSY particle search limits and B→X s γ branching ratio, we find all the scenarios can accommodate the aμ≡(g-2)μ/2 in the range of (a few tens) x 10 -10 , and predict that the branching ratio for B→X s l + l - can differ from the standard model (SM) prediction by ±20% but no more. On the other hand, the B s →μ + μ - is sensitive to the SUSY breaking mediation mechanisms through the pseudoscalar and stop masses (m A and mt-tilde 1 ), and the stop mixing angle. In the GMSB with a small messenger number, the AMSB, the g-tildeMSB and the noscale scenarios, one finds that B(B s →μ + μ - ) -8 , which is below the search limit at the Tevatron Run II. Only the mSUGRA or string inspired models can generate a large branching ratio for this decay. (author)
2. The fine-tuning cost of the likelihood in SUSY models
CERN Document Server
Ghilencea, D M
2013-01-01
In SUSY models, the fine tuning of the electroweak (EW) scale with respect to their parameters gamma_i={m_0, m_{1/2}, mu_0, A_0, B_0,...} and the maximal likelihood L to fit the experimental data are usually regarded as two different problems. We show that, if one regards the EW minimum conditions as constraints that fix the EW scale, this commonly held view is not correct and that the likelihood contains all the information about fine-tuning. In this case we show that the corrected likelihood is equal to the ratio L/Delta of the usual likelihood L and the traditional fine tuning measure Delta of the EW scale. A similar result is obtained for the integrated likelihood over the set {gamma_i}, that can be written as a surface integral of the ratio L/Delta, with the surface in gamma_i space determined by the EW minimum constraints. As a result, a large likelihood actually demands a large ratio L/Delta or equivalently, a small chi^2_{new}=chi^2_{old}+2*ln(Delta). This shows the fine-tuning cost to the likelihood ...
3. Threshold corrections to dimension-six proton decay operators in non-minimal SUSY SU(5 GUTs
Directory of Open Access Journals (Sweden)
Borut Bajc
2016-09-01
Full Text Available We calculate the high and low scale threshold corrections to the D=6 proton decay mode in supersymmetric SU(5 grand unified theories with higher-dimensional representation Higgs multiplets. In particular, we focus on a missing-partner model in which the grand unified group is spontaneously broken by the 75-dimensional Higgs multiplet and the doublet–triplet splitting problem is solved. We find that in the missing-partner model the D=6 proton decay rate gets suppressed by about 60%, mainly due to the threshold effect at the GUT scale, while the SUSY-scale threshold corrections are found to be less prominent when sfermions are heavy.
4. Nucleon electric dipole moments in high-scale supersymmetric models
International Nuclear Information System (INIS)
Hisano, Junji; Kobayashi, Daiki; Kuramoto, Wataru; Kuwahara, Takumi
2015-01-01
The electric dipole moments (EDMs) of electron and nucleons are promising probes of the new physics. In generic high-scale supersymmetric (SUSY) scenarios such as models based on mixture of the anomaly and gauge mediations, gluino has an additional contribution to the nucleon EDMs. In this paper, we studied the effect of the CP-violating gluon Weinberg operator induced by the gluino chromoelectric dipole moment in the high-scale SUSY scenarios, and we evaluated the nucleon and electron EDMs in the scenarios. We found that in the generic high-scale SUSY models, the nucleon EDMs may receive the sizable contribution from the Weinberg operator. Thus, it is important to compare the nucleon EDMs with the electron one in order to discriminate among the high-scale SUSY models.
5. Nucleon electric dipole moments in high-scale supersymmetric models
Energy Technology Data Exchange (ETDEWEB)
Hisano, Junji [Kobayashi-Maskawa Institute for the Origin of Particles and the Universe (KMI),Nagoya University,Nagoya 464-8602 (Japan); Department of Physics, Nagoya University,Nagoya 464-8602 (Japan); Kavli IPMU (WPI), UTIAS, University of Tokyo,Kashiwa, Chiba 277-8584 (Japan); Kobayashi, Daiki; Kuramoto, Wataru; Kuwahara, Takumi [Department of Physics, Nagoya University,Nagoya 464-8602 (Japan)
2015-11-12
The electric dipole moments (EDMs) of electron and nucleons are promising probes of the new physics. In generic high-scale supersymmetric (SUSY) scenarios such as models based on mixture of the anomaly and gauge mediations, gluino has an additional contribution to the nucleon EDMs. In this paper, we studied the effect of the CP-violating gluon Weinberg operator induced by the gluino chromoelectric dipole moment in the high-scale SUSY scenarios, and we evaluated the nucleon and electron EDMs in the scenarios. We found that in the generic high-scale SUSY models, the nucleon EDMs may receive the sizable contribution from the Weinberg operator. Thus, it is important to compare the nucleon EDMs with the electron one in order to discriminate among the high-scale SUSY models.
6. SUSY Higgs at the LHC large stop mixing effects and associated production
CERN Document Server
Bélanger, G; Sridhar, K
2000-01-01
We revisit the effect of the large stop mixing on the decay and production of the lightest SUSY Higgs at the LHC. We stress that whenever the inclusive 2-photon signature is substantially reduced, associated production, $Wh$ and $t\\bar t h$, with the subsequent decay of the Higgs into photons is enhanced and becomes an even more important discovery channel. We also point out that these reductions in the inclusive channel do not occur for the smallest Higgs mass where the significance is known to be lowest. We show that in such scenarios the Higgs can be produced in the decay of the heaviest stop. For not too heavy masses of the pseudo-scalar Higgs where the inclusive channel is even further reduced, we show that large stop mixing also allows the production of the pseudo-scalar Higgs through stop decays. These large mixing scenarios therefore offer much better prospects than previously thought. As a by-product we have recalculated stop1-stop1-h production at the LHC and give a first evaluation of stop1-stop1-Z...
7. Non-simplified SUSY. τ-coannihilation at LHC and ILC
Energy Technology Data Exchange (ETDEWEB)
Berggren, M.; Kruecker, D.; List, J.; Melzer-Pellmann, I.A.; Seitz, C. [DESY, Hamburg (Germany); Cakir, A. [DESY, Hamburg (Germany); Istanbul Technical University, Department of Physics Engineering, Istanbul (Turkey); Samani, B.S. [DESY, Hamburg (Germany); IPM, P.O. Box 19395-5531, Tehran (Iran, Islamic Republic of); Wayand, S. [KIT IEKP, Karlsruhe (Germany)
2016-04-15
If new phenomena beyond the Standard Model will be discovered at the LHC, the properties of the new particles could be determined with data from the High-Luminosity LHC and from a future linear collider like the ILC. We discuss the possible interplay between measurements at the two accelerators in a concrete example, namely a full SUSY model which features a small τ-LSP mass difference. Various channels have been studied using the Snowmass 2013 combined LHC detector implementation in the Delphes simulation package, as well as simulations of the ILD detector concept from the Technical Design Report. We investigate both the LHC and the ILC capabilities for discovery, separation and identification of various parts of the spectrum. While some parts would be discovered at the LHC, there is substantial room for further discoveries at the ILC. We finally highlight examples where the precise knowledge about the lower part of the mass spectrum which could be acquired at the ILC would enable a more in-depth analysis of the LHC data with respect to the heavier states. (orig.)
8. Evaluation of mixing and mass transfer in a stirred pilot scale bioreactor utilizing CFD
DEFF Research Database (Denmark)
Bach, Christian; Yang, Jifeng; Larsson, Hilde Kristina
2017-01-01
Knowledge and prediction of mixing and mass transfer in agitated bioreactors is fundamental for process development and scale up. In particular key process parameters such as mixing time and volumetric mass transfer coefficient are essential for bioprocess development. In this work the mixing...... and mass transfer performance of a high power agitated pilot scale bioreactor has been characterized using a novel combination of computational fluid dynamics (CFD) and experimental investigations. The effect of turbulence inside the vessel was predicted using a standard RANS k-ε model. Mixing time...... transfer coefficients were in accordance with the experimental data. This work illustrates the possibility of predicting the two phase fluid dynamic performance of an agitated pilot scale bioreactor using validated CFD models. These models can be applied to illustrate the effect of changing the physical...
9. Low-energy consequences of superstring-inspired models with intermediate-mass scales
International Nuclear Information System (INIS)
Gabbiani, F.
1987-01-01
The phenomenological consequences of implementing intermediate-mass scales in E 6 superstring-inspired models are discussed. Starting from a suitable Calabi-Yau compactification with b 1,1 >1, one gets, after Hosotani breaking, the rank r=5 gauge group SU(3) C x SU(2) L x U(1) Y x U(1) E , that is broken at an intermediate-mass scale down to the standard-model group. The analysis of both the intermediate and the electroweak breaking is performed in the two cases Λ c = M x and Λ c x , where Λ c is the scale at which the hidden sector gauginos condensate. It is performed quantitatively the minimization of the low-energy effective potential and the renormalization group analysis, yielding a viable set of mass spectra and confirming the reliability of the intermediate-breaking scheme
10. On the mass-coupling relation of multi-scale quantum integrable models
Energy Technology Data Exchange (ETDEWEB)
Bajnok, Zoltán; Balog, János [MTA Lendület Holographic QFT Group, Wigner Research Centre,H-1525 Budapest 114, P.O.B. 49 (Hungary); Ito, Katsushi [Department of Physics, Tokyo Institute of Technology,2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan); Satoh, Yuji [Institute of Physics, University of Tsukuba,1-1-1 Tennodai, Tsukuba, Ibaraki 305-8571 (Japan); Tóth, Gábor Zsolt [MTA Lendület Holographic QFT Group, Wigner Research Centre,H-1525 Budapest 114, P.O.B. 49 (Hungary)
2016-06-13
We determine exactly the mass-coupling relation for the simplest multi-scale quantum integrable model, the homogenous sine-Gordon model with two independent mass-scales. We first reformulate its perturbed coset CFT description in terms of the perturbation of a projected product of minimal models. This representation enables us to identify conserved tensor currents on the UV side. These UV operators are then mapped via form factor perturbation theory to operators on the IR side, which are characterized by their form factors. The relation between the UV and IR operators is given in terms of the sought-for mass-coupling relation. By generalizing the Θ sum rule Ward identity we are able to derive differential equations for the mass-coupling relation, which we solve in terms of hypergeometric functions. We check these results against the data obtained by numerically solving the thermodynamic Bethe Ansatz equations, and find a complete agreement.
11. SUSY WT identity in a lattice formulation of 2D N=(2,2) SYM
International Nuclear Information System (INIS)
2010-01-01
We address some issues relating to a supersymmetric (SUSY) Ward-Takahashi (WT) identity in Sugino's lattice formulation of two-dimensional (2D) N=(2,2)SU(k) supersymmetric Yang-Mills theory (SYM). A perturbative argument shows that the SUSY WT identity in the continuum theory is reproduced in the continuum limit without any operator renormalization/mixing and tuning of lattice parameters. As application of the lattice SUSY WT identity, we show that a prescription for the Hamiltonian density in this lattice formulation, proposed by Kanamori, Sugino and Suzuki, is justified also from a perspective of an operator algebra among correctly-normalized supercurrents. We explicitly confirm the SUSY WT identity in the continuum limit to the first nontrivial order in a semi-perturbative expansion.
12. Effective Lagrangians for SUSY QCD with properties seen in perturbation theory
International Nuclear Information System (INIS)
Sharatchandra, H.S.
1984-06-01
We construct effective Lagrangians for supersymmetric QCD which properly incorporate the relevant Ward identities and possess features encountered in perturbation theory. This shows that the unusual scenarios, proposed for SUSY QCD, are not necessary. (author)
13. Interpretation of Higgs and Susy searches in MSUGRA and GMSB Models
International Nuclear Information System (INIS)
Vivie, J.B. de
1999-10-01
HIGGS and SUSY searches performed by the ALEPH Experiment at LEP are interpreted in the framework of two constrained R-parity conserving models: Minimal Supergravity and minimal Gauge Mediated Supersymmetry Breaking. (author)
14. Improved mass-measurement accuracy using a PNB Load Cell Scale
International Nuclear Information System (INIS)
Suda, S.; Pontius, P.; Schoonover, R.
1981-08-01
15. Prospects for SUSY discovery based on inclusive searches with the ATLAS detector
International Nuclear Information System (INIS)
Ventura, Andrea
2009-01-01
The search for Supersymmetry (SUSY) among the possible scenarios of new physics is one of the most relevant goals of the ATLAS experiment running at CERN's Large Hadron Collider. In the present work the expected prospects for discovering SUSY with the ATLAS detector are reviewed, in particular for the first fb -1 of collected integrated luminosity. All studies and results reported here are based on inclusive search analyses realized with Monte Carlo signal and background data simulated through the ATLAS apparatus.
16. Final Report: Geoelectrical Measurement of Multi-Scale Mass Transfer Parameters
Energy Technology Data Exchange (ETDEWEB)
Haggerty, Roy [Oregon State Univ., Corvallis, OR (United States); Day-Lewis, Fred [U.S. Geological Survey, Storrs, CT (United States); Singha, Kamini [Colorado School of Mines, Golden, CO (United States); Johnson, Timothy [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Binley, Andrew [Lancaster Univ. (United Kingdom); Lane, John [U.S. Geological Survey, Storrs, CT (United States)
2014-03-20
Mass transfer affects contaminant transport and is thought to control the efficiency of aquifer remediation at a number of sites within the Department of Energy (DOE) complex. An improved understanding of mass transfer is critical to meeting the enormous scientific and engineering challenges currently facing DOE. Informed design of site remedies and long-term stewardship of radionuclide-contaminated sites will require new cost-effective laboratory and field techniques to measure the parameters controlling mass transfer spatially and across a range of scales. In this project, we sought to capitalize on the geophysical signatures of mass transfer. Previous numerical modeling and pilot-scale field experiments suggested that mass transfer produces a geoelectrical signature—a hysteretic relation between sampled (mobile-domain) fluid conductivity and bulk (mobile + immobile) conductivity—over a range of scales relevant to aquifer remediation. In this work, we investigated the geoelectrical signature of mass transfer during tracer transport in a series of controlled experiments to determine the operation of controlling parameters, and also investigated the use of complex-resistivity (CR) as a means of quantifying mass transfer parameters in situ without tracer experiments. In an add-on component to our grant, we additionally considered nuclear magnetic resonance (NMR) to help parse mobile from immobile porosities. Including the NMR component, our revised study objectives were to: 1. Develop and demonstrate geophysical approaches to measure mass-transfer parameters spatially and over a range of scales, including the combination of electrical resistivity monitoring, tracer tests, complex resistivity, nuclear magnetic resonance, and materials characterization; and 2. Provide mass-transfer estimates for improved understanding of contaminant fate and transport at DOE sites, such as uranium transport at the Hanford 300 Area. To achieve our objectives, we implemented a 3
17. Effects of reservoir heterogeneity on scaling of effective mass transfer coefficient for solute transport
Science.gov (United States)
Leung, Juliana Y.; Srinivasan, Sanjay
2016-09-01
Modeling transport process at large scale requires proper scale-up of subsurface heterogeneity and an understanding of its interaction with the underlying transport mechanisms. A technique based on volume averaging is applied to quantitatively assess the scaling characteristics of effective mass transfer coefficient in heterogeneous reservoir models. The effective mass transfer coefficient represents the combined contribution from diffusion and dispersion to the transport of non-reactive solute particles within a fluid phase. Although treatment of transport problems with the volume averaging technique has been published in the past, application to geological systems exhibiting realistic spatial variability remains a challenge. Previously, the authors developed a new procedure where results from a fine-scale numerical flow simulation reflecting the full physics of the transport process albeit over a sub-volume of the reservoir are integrated with the volume averaging technique to provide effective description of transport properties. The procedure is extended such that spatial averaging is performed at the local-heterogeneity scale. In this paper, the transport of a passive (non-reactive) solute is simulated on multiple reservoir models exhibiting different patterns of heterogeneities, and the scaling behavior of effective mass transfer coefficient (Keff) is examined and compared. One such set of models exhibit power-law (fractal) characteristics, and the variability of dispersion and Keff with scale is in good agreement with analytical expressions described in the literature. This work offers an insight into the impacts of heterogeneity on the scaling of effective transport parameters. A key finding is that spatial heterogeneity models with similar univariate and bivariate statistics may exhibit different scaling characteristics because of the influence of higher order statistics. More mixing is observed in the channelized models with higher-order continuity. It
18. Higgsino dark matter in high-scale supersymmetry
International Nuclear Information System (INIS)
Nagata, Natsumi
2014-11-01
We study a supersymmetric (SUSY) Standard Model in which a Higgsino is light enough to be dark matter, while the other SUSY particles are much heavier than the weak scale. We carefully treat the effects of heavy SUSY particles to the Higgsino nature, especially taking into account the renormalization effects due to the large hierarchy between the Higgsino and the SUSY breaking scales. Inelastic scattering of the Higgsino dark matter with a nucleus is studied, and the constraints on the scattering by the direct detection experiments are discussed. This gives an upper limit on the new physics scale. Bounds on the dark matter-nucleon elastic scattering, the electric dipole moments, and direct production of Higgsinos, on the other hand, give a lower limit. We show the current status on the limits and discuss the future prospects.
19. The Children's Body Image Scale: reliability and use with international standards for body mass index.
Science.gov (United States)
Truby, Helen; Paxton, Susan J
2008-03-01
To test the reliability of the Children's Body Image Scale (CBIS) and assess its usefulness in the context of new body size charts for children. Participants were 281 primary schoolchildren with 50% being retested after 3 weeks. The CBIS figure scale was compared with a range of international body mass index (BMI) reference standards. Children had a high degree of body image dissatisfaction. The test-retest reliability of the CBIS was supported. The CBIS is a useful tool for assessing body image in children with sound scale properties. It can also be used to identify the body size of children, which lies outside the healthy weight range of BMI.
20. Basal metabolic rate scaled to body mass within species by the ...
African Journals Online (AJOL)
Basal metabolic rate scaled to body mass within species by the fractal dimension of the vascular system and body composition. ... The postulate bd = c is shown to hold for both these species within the limits of experimental error, with the crucian carp evidence being especially convincing, since b, c and d are estimated from ...
1. Deep inelastic scattering as a probe of new hadronic mass scales
International Nuclear Information System (INIS)
Burges, C.J.C.; Schnitzer, H.J.
1984-01-01
We present the general form for deep-inelastic cross sections obtained from all SU(3) x SU(2) x U(1) invariant operators of dimension six or less. The operators of dimension six generate corrections to the predictions of the standard model, which serve as a probe of a possible new mass-scale Λ and other new physics. (orig.)
2. Ontogenetic scaling of fish metabolism in the mouse-to-elephant mass magnitude range
DEFF Research Database (Denmark)
Moran, Damian; Wells, R.M.G.
2007-01-01
, and are therefore not statistically comparable. In this study the metabolic rate of yellowtail kingfish was measured from 0.6 mg-2.2 kg, a mass range comparable to that between a mouse and an elephant. Linear regression of the log transformed data resulted in a scaling exponent of 0.90 and high correlation...
3. Basal metabolic rate scaled to body mass between species by the ...
African Journals Online (AJOL)
The principal reason that basal metabolic rate (BMR) and MMR scale with different power exponents to whole body mass is that MMR is due mainly to respiration in skeletal muscle during exercise and BMR to respiration in the viscera during rest. It follows, therefore, from the self-similarity of the vascular system that BMR is ...
4. Necessity of intermediate mass scales in grand unified theories with spontaneously broken CP invariance
International Nuclear Information System (INIS)
Senjanovic, G.
1982-07-01
It is demonstrated that the spontaneous breakdown of CP invariance in grand unified theories requires the presence of intermediate mass scales. The simplest realization is provided by weakly broken left-right symmetry in the context of SU(2)sub(L) x SU(2)sub(R) x U(1)sub(B-L) model embedded in grand unified theories. (author)
5. Exercise-induced maximum metabolic rate scaled to body mass by ...
African Journals Online (AJOL)
user
2016-10-27
Oct 27, 2016 ... maximum aerobic metabolic rate (MMR) is proportional to the fractal extent ... metabolic rate with body mass can be obtained by taking body .... blood takes place. ..... MMR and BMR is that MMR is owing mainly to respiration in skeletal .... the spectra of surface area scaling strategies of cells and organisms:.
6. A model for a unification of scales. From MPlanck TO mν
International Nuclear Information System (INIS)
Pati, J.C.
1989-01-01
It is proposed that the hierarchical scales - from M Planck to m ν - have a common origin. Using M Planck and the coupling constant associated with a preonic metacolor gauge force as the only input parameters, it is shown how large ratios such as (M Pl /M I ), (M Pl /δm s ), (M Pl /m W ), (M Pl /m t ) and even (M Pl /m ν )> or approx.10 27 can arise naturally. Here M I denotes an intermediate scale ≅ 10 11 GeV, which is identified with the scale parameter of the metacolor force, while δm s denotes SUSY-breaking mass splittings ≅ 1 TeV. Local supersymmetry together with an inhibition in the breaking of global SUSY (index theorem) as well as compositeness of quarks, leptons and Higgs play crucial roles in this approach. Two key features of the model are the natural origins of composite vector-like families with masses of order of a few hundred GeV to 1 TeV and the consequent see-saw mechanism for the generations of quark-lepton masses and CP violation. (orig.)
7. Plasmon mass scale in two-dimensional classical nonequilibrium gauge theory
Science.gov (United States)
Lappi, T.; Peuron, J.
2018-02-01
We study the plasmon mass scale in classical gluodynamics in a two-dimensional configuration that mimics the boost-invariant initial color fields in a heavy-ion collision. We numerically measure the plasmon mass scale using three different methods: a hard thermal loop (HTL) expression involving the quasiparticle spectrum constructed from Coulomb gauge field correlators, an effective dispersion relation, and the measurement of oscillations between electric and magnetic energies after introducing a spatially uniform perturbation to the electric field. We find that the HTL expression and the uniform electric field measurement are in rough agreement. The effective dispersion relation agrees with other methods within a factor of 2. We also study the dependence on time and occupation number, observing similar trends as in three spatial dimensions, where a power-law dependence sets in after an occupation-number-dependent transient time. We observe a decrease of the plasmon mass squared as t-1 / 3 at late times.
8. Atomic scale mass delivery driven by bend kink in single walled carbon nanotube
International Nuclear Information System (INIS)
Kan Biao; Ding Jianning; Ling Zhiyong; Yuan Ningyi; Cheng Guanggui
2010-01-01
The possibility of atomic scale mass delivery by bend kink in single walled carbon nanotube was investigated with the aid of molecular dynamics simulation. By keeping the bending angle while moving the tube end, the encapsulated atomic scale mass such as atom, molecule and atom group were successfully delivered through the nanotube. The van der Waals interaction between the encapsulated mass and the tube wall provided the driving force for the delivery. There were no dramatic changes in the van der Waals interaction, and a smooth and steady delivery was achieved when constant loading rate was applied. The influence of temperature on the atom group delivery was also analyzed. It is found raising temperature is harmful to the smooth movement of the atom group. However, the delivery rate can be promoted under higher temperature when the atom group is situated before the kink during the delivery.
9. SUSY non-Abelian gauge models: exact beta function from one loop of perturbation theory
International Nuclear Information System (INIS)
Shifman, M.A.; Vajnshtejn, A.I.; Zakharov, V.I.
1985-01-01
The method for calculating the exact β function (to all orders in the coupling constant) proposed earlier in supersymmetric electrodynamics is extended. The starting point is the observation that the low-energy effective action is exhausted by one loop provided that the theory is regularized supersymmetrically both in the ultraviolet and infrared domains in four dimensions. The Pouli-Villars method of the ultraviolet regularization is used. Two methods for the infrared regularization are considered. The first one - quantization in a box with a finite volume L 3 - is universally applicable to anygauge theory. The second method is based on the effective Higgs mechanism for mass generation and requires the presence of certain matter superfields in the lagrangian. Within this method the necessary condition is the existence of flat directions, so called valeys, along which the vacuum energy vanishes. The theory is quantized near epsilon non-vanishing value of the scalar field from the bottom of the valley. After calculating the one-loop effective action one and the same exact expression is obtained for the β function within the both approaches, and it also coincides with our earlier result extracted from instanton calculus. A few remarks on the problem of anomalies in SUSY gauge theories are presented
10. Large-scale correlations in gas traced by Mg II absorbers around low-mass galaxies
Science.gov (United States)
Kauffmann, Guinevere
2018-03-01
The physical origin of the large-scale conformity in the colours and specific star formation rates of isolated low-mass central galaxies and their neighbours on scales in excess of 1 Mpc is still under debate. One possible scenario is that gas is heated over large scales by feedback from active galactic nuclei (AGNs), leading to coherent modulation of cooling and star formation between well-separated galaxies. In this Letter, the metal line absorption catalogue of Zhu & Ménard is used to probe gas out to large projected radii around a sample of a million galaxies with stellar masses ˜1010M⊙ and photometric redshifts in the range 0.4 Survey imaging data. This galaxy sample covers an effective volume of 2.2 Gpc3. A statistically significant excess of Mg II absorbers is present around the red-low-mass galaxies compared to their blue counterparts out to projected radii of 10 Mpc. In addition, the equivalent width distribution function of Mg II absorbers around low-mass galaxies is shown to be strongly affected by the presence of a nearby (Rp < 2 Mpc) radio-loud AGNs out to projected radii of 5 Mpc.
11. Multiscale N=2 SUSY field theories, integrable systems and their stringy/brane origin
International Nuclear Information System (INIS)
Gorsky, A.; Gukov, S.; Mironov, A.
1998-01-01
We discuss supersymmetric Yang-Mills theories with multiple scales in the brane language. The issue concerns N=2 SUSY gauge theories with massive fundamental matter including the UV finite case of n f =2n c , theories involving products of SU(n) gauge groups with bifundamental matter, and systems with several parameters similar to Λ QCD . We argue that the proper integrable systems are, accordingly, twisted XXX SL(2) spin chain, SL(p) magnets and degenerations of the spin Calogero system. The issue of symmetries underlying integrable systems is addressed. Relations with the monopole systems are specially discussed. Brane pictures behind all these integrable structures in the IIB and M-theory are suggested. We argue that degrees of freedom in integrable systems are related to KK excitations in M-theory or D-particles in the IIA string theory, which substitute the infinite number of instantons in the field theory. This implies the presence of more BPS states in the low-energy sector. (orig.)
12. Baryon asymmetry via leptogenesis in a neutrino mass model with complex scaling
International Nuclear Information System (INIS)
Samanta, Rome; Ghosal, Ambar; Chakraborty, Mainak; Roy, Probir
2017-01-01
Baryogenesis via leptogenesis is investigated in a specific model of light neutrino masses and mixing angles. The latter was proposed on the basis of an assumed complex-extended scaling property of the neutrino Majorana mass matrix M ν , derived with a type-1 seesaw from a Dirac mass matrix m D and a heavy singlet neutrino Majorana mass matrix M R . One of its important features, highlighted here, is that there is a common source of the origin of a nonzero θ 13 and the CP violating lepton asymmetry through the imaginary part of m D . The model predicted CP violation to be maximal for the Dirac type and vanishing for the Majorana type. We assume strongly hierarchical mass eigenvalues for M R . The leptonic CP asymmetry parameter ε α 1 mm with lepton flavor α, originating from the decays of the lightest of the heavy neutrinos N 1 (of mass M 1 ) at a temperature T ∼ M 1 , is what matters here with the lepton asymmetries, originating from the decays of N 2,3 , being washed out. The light leptonic and heavy neutrino number densities (normalized to the entropy density) are evolved via Boltzmann equations down to electroweak temperatures to yield a baryon asymmetry through sphaleronic transitions. The effects of flavored vs. unflavored leptogenesis in the three mass regimes (1) M 1 < 10 9 GeV, (2) 10 9 GeV < M 1 < 10 12 GeV and (3) M 1 > 10 12 GeV are numerically worked out for both a normal and an inverted mass ordering of the light neutrinos. Corresponding results on the baryon asymmetry of the universe are obtained, displayed and discussed. For values close to the best-fit points of the input neutrino mass and mixing parameters, obtained from neutrino oscillation experiments, successful baryogenesis is achieved for the mass regime (2) and a normal mass ordering of the light neutrinos with a nonzero θ 13 playing a crucial role. However, the other possibility of an inverted mass ordering for the same mass regime, though disfavored, cannot be excluded. A
13. Baryon asymmetry via leptogenesis in a neutrino mass model with complex scaling
Energy Technology Data Exchange (ETDEWEB)
Samanta, Rome; Ghosal, Ambar [Saha Institute of Nuclear Physics, HBNI, 1/AF Bidhannagar, Kolkata 700064 (India); Chakraborty, Mainak [Centre of Excellence in Theoretical and Mathematical Sciences, SOA University, Khandagiri Square, Bhubaneswar 751030 (India); Roy, Probir, E-mail: [email protected], E-mail: [email protected], E-mail: [email protected], E-mail: [email protected] [Center for Astroparticle Physics and Space Science, Bose Institute, Kolkata 700091 (India)
2017-03-01
Baryogenesis via leptogenesis is investigated in a specific model of light neutrino masses and mixing angles. The latter was proposed on the basis of an assumed complex-extended scaling property of the neutrino Majorana mass matrix M {sub ν}, derived with a type-1 seesaw from a Dirac mass matrix m {sub D} and a heavy singlet neutrino Majorana mass matrix M {sub R} . One of its important features, highlighted here, is that there is a common source of the origin of a nonzero θ{sub 13} and the CP violating lepton asymmetry through the imaginary part of m {sub D} . The model predicted CP violation to be maximal for the Dirac type and vanishing for the Majorana type. We assume strongly hierarchical mass eigenvalues for M {sub R} . The leptonic CP asymmetry parameter ε{sup α}{sub 1} mm with lepton flavor α, originating from the decays of the lightest of the heavy neutrinos N {sub 1} (of mass M {sub 1}) at a temperature T ∼ M {sub 1}, is what matters here with the lepton asymmetries, originating from the decays of N {sub 2,3}, being washed out. The light leptonic and heavy neutrino number densities (normalized to the entropy density) are evolved via Boltzmann equations down to electroweak temperatures to yield a baryon asymmetry through sphaleronic transitions. The effects of flavored vs. unflavored leptogenesis in the three mass regimes (1) M {sub 1} < 10{sup 9} GeV, (2) 10{sup 9} GeV < M {sub 1} < 10{sup 12} GeV and (3) M {sub 1} > 10{sup 12} GeV are numerically worked out for both a normal and an inverted mass ordering of the light neutrinos. Corresponding results on the baryon asymmetry of the universe are obtained, displayed and discussed. For values close to the best-fit points of the input neutrino mass and mixing parameters, obtained from neutrino oscillation experiments, successful baryogenesis is achieved for the mass regime (2) and a normal mass ordering of the light neutrinos with a nonzero θ{sub 13} playing a crucial role. However, the other
14. Basin-scale heterogeneity in Antarctic precipitation and its impact on surface mass variability
Directory of Open Access Journals (Sweden)
J. Fyke
2017-11-01
Full Text Available Annually averaged precipitation in the form of snow, the dominant term of the Antarctic Ice Sheet surface mass balance, displays large spatial and temporal variability. Here we present an analysis of spatial patterns of regional Antarctic precipitation variability and their impact on integrated Antarctic surface mass balance variability simulated as part of a preindustrial 1800-year global, fully coupled Community Earth System Model simulation. Correlation and composite analyses based on this output allow for a robust exploration of Antarctic precipitation variability. We identify statistically significant relationships between precipitation patterns across Antarctica that are corroborated by climate reanalyses, regional modeling and ice core records. These patterns are driven by variability in large-scale atmospheric moisture transport, which itself is characterized by decadal- to centennial-scale oscillations around the long-term mean. We suggest that this heterogeneity in Antarctic precipitation variability has a dampening effect on overall Antarctic surface mass balance variability, with implications for regulation of Antarctic-sourced sea level variability, detection of an emergent anthropogenic signal in Antarctic mass trends and identification of Antarctic mass loss accelerations.
15. Low-energy parity restoration and unification mass scale within maximal symmetries
Directory of Open Access Journals (Sweden)
Ajaya K. Mohanty
1984-01-01
Full Text Available We investigate the hierarchy of gauge boson masses in the maximal grand unified theory by studying the renormalization group equations for the running coupling constants associated with the symmetry breaking of SU(16viaSU(12 q×SU(4 l×U(1 |B|−|L| chain. Particular attention is given to the contribution of Higgs scalars to these equations. It is found that the intermediate mass scale ML, associated with right-handed gauge bosons could be as low as 10 3 GeV only for sin 2θ w(M L as high as 0.265 with α s(M L=0.13. In this chain of symmetry breaking, we have also examined the lowest unification mass that is allowed by the low-energy data for sin 2θ w(M L and the assumed gauge hierarchy. This has been done in two cases; first for the case where SU(3 c is vectorial, second, for the case where SU(3 c is axial. In both cases the lowest unification mass scales were found to be 10 13, 10 11, 10 8 and 10 7 GeV for sin 2θ w(M L = 0.22, 0.24, 0.26,and0.265 respectively with α s(M L = 0.13. The implication of these low unification masses on baryon non-conserving processes is also discussed.
16. Scaling of avian bipedal locomotion reveals independent effects of body mass and leg posture on gait.
Science.gov (United States)
Daley, Monica A; Birn-Jeffery, Aleksandra
2018-05-22
Birds provide an interesting opportunity to study the relationships between body size, limb morphology and bipedal locomotor function. Birds are ecologically diverse and span a large range of body size and limb proportions, yet all use their hindlimbs for bipedal terrestrial locomotion, for at least some part of their life history. Here, we review the scaling of avian striding bipedal gaits to explore how body mass and leg morphology influence walking and running. We collate literature data from 21 species, spanning a 2500× range in body mass from painted quail to ostriches. Using dynamic similarity theory to interpret scaling trends, we find evidence for independent effects of body mass, leg length and leg posture on gait. We find no evidence for scaling of duty factor with body size, suggesting that vertical forces scale with dynamic similarity. However, at dynamically similar speeds, large birds use relatively shorter stride lengths and higher stride frequencies compared with small birds. We also find that birds with long legs for their mass, such as the white stork and red-legged seriema, use longer strides and lower swing frequencies, consistent with the influence of high limb inertia on gait. We discuss the observed scaling of avian bipedal gait in relation to mechanical demands for force, work and power relative to muscle actuator capacity, muscle activation costs related to leg cycling frequency, and considerations of stability and agility. Many opportunities remain for future work to investigate how morphology influences gait dynamics among birds specialized for different habitats and locomotor behaviors. © 2018. Published by The Company of Biologists Ltd.
17. Effects of Contingency versus Constraints on the Body-Mass Scaling of Metabolic Rate
Directory of Open Access Journals (Sweden)
Douglas S. Glazier
2018-01-01
Full Text Available I illustrate the effects of both contingency and constraints on the body-mass scaling of metabolic rate by analyzing the significantly different influences of ambient temperature (Ta on metabolic scaling in ectothermic versus endothermic animals. Interspecific comparisons show that increasing Ta results in decreasing metabolic scaling slopes in ectotherms, but increasing slopes in endotherms, a pattern uniquely predicted by the metabolic-level boundaries hypothesis, as amended to include effects of the scaling of thermal conductance in endotherms outside their thermoneutral zone. No other published theoretical model explicitly predicts this striking variation in metabolic scaling, which I explain in terms of contingent effects of Ta and thermoregulatory strategy in the context of physical and geometric constraints related to the scaling of surface area, volume, and heat flow across surfaces. My analysis shows that theoretical models focused on an ideal 3/4-power law, as explained by a single universally applicable mechanism, are clearly inadequate for explaining the diversity and environmental sensitivity of metabolic scaling. An important challenge is to develop a theory of metabolic scaling that recognizes the contingent effects of multiple mechanisms that are modulated by several extrinsic and intrinsic factors within specified constraints.
18. Scaling of Myocardial Mass to Flow and Morphometry of Coronary Arteries
OpenAIRE
Choy, Jenny Susana; Kassab, Ghassan S.
2008-01-01
There is no doubt that scaling relations exist between myocardial mass and morphometry of coronary vasculature. The purpose of this study is to quantify several morphological (diameter, length, and volume) and functional (flow) parameters of the coronary arterial tree in relation to myocardial mass. Eight normal porcine hearts of 117-244 g (mean of 177.5±32.7) were used in this study. Various coronary sub-trees of the Left Anterior Descending (LAD), Right Coronary (RCA) and Left Circumflex (L...
19. Absolute calibration of the mass scale in the inverse problem of the physical theory of fireballs
Science.gov (United States)
Kalenichenko, V. V.
1992-08-01
A method of the absolute calibration of the mass scale is proposed for solving the inverse problem of the physical theory of fireballs. The method is based on data on the masses of fallen meteorites whose fireballs have been photographed in flight. The method can be applied to fireballs whose bodies have not experienced significant fragmentation during their flight in the atmosphere and have kept their shape relatively well. Data on the Lost City and Innisfree meteorites are used to calculate the calibration coefficients.
20. Absolute mass scale calibration in the inverse problem of the physical theory of fireballs.
Science.gov (United States)
Kalenichenko, V. V.
A method of the absolute mass scale calibration is suggested for solving the inverse problem of the physical theory of fireballs. The method is based on the data on the masses of the fallen meteorites whose fireballs have been photographed in their flight. The method may be applied to those fireballs whose bodies have not experienced considerable fragmentation during their destruction in the atmosphere and have kept their form well enough. Statistical analysis of the inverse problem solution for a sufficiently representative sample makes it possible to separate a subsample of such fireballs. The data on the Lost City and Innisfree meteorites are used to obtain calibration coefficients.
1. Strange star candidates revised within a quark model with chiral mass scaling
Institute of Scientific and Technical Information of China (English)
Ang Li; Guang-Xiong Peng; Ju-Fu Lu
2011-01-01
We calculate the properties of static strange stars using a quark model with chiral mass scaling. The results are characterized by a large maximum mass (~ 1.6 M⊙) and radius (~ 10 km). Together with a broad collection of modern neutron star models, we discuss some recent astrophysical observational data that could shed new light on the possible presence of strange quark matter in compact stars. We conclude that none of the present astrophysical observations can prove or confute the existence of strange stars.
2. Dark-Matter Particles without Weak-Scale Masses or Weak Interactions
International Nuclear Information System (INIS)
Feng, Jonathan L.; Kumar, Jason
2008-01-01
We propose that dark matter is composed of particles that naturally have the correct thermal relic density, but have neither weak-scale masses nor weak interactions. These models emerge naturally from gauge-mediated supersymmetry breaking, where they elegantly solve the dark-matter problem. The framework accommodates single or multiple component dark matter, dark-matter masses from 10 MeV to 10 TeV, and interaction strengths from gravitational to strong. These candidates enhance many direct and indirect signals relative to weakly interacting massive particles and have qualitatively new implications for dark-matter searches and cosmological implications for colliders
3. Predictions of the marviken subcooled critical mass flux using the critical flow scaling parameters
Energy Technology Data Exchange (ETDEWEB)
Park, Choon Kyung; Chun, Se Young; Cho, Seok; Yang, Sun Ku; Chung, Moon Ki [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)
1997-12-31
A total of 386 critical flow data points from 19 runs of 27 runs in the Marviken Test were selected and compared with the predictions by the correlations based on the critical flow scaling parameters. The results show that the critical mass flux in the very large diameter pipe can be also characterized by two scaling parameters such as discharge coefficient and dimensionless subcooling (C{sub d,ref} and {Delta}{Tau}{sup *} {sub sub}). The agreement between the measured data and the predictions are excellent. 8 refs., 8 figs. 1 tab. (Author)
4. Predictions of the marviken subcooled critical mass flux using the critical flow scaling parameters
Energy Technology Data Exchange (ETDEWEB)
Park, Choon Kyung; Chun, Se Young; Cho, Seok; Yang, Sun Ku; Chung, Moon Ki [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)
1998-12-31
A total of 386 critical flow data points from 19 runs of 27 runs in the Marviken Test were selected and compared with the predictions by the correlations based on the critical flow scaling parameters. The results show that the critical mass flux in the very large diameter pipe can be also characterized by two scaling parameters such as discharge coefficient and dimensionless subcooling (C{sub d,ref} and {Delta}{Tau}{sup *} {sub sub}). The agreement between the measured data and the predictions are excellent. 8 refs., 8 figs. 1 tab. (Author)
5. ADVANTAGES OF RAPID METHOD FOR DETERMINING SCALE MASS AND DECARBURIZED LAYER OF ROLLED COIL STEEL
Directory of Open Access Journals (Sweden)
E. V. Parusov
2016-08-01
Full Text Available Purpose. To determine the universal empirical relationships that allow for operational calculation of scale mass and decarbonized layer depth based on the parameters of the technological process for rolled coil steel production. Methodology. The research is carried out on the industrial batches of the rolled steel of SAE 1006 and SAE 1065 grades. Scale removability was determined in accordance with the procedure of «Bekaert» company by the specifi-cations: GA-03-16, GA-03-18, GS-03-02, GS-06-01. The depth of decarbonized layer was identified in accordance with GOST 1763-68 (M method. Findings. Analysis of experimental data allowed us to determine the rational temperature of coil formation of the investigated steel grades, which provide the best possible removal of scale from the metal surface, a minimal amount of scale, as well as compliance of the metal surface color with the require-ments of European consumers. Originality. The work allowed establishing correlation of the basic quality indicators of the rolled coil high carbon steel (scale mass, depth of decarbonized layer and inter-laminar distance in pearlite with one of the main parameters (coil formation temperature of the deformation and heat treatment mode. The re-sulting regression equations, without metallographic analysis, can be used to determine, with a minimum error, the quantitative values of the total scale mass, depth of decarbonized layer and the average inter-lamellar distance in pearlite of the rolled coil high carbon steel. Practical value. Based on the specifications of «Bekaert» company (GA-03-16, GA-03-18, GS-03-02 and GS-06-01 the method of testing descaling by mechanical means from the surface of the rolled coil steel of low- and high-carbon steel grades was developed and approved in the environment of PJSC «ArcelorMittal Kryvyi Rih». The work resulted in development of the rapid method for determination of total and remaining scale mass on the rolled coil steel
6. 2MASS Constraints on the Local Large-Scale Structure: A Challenge to LCDM?
OpenAIRE
Frith, W. J.; Shanks, T.; Outram, P. J.
2004-01-01
We investigate the large-scale structure of the local galaxy distribution using the recently completed 2 Micron All Sky Survey (2MASS). First, we determine the K-band number counts over the 4000 sq.deg. APM survey area where evidence for a large-scale local hole' has previously been detected and compare them to a homogeneous prediction. Considering a LCDM form for the 2-point angular correlation function, the observed deficiency represents a 5 sigma fluctuation in the galaxy distribution. We...
7. Vacuum stability with tachyonic boundary Higgs masses in no-scale supersymmetry or gaugino mediation
International Nuclear Information System (INIS)
Evans, Jason L.; Wells, James D.; Morrissey, David E.
2009-01-01
No-scale supersymmetry or gaugino mediation augmented with large negative Higgs soft masses at the input scale provides a simple solution to the supersymmetric flavor problem while giving rise to a neutralino lightest superpartner particle. However, to obtain a neutralino lightest superpartner particle it is often necessary to have tachyonic input Higgs soft masses that can give rise to charge-and-color-breaking minima and unbounded-from-below directions in the low-energy theory. We investigate the vacuum structure in these theories to determine when such problematic features are present. When the standard electroweak vacuum is only metastable, we compute its lifetime under vacuum tunneling. We find that vacuum metastability leads to severe restrictions on the parameter space for larger tanβ∼30, while for smaller tanβ∼10, only minor restrictions are found. Along the way, we derive an exact bounce solution for tunneling through an inverted parabolic potential.
8. Vacuum Stability with Tachyonic Boundary Higgs Masses in No-Scale Supersymmetry or Gaugino Mediation
CERN Document Server
Evans, Jason L; Wells, James D
2009-01-01
No-scale supersymmetry or gaugino mediation augmented with large negative Higgs soft masses at the input scale provides a simple solution to the supersymmetric flavor problem while giving rise to a neutralino LSP. However, to obtain a neutralino LSP it is often necessary to have tachyonic input Higgs soft masses that can give rise to charge-and-color-breaking (CCB) minima and unbounded-from-below (UFB) directions in the low energy theory. We investigate the vacuum structure in these theories to determine when such problematic features are present. When the standard electroweak vacuum is only metastable, we compute its lifetime under vacuum tunneling. We find that vacuum metastability leads to severe restrictions on the parameter space for larger $\\tan\\beta \\sim 30$, while for smaller $\\tan\\beta\\sim 10$, only minor restrictions are found. Along the way, we derive an exact bounce solution for tunneling through an inverted parabolic potential.
9. Large scale mass redistribution and surface displacement from GRACE and SLR
Science.gov (United States)
Cheng, M.; Ries, J. C.; Tapley, B. D.
2012-12-01
Mass transport between the atmosphere, ocean and solid earth results in the temporal variations in the Earth gravity field and loading induced deformation of the Earth. Recent space-borne observations, such as GRACE mission, are providing extremely high precision temporal variations of gravity field. The results from 10-yr GRACE data has shown a significant annual variations of large scale vertical and horizontal displacements occurring over the Amazon, Himalayan region and South Asia, African, and Russian with a few mm amplitude. Improving understanding from monitoring and modeling of the large scale mass redistribution and the Earth's response are a critical for all studies in the geosciences, in particular for determination of Terrestrial Reference System (TRS), including geocenter motion. This paper will report results for the observed seasonal variations in the 3-dimentional surface displacements of SLR and GPS tracking stations and compare with the prediction from time series of GRACE monthly gravity solution.
10. On the MSSM Higgsino mass and fine tuning
CERN Document Server
Ross, Graham G.
2016-08-10
It is often argued that low fine tuning in the MSSM necessarily requires a rather light Higgsino. In this note we show that this need not be the case when a more complete set of soft SUSY breaking mass terms are included. In particular an Higgsino mass term, that correlates the $\\mu-$term contribution with the soft SUSY-breaking Higgsino masses, significantly reduces the fine tuning even for Higgsinos in the TeV mass range where its relic abundance means it can make up all the dark matter.
11. Sgoldstino-less inflation and low energy SUSY breaking
Energy Technology Data Exchange (ETDEWEB)
Argurio, Riccardo [Physique Théorique et Mathématique and International Solvay Institutes, Université Libre de Bruxelles, CP231, B-1050 Brussels (Belgium); Coone, Dries; Mariotti, Alberto [Theoretische Natuurkunde and IIHE/ELEM, Vrije Universiteit Brussel, and International Solvay Institutes, Pleinlaan 2, B-1050 Brussels (Belgium); Heurtier, Lucien, E-mail: [email protected], E-mail: [email protected], E-mail: [email protected], E-mail: [email protected] [Service de Physique Théorique, Université Libre de Bruxelles, CP225, B-1050 Brussels (Belgium)
2017-07-01
We assess the range of validity of sgoldstino-less inflation in a scenario of low energy supersymmetry breaking. We first analyze the consistency conditions that an effective theory of the inflaton and goldstino superfields should satisfy in order to be faithfully described by a sgoldstino-less model. Enlarging the scope of previous studies, we investigate the case where the effective field theory cut-off, and hence also the sgoldstino mass, are inflaton-dependent. We then introduce a UV complete model where one can realize successfully sgoldstino-less inflation and gauge mediation of supersymmetry breaking, combining the α-attractor mechanism and a weakly coupled model of spontaneous breaking of supersymmetry. In this class of models we find that, given current limits on superpartner masses, the gravitino mass has a lower bound of the order of the MeV, i.e. we cannot reach very low supersymmetry breaking scales. On the plus side, we recognize that in this framework, one can derive the complete superpartner spectrum as well as compute inflation observables, the reheating temperature, and address the gravitino overabundance problem. We then show that further constraints come from collider results and inflation observables. Their non trivial interplay seems a staple feature of phenomenological studies of supersymmetric inflationary models.
12. Starobinsky-like inflation and neutrino masses in a no-scale SO(10) model
Energy Technology Data Exchange (ETDEWEB)
Ellis, John [Theoretical Particle Physics and Cosmology Group,Department of Physics, King’s College London, WC2R 2LS London (United Kingdom); Theoretical Physics Department, CERN,CH-1211 Geneva 23 (Switzerland); Garcia, Marcos A.G. [Physics and Astronomy Department, Rice University,6100 Main Street, Houston, TX 77005 (United States); Nagata, Natsumi [Department of Physics, University of Tokyo,Bunkyo-ku, Tokyo 113-0033 (Japan); Nanopoulos, Dimitri V. [George P. and Cynthia W. Mitchell Institute for Fundamental Physics and Astronomy,Texas A& M University, College Station, 77843 Texas (United States); Olive, Keith A. [William I. Fine Theoretical Physics Institute, School of Physics and Astronomy, University of Minnesota,116 Church Street SE, Minneapolis, MN 55455 (United States)
2016-11-08
Using a no-scale supergravity framework, we construct an SO(10) model that makes predictions for cosmic microwave background observables similar to those of the Starobinsky model of inflation, and incorporates a double-seesaw model for neutrino masses consistent with oscillation experiments and late-time cosmology. We pay particular attention to the behaviour of the scalar fields during inflation and the subsequent reheating.
13. Hydrogen-antihydrogen oscillations: Signature of intermediate mass scales in GUTs
Directory of Open Access Journals (Sweden)
Uptal Sarkar
1983-01-01
Full Text Available Hydrogen-antihydrogen oscillations and the double nucleon decay (pp, np and nn into two antileptons are discussed in the context of SO(10, E(6 and SU(16 GUTs. It is shown that the intermediate mass scales of the GUTs concerned govern the amplitude of these processes which are found to compete with the other baryon nonconserving processes in SU(16 GUT.
14. Starobinsky-Like Inflation and Neutrino Masses in a No-Scale SO(10) Model
CERN Document Server
Ellis, John
2016-11-08
Using a no-scale supergravity framework, we construct an SO(10) model that makes predictions for cosmic microwave background observables similar to those of the Starobinsky model of inflation, and incorporates a double-seesaw model for neutrino masses consistent with oscillation experiments and late-time cosmology. We pay particular attention to the behaviour of the scalar fields during inflation and the subsequent reheating.
15. Renormalization group and relations between scattering amplitudes in a theory with different mass scales
International Nuclear Information System (INIS)
Gulov, A.V.; Skalozub, V.V.
2000-01-01
In the Yukawa model with two different mass scales the renormalization group equation is used to obtain relations between scattering amplitudes at low energies. Considering fermion-fermion scattering as an example, a basic one-loop renormalization group relation is derived which gives possibility to reduce the problem to the scattering of light particles on the external field substituting a heavy virtual state. Applications of the results to problem of searching new physics beyond the Standard Model are discussed [ru
16. GUT scale threshold corrections in a complete supersymmetric SO(10) model: αs(MZ) versus proton lifetime
International Nuclear Information System (INIS)
Lucas, V.; Raby, S.
1996-01-01
We show that one-loop GUT scale threshold corrections to gauge couplings are a significant constraint on the GUT symmetry-breaking sector of the theory. The one-loop threshold corrections relate the prediction for α s (M Z ) to the proton lifetime. We have calculated these corrections in a new complete SO(10) SUSY GUT. The results are consistent with the low-energy measurement of α s (M Z ). We have also calculated the proton lifetime and branching ratios in this model. We show that proton decay rates provide a powerful test for theories of fermion masses. copyright 1996 The American Physical Society
17. The BSM-AI project: SUSY-AI-generalizing LHC limits on supersymmetry with machine learning
Energy Technology Data Exchange (ETDEWEB)
Caron, Sascha [Radboud Universiteit, Institute for Mathematics, Astro- and Particle Physics IMAPP, Nijmegen (Netherlands); Nikhef, Amsterdam (Netherlands); Kim, Jong Soo [UAM/CSIC, Instituto de Fisica Teorica, Madrid (Spain); Rolbiecki, Krzysztof [UAM/CSIC, Instituto de Fisica Teorica, Madrid (Spain); University of Warsaw, Faculty of Physics, Warsaw (Poland); Ruiz de Austri, Roberto [IFIC-UV/CSIC, Instituto de Fisica Corpuscular, Valencia (Spain); Stienen, Bob [Radboud Universiteit, Institute for Mathematics, Astro- and Particle Physics IMAPP, Nijmegen (Netherlands)
2017-04-15
A key research question at the Large Hadron Collider is the test of models of new physics. Testing if a particular parameter set of such a model is excluded by LHC data is a challenge: it requires time consuming generation of scattering events, simulation of the detector response, event reconstruction, cross section calculations and analysis code to test against several hundred signal regions defined by the ATLAS and CMS experiments. In the BSM-AI project we approach this challenge with a new idea. A machine learning tool is devised to predict within a fraction of a millisecond if a model is excluded or not directly from the model parameters. A first example is SUSY-AI, trained on the phenomenological supersymmetric standard model (pMSSM). About 300, 000 pMSSM model sets - each tested against 200 signal regions by ATLAS - have been used to train and validate SUSY-AI. The code is currently able to reproduce the ATLAS exclusion regions in 19 dimensions with an accuracy of at least 93%. It has been validated further within the constrained MSSM and the minimal natural supersymmetric model, again showing high accuracy. SUSY-AI and its future BSM derivatives will help to solve the problem of recasting LHC results for any model of new physics. SUSY-AI can be downloaded from http://susyai.hepforge.org/. An on-line interface to the program for quick testing purposes can be found at http://www.susy-ai.org/. (orig.)
18. The BSM-AI project: SUSY-AI-generalizing LHC limits on supersymmetry with machine learning
International Nuclear Information System (INIS)
Caron, Sascha; Kim, Jong Soo; Rolbiecki, Krzysztof; Ruiz de Austri, Roberto; Stienen, Bob
2017-01-01
A key research question at the Large Hadron Collider is the test of models of new physics. Testing if a particular parameter set of such a model is excluded by LHC data is a challenge: it requires time consuming generation of scattering events, simulation of the detector response, event reconstruction, cross section calculations and analysis code to test against several hundred signal regions defined by the ATLAS and CMS experiments. In the BSM-AI project we approach this challenge with a new idea. A machine learning tool is devised to predict within a fraction of a millisecond if a model is excluded or not directly from the model parameters. A first example is SUSY-AI, trained on the phenomenological supersymmetric standard model (pMSSM). About 300, 000 pMSSM model sets - each tested against 200 signal regions by ATLAS - have been used to train and validate SUSY-AI. The code is currently able to reproduce the ATLAS exclusion regions in 19 dimensions with an accuracy of at least 93%. It has been validated further within the constrained MSSM and the minimal natural supersymmetric model, again showing high accuracy. SUSY-AI and its future BSM derivatives will help to solve the problem of recasting LHC results for any model of new physics. SUSY-AI can be downloaded from http://susyai.hepforge.org/. An on-line interface to the program for quick testing purposes can be found at http://www.susy-ai.org/. (orig.)
19. Neutrino masses and a low breaking scale of left-right symmetry
International Nuclear Information System (INIS)
2002-01-01
In left-right symmetric models (LRSMs) the light neutrino masses arise from two sources: the seesaw mechanism and a vacuum expectation value of an SU(2) L triplet. If the left-right symmetry breaking v R is low, v R (less-or-similar sign)15 TeV, the contributions to the light neutrino masses from both the seesaw mechanism and the triplet Yukawa couplings are expected to be well above the experimental bounds. We present a minimal LRSM with an additional U(1) symmetry in which the masses induced by the two sources are below the eV scale and the twofold problem is solved. We further show that, if the U(1) symmetry is also responsible for the lepton flavor structure, the model yields a small mixing angle within the first two lepton generations
20. Studies on reducing the scale of a double focusing mass spectrometer
International Nuclear Information System (INIS)
Chambers, D.M.; Gregg, H.R.; Andresen, B.D.
1993-05-01
Several groups have developed miniaturized sector mass spectrometers with the goal of remote sensing in confined spaces or portability. However, these achievements have been overshadowed by more successful development of man-portable quadrupole and ion trap mass spectrometers. Despite these accomplishments the development of a reduced-scale sector mass spectrometer remains attractive as a potentially low-cost, robust instrument requiring very simple electronics and low power. Previous studies on miniaturizing sector instruments include the use of a Mattauch-Herzog design for a portable mass spectrograph weighing less than 10 kg. Other work has included the use of a Nier-Johnson design in spacecraft-mountable gas chromatography mass spectrometers for the Viking spacecraft as well as miniature sector-based MS/MS instrument. Although theory for designing an optimized system with high resolution and mass accuracy is well understood, such specifications have not yet been achieved in a miniaturized instrument. To proceed further toward the development of a miniaturized sector mass spectrometer, experiments were conducted to understand and optimize a practical, yet nonideal instrument configuration. The sector mass spectrometer studied in this work is similar to the ones developed for the Viking project, but was further modified to be low cost, simple and robust. Characteristics of this instrument that highlight its simplicity include the use of a modified Varian leak detector ion source, source ion optics that use one extraction voltage, and an unshunted fixed nonhomogeneous magnetic sector. The effects of these design simplifications on ion trajectory were studied by manipulating the ion beam along with the magnetic sector position. This latter feature served as an aid to study ion focusing amidst fringing fields as well as nonhomogeneous forces and permitted empirical realignment of the instrument
1. On a generalized Dirac oscillator interaction for the nonrelativistic limit 3 D generalized SUSY model oscillator Hamiltonian of Celka and Hussin
International Nuclear Information System (INIS)
Jayaraman, Jambunatha; Lima Rodrigues, R. de
1994-01-01
In the context of the 3 D generalized SUSY model oscillator Hamiltonian of Celka and Hussin (CH), a generalized Dirac oscillator interaction is studied, that leads, in the non-relativistic limit considered for both signs of energy, to the CH's generalized 3 D SUSY oscillator. The relevance of this interaction to the CH's SUSY model and the SUSY breaking dependent on the Wigner parameter is brought out. (author). 6 refs
2. Large-scale subduction of continental crust implied by India-Asia mass-balance calculation
Science.gov (United States)
Ingalls, Miquela; Rowley, David B.; Currie, Brian; Colman, Albert S.
2016-11-01
Continental crust is buoyant compared with its oceanic counterpart and resists subduction into the mantle. When two continents collide, the mass balance for the continental crust is therefore assumed to be maintained. Here we use estimates of pre-collisional crustal thickness and convergence history derived from plate kinematic models to calculate the crustal mass balance in the India-Asia collisional system. Using the current best estimates for the timing of the diachronous onset of collision between India and Eurasia, we find that about 50% of the pre-collisional continental crustal mass cannot be accounted for in the crustal reservoir preserved at Earth's surface today--represented by the mass preserved in the thickened crust that makes up the Himalaya, Tibet and much of adjacent Asia, as well as southeast Asian tectonic escape and exported eroded sediments. This implies large-scale subduction of continental crust during the collision, with a mass equivalent to about 15% of the total oceanic crustal subduction flux since 56 million years ago. We suggest that similar contamination of the mantle by direct input of radiogenic continental crustal materials during past continent-continent collisions is reflected in some ocean crust and ocean island basalt geochemistry. The subduction of continental crust may therefore contribute significantly to the evolution of mantle geochemistry.
3. Split-Family SUSY, U(2)^5 Flavour Symmetry and Neutrino Physics
CERN Document Server
Jones-Pérez, Joel
2014-01-01
In split-family SUSY, one can use a U(2)^3 symmetry to protect flavour observables in the quark sector from SUSY contributions. However, attempts to extend this procedure to the lepton sector by using an analogous U(2)^5 symmetry fail to reproduce the neutrino data without introducing some form of fine-tuning. In this work, we solve this problem by shifting the U(2)^2 symmetry acting on leptons towards the second and third generations. This allows neutrino data to be reproduced without much difficulties, as well as protecting the leptonic flavour observables from SUSY. Key signatures are a $\\mu\\to e\\gamma$ branching ratio possibly observable in the near future, as well as having selectrons as the lightest sleptons.
4. Deletion analysis of susy-sl promoter for the identification of optimal promoter sequence
International Nuclear Information System (INIS)
Bacha, S.; Khatoon, A.; Asif, M.; Bshir, A.
2015-01-01
The promoter region of sucrose synthase (susy-Sl) was identified and isolated from tomato. The 5? deletion analysis was carried out for the identification of minimum optimal promoter. Transgenic lines of Arabidopsis thaliana were developed by floral dip method incorporating various promoter deletion cassettes controlling GUS reporter gene. GUS assay of transgenic tissues indicated that full length susy-Sl promoter and its deletion mutants were constitutively expressed in vegetative and floral tissues of A. thaliana. The expression was observed in roots, shoots and flowers of A. thaliana. Analysis of 5? deletion series of susy-Sl promoter showed that a minimum of 679 bp fragment of the promoter was sufficient to drive expression of GUS reporter gene in the major tissues of transgenic A. thaliana. (author)
5. Towards N = 2 SUSY homogeneous quantum cosmology; Einstein-Yang-Mills systems
International Nuclear Information System (INIS)
Donets, E.E.; Tentyukov, M.N.; Tsulaya, M.M.
1998-01-01
The application of N = 2 supersymmetric Quantum Mechanics for the quantization of homogeneous systems coupled with gravity is discussed. Starting with the superfield formulation of N = 2 SUSY sigma-model, Hermitian self-adjoint expressions for quantum Hamiltonians and Lagrangians for any signature of a sigma-model metric are obtained. This approach is then applied to coupled SU (2) Einstein-Yang-Mills (EYM) systems in axially-symmetric Bianchi - I,II,VIII, IX, Kantowski-Sachs and closed Friedmann-Robertson-Walker cosmological models. It is shown that all these models admit the embedding into N = 2 SUSY sigma-model with the explicit expressions for superpotentials, being direct sums of gravitational and Yang-Mills (YM) parts. In addition, YM parts of superpotentials exactly coincide with the corresponding Chern-Simons terms. The spontaneous SUSY breaking, caused by YM instantons in EYM systems is discussed in a number of examples
6. Large-Scale Ichthyoplankton and Water Mass Distribution along the South Brazil Shelf
Science.gov (United States)
de Macedo-Soares, Luis Carlos Pinto; Garcia, Carlos Alberto Eiras; Freire, Andrea Santarosa; Muelbert, José Henrique
2014-01-01
Ichthyoplankton is an essential component of pelagic ecosystems, and environmental factors play an important role in determining its distribution. We have investigated simultaneous latitudinal and cross-shelf gradients in ichthyoplankton abundance to test the hypothesis that the large-scale distribution of fish larvae in the South Brazil Shelf is associated with water mass composition. Vertical plankton tows were collected between 21°27′ and 34°51′S at 107 stations, in austral late spring and early summer seasons. Samples were taken with a conical-cylindrical plankton net from the depth of chlorophyll maxima to the surface in deep stations, or from 10 m from the bottom to the surface in shallow waters. Salinity and temperature were obtained with a CTD/rosette system, which provided seawater for chlorophyll-a and nutrient concentrations. The influence of water mass on larval fish species was studied using Indicator Species Analysis, whereas environmental effects on the distribution of larval fish species were analyzed by Distance-based Redundancy Analysis. Larval fish species were associated with specific water masses: in the north, Sardinella brasiliensis was found in Shelf Water; whereas in the south, Engraulis anchoita inhabited the Plata Plume Water. At the slope, Tropical Water was characterized by the bristlemouth Cyclothone acclinidens. The concurrent analysis showed the importance of both cross-shelf and latitudinal gradients on the large-scale distribution of larval fish species. Our findings reveal that ichthyoplankton composition and large-scale spatial distribution are determined by water mass composition in both latitudinal and cross-shelf gradients. PMID:24614798
7. Large-scale ichthyoplankton and water mass distribution along the South Brazil Shelf.
Directory of Open Access Journals (Sweden)
Luis Carlos Pinto de Macedo-Soares
Full Text Available Ichthyoplankton is an essential component of pelagic ecosystems, and environmental factors play an important role in determining its distribution. We have investigated simultaneous latitudinal and cross-shelf gradients in ichthyoplankton abundance to test the hypothesis that the large-scale distribution of fish larvae in the South Brazil Shelf is associated with water mass composition. Vertical plankton tows were collected between 21°27' and 34°51'S at 107 stations, in austral late spring and early summer seasons. Samples were taken with a conical-cylindrical plankton net from the depth of chlorophyll maxima to the surface in deep stations, or from 10 m from the bottom to the surface in shallow waters. Salinity and temperature were obtained with a CTD/rosette system, which provided seawater for chlorophyll-a and nutrient concentrations. The influence of water mass on larval fish species was studied using Indicator Species Analysis, whereas environmental effects on the distribution of larval fish species were analyzed by Distance-based Redundancy Analysis. Larval fish species were associated with specific water masses: in the north, Sardinella brasiliensis was found in Shelf Water; whereas in the south, Engraulis anchoita inhabited the Plata Plume Water. At the slope, Tropical Water was characterized by the bristlemouth Cyclothone acclinidens. The concurrent analysis showed the importance of both cross-shelf and latitudinal gradients on the large-scale distribution of larval fish species. Our findings reveal that ichthyoplankton composition and large-scale spatial distribution are determined by water mass composition in both latitudinal and cross-shelf gradients.
8. Large-scale ichthyoplankton and water mass distribution along the South Brazil Shelf.
Science.gov (United States)
de Macedo-Soares, Luis Carlos Pinto; Garcia, Carlos Alberto Eiras; Freire, Andrea Santarosa; Muelbert, José Henrique
2014-01-01
Ichthyoplankton is an essential component of pelagic ecosystems, and environmental factors play an important role in determining its distribution. We have investigated simultaneous latitudinal and cross-shelf gradients in ichthyoplankton abundance to test the hypothesis that the large-scale distribution of fish larvae in the South Brazil Shelf is associated with water mass composition. Vertical plankton tows were collected between 21°27' and 34°51'S at 107 stations, in austral late spring and early summer seasons. Samples were taken with a conical-cylindrical plankton net from the depth of chlorophyll maxima to the surface in deep stations, or from 10 m from the bottom to the surface in shallow waters. Salinity and temperature were obtained with a CTD/rosette system, which provided seawater for chlorophyll-a and nutrient concentrations. The influence of water mass on larval fish species was studied using Indicator Species Analysis, whereas environmental effects on the distribution of larval fish species were analyzed by Distance-based Redundancy Analysis. Larval fish species were associated with specific water masses: in the north, Sardinella brasiliensis was found in Shelf Water; whereas in the south, Engraulis anchoita inhabited the Plata Plume Water. At the slope, Tropical Water was characterized by the bristlemouth Cyclothone acclinidens. The concurrent analysis showed the importance of both cross-shelf and latitudinal gradients on the large-scale distribution of larval fish species. Our findings reveal that ichthyoplankton composition and large-scale spatial distribution are determined by water mass composition in both latitudinal and cross-shelf gradients.
9. Kinematic scaling relations of CALIFA galaxies: A dynamical mass proxy for galaxies across the Hubble sequence.
Science.gov (United States)
Aquino-Ortíz, E.; Valenzuela, O.; Sánchez, S. F.; Hernández-Toledo, H.; Ávila-Reese, V.; van de Ven, G.; Rodríguez-Puebla, A.; Zhu, L.; Mancillas, B.; Cano-Díaz, M.; García-Benito, R.
2018-06-01
We used ionized gas and stellar kinematics for 667 spatially resolved galaxies publicly available from the Calar Alto Legacy Integral Field Area survey (CALIFA) 3rd Data Release with the aim of studying kinematic scaling relations as the Tully & Fisher (TF) relation using rotation velocity, Vrot, the Faber & Jackson (FJ) relation using velocity dispersion, σ, and also a combination of Vrot and σ through the SK parameter defined as SK^2 = KV_{rot}^2 + σ ^2 with constant K. Late-type and early-type galaxies reproduce the TF and FJ relations. Some early-type galaxies also follow the TF relation and some late-type galaxies the FJ relation, but always with larger scatter. On the contrary, when we use the SK parameter, all galaxies, regardless of the morphological type, lie on the same scaling relation, showing a tight correlation with the total stellar mass, M⋆. Indeed, we find that the scatter in this relation is smaller or equal to that of the TF and FJ relations. We explore different values of the K parameter without significant differences (slope and scatter) in our final results with respect the case K = 0.5 besides than a small change in the zero point. We calibrate the kinematic SK^2 dynamical mass proxy in order to make it consistent with sophisticated published dynamical models within 0.15 dex. We show that the SK proxy is able to reproduce the relation between the dynamical mass and the stellar mass in the inner regions of galaxies. Our result may be useful in order to produce fast estimations of the central dynamical mass in galaxies and to study correlations in large galaxy surveys.
10. Strong orientation dependence of surface mass density profiles of dark haloes at large scales
Science.gov (United States)
Osato, Ken; Nishimichi, Takahiro; Oguri, Masamune; Takada, Masahiro; Okumura, Teppei
2018-06-01
We study the dependence of surface mass density profiles, which can be directly measured by weak gravitational lensing, on the orientation of haloes with respect to the line-of-sight direction, using a suite of N-body simulations. We find that, when major axes of haloes are aligned with the line-of-sight direction, surface mass density profiles have higher amplitudes than those averaged over all halo orientations, over all scales from 0.1 to 100 Mpc h-1 we studied. While the orientation dependence at small scales is ascribed to the halo triaxiality, our results indicate even stronger orientation dependence in the so-called two-halo regime, up to 100 Mpc h-1. The orientation dependence for the two-halo term is well approximated by a multiplicative shift of the amplitude and therefore a shift in the halo bias parameter value. The halo bias from the two-halo term can be overestimated or underestimated by up to {˜ } 30 per cent depending on the viewing angle, which translates into the bias in estimated halo masses by up to a factor of 2 from halo bias measurements. The orientation dependence at large scales originates from the anisotropic halo-matter correlation function, which has an elliptical shape with the axis ratio of ˜0.55 up to 100 Mpc h-1. We discuss potential impacts of halo orientation bias on other observables such as optically selected cluster samples and a clustering analysis of large-scale structure tracers such as quasars.
11. Seesaw induced electroweak scale, the hierarchy problem and sub-eV neutrino masses
International Nuclear Information System (INIS)
Atwood, D.; Bar-Shalom, S.; Soni, A.
2006-01-01
We describe a model for the scalar sector where all interactions occur either at an ultra-high scale, Λ U ∝10 16 -10 19 GeV, or at an intermediate scale, Λ I =10 9 -10 11 GeV. The interaction of physics on these two scales results in an SU(2) Higgs condensate at the electroweak (EW) scale, Λ EW , through a seesaw-like Higgs mechanism, Λ EW ∝Λ I 2 /Λ U , while the breaking of the SM SU(2) x U(1) gauge symmetry occurs at the intermediate scale Λ I . The EW scale is, therefore, not fundamental but is naturally generated in terms of ultra-high energy phenomena and so the hierarchy problem is alleviated. We show that the class of such ''seesaw Higgs'' models predict the existence of sub-eV neutrino masses which are generated through a ''two-step'' seesaw mechanism in terms of the same two ultra-high scales: m ν ∝Λ I 4 /Λ U 3 ∝Λ EW 2 /Λ U . The neutrinos can be either Dirac or Majorana, depending on the structure of the scalar potential. We also show that our seesaw Higgs model can be naturally embedded in theories with tiny extra dimensions of size R∝Λ U -1 ∝10 -16 fm, where the seesaw induced EW scale arises from a violation of a symmetry at a distant brane; in particular, in the scenario presented there are seven tiny extra dimensions. (orig.)
12. Identification of hadronic τ decays and observation potentional of CP-violating effects in SUSY at ATLAS
International Nuclear Information System (INIS)
Gosdzik, Bjoern
2011-03-01
In November 2009 the ATLAS experiment started operation at the Large Hadron Collider (LHC) at CERN. The detector is optimized to search for the Higgs Boson and new physics at the TeV scale. Until the end of the data-taking period with proton-proton collisions on November 3rd, 2010, the ATLAS detector recorded an integrated luminosity of 45.0 pb -1 at a center-of-mass energy of √(s) = 7 TeV. In many signals of the Standard Model and new physics (e.g. SUSY and Higgs) τ-leptons play an important role. A cut-based approach for the identification of hadronically decaying τ-leptons is being used, particularly for the first data-taking period. Using Monte Carlo Data, the development of a cut-based identification method for hadronically decaying τ-lepton with the ATLAS detector at the Large Hadron Collider (LHC) with a center-of-mass energy of √(s) = 14 TeV is presented. The separation of signal and the large QCD jet background is a challenge to the identification of hadronically decaying τ-lepton. The identification is separated into two methods: the calorimeter-based method uses exclusive calorimeter information, while the calorimeter+track-based method combines calorimeter and tracking information. The cut optimization is separately accomplished for τ candidates with one charged decay product (1-prong) and τ candidates with three charged decay products (3-prong). Additionally the optimisation is split into bins of the visible transverse energy of the τ candidate (E T vis ). First of all the optimization is presented and afterwards the performance of the cut-based identification method is discussed. The reconstruction efficiency for τ-leptons is determined by comparing first data corresponding to an integrated luminosity of 244 nb -1 and Monte Carlo simulation. The effect of systematic uncertainties is investigated. The CP violation predicted by the Standard Model is not sufficient to explain the matter - anti-matter asymmetry in the universe of the order of
13. Identification of hadronic {tau} decays and observation potentional of CP-violating effects in SUSY at ATLAS
Energy Technology Data Exchange (ETDEWEB)
Gosdzik, Bjoern
2011-03-15
In November 2009 the ATLAS experiment started operation at the Large Hadron Collider (LHC) at CERN. The detector is optimized to search for the Higgs Boson and new physics at the TeV scale. Until the end of the data-taking period with proton-proton collisions on November 3rd, 2010, the ATLAS detector recorded an integrated luminosity of 45.0 pb{sup -1} at a center-of-mass energy of {radical}(s) = 7 TeV. In many signals of the Standard Model and new physics (e.g. SUSY and Higgs) {tau}-leptons play an important role. A cut-based approach for the identification of hadronically decaying {tau}-leptons is being used, particularly for the first data-taking period. Using Monte Carlo Data, the development of a cut-based identification method for hadronically decaying {tau}-lepton with the ATLAS detector at the Large Hadron Collider (LHC) with a center-of-mass energy of {radical}(s) = 14 TeV is presented. The separation of signal and the large QCD jet background is a challenge to the identification of hadronically decaying {tau}-lepton. The identification is separated into two methods: the calorimeter-based method uses exclusive calorimeter information, while the calorimeter+track-based method combines calorimeter and tracking information. The cut optimization is separately accomplished for {tau} candidates with one charged decay product (1-prong) and {tau} candidates with three charged decay products (3-prong). Additionally the optimisation is split into bins of the visible transverse energy of the {tau} candidate (E{sub T}{sup vis}). First of all the optimization is presented and afterwards the performance of the cut-based identification method is discussed. The reconstruction efficiency for {tau}-leptons is determined by comparing first data corresponding to an integrated luminosity of 244 nb{sup -1} and Monte Carlo simulation. The effect of systematic uncertainties is investigated. The CP violation predicted by the Standard Model is not sufficient to explain the matter
14. Identification of hadronic {tau} decays and observation potentional of CP-violating effects in SUSY at ATLAS
Energy Technology Data Exchange (ETDEWEB)
Gosdzik, Bjoern
2011-03-15
In November 2009 the ATLAS experiment started operation at the Large Hadron Collider (LHC) at CERN. The detector is optimized to search for the Higgs Boson and new physics at the TeV scale. Until the end of the data-taking period with proton-proton collisions on November 3rd, 2010, the ATLAS detector recorded an integrated luminosity of 45.0 pb{sup -1} at a center-of-mass energy of {radical}(s) = 7 TeV. In many signals of the Standard Model and new physics (e.g. SUSY and Higgs) {tau}-leptons play an important role. A cut-based approach for the identification of hadronically decaying {tau}-leptons is being used, particularly for the first data-taking period. Using Monte Carlo Data, the development of a cut-based identification method for hadronically decaying {tau}-lepton with the ATLAS detector at the Large Hadron Collider (LHC) with a center-of-mass energy of {radical}(s) = 14 TeV is presented. The separation of signal and the large QCD jet background is a challenge to the identification of hadronically decaying {tau}-lepton. The identification is separated into two methods: the calorimeter-based method uses exclusive calorimeter information, while the calorimeter+track-based method combines calorimeter and tracking information. The cut optimization is separately accomplished for {tau} candidates with one charged decay product (1-prong) and {tau} candidates with three charged decay products (3-prong). Additionally the optimisation is split into bins of the visible transverse energy of the {tau} candidate (E{sub T}{sup vis}). First of all the optimization is presented and afterwards the performance of the cut-based identification method is discussed. The reconstruction efficiency for {tau}-leptons is determined by comparing first data corresponding to an integrated luminosity of 244 nb{sup -1} and Monte Carlo simulation. The effect of systematic uncertainties is investigated. The CP violation predicted by the Standard Model is not sufficient to explain the matter
15. Testing feasibility of scalar-tensor gravity by scale dependent mass and coupling to matter
International Nuclear Information System (INIS)
Mota, D. F.; Salzano, V.; Capozziello, S.
2011-01-01
We investigate whether there is any cosmological evidence for a scalar field with a mass and coupling to matter which change accordingly to the properties of the astrophysical system it ''lives in,'' without directly focusing on the underlying mechanism that drives the scalar field scale-dependent-properties. We assume a Yukawa type of coupling between the field and matter and also that the scalar-field mass grows with density, in order to overcome all gravity constraints within the Solar System. We analyze three different gravitational systems assumed as ''cosmological indicators'': supernovae type Ia, low surface brightness spiral galaxies and clusters of galaxies. Results show (i) a quite good fit to the rotation curves of low surface brightness galaxies only using visible stellar and gas-mass components is obtained; (ii) a scalar field can fairly well reproduce the matter profile in clusters of galaxies, estimated by x-ray observations and without the need of any additional dark matter; and (iii) there is an intrinsic difficulty in extracting information about the possibility of a scale-dependent massive scalar field (or more generally about a varying gravitational constant) from supernovae type Ia.
16. Mass transfer processes and field-scale transport of organic solutes
International Nuclear Information System (INIS)
Brusseau, M.L.
1990-01-01
The influence of mass transfer processes, such as sorption/desorption and mass transfer between immiscible liquids and water, on the transport of organic solutes is discussed. Rate-limited sorption of organic solutes caused by a diffusion-constrained mechanism is shown to be significant under laboratory conditions. The significance of the impact of nonequilibrium sorption on field-scale transport is scale dependent. The impact of organic liquids on mass transfer and transport of organic solutes depends upon the nature of the solute and the nature and form of the organic liquid. For example, while retardation of nonionic solutes is decreased in mixed-solvent systems, (i.e. systems comprised of water and a miscible organic liquid or an immiscible liquid present in concentrations below phase separation), the retardation of organic acids may, in some cases, increase with addition of a cosolvent. While the presence of an immiscible liquid existing as a mobile phase will reduce retention of organic solutes, the presence of residual saturation of an immiscible liquid can significantly increase retention. A model is presented that incorporates the effects of retention resulting from residual saturation, as well as nonequilibrium sorption, on the transport of organic solutes. (Author) (70 refs., 3 figs.)
17. Hierarchy of symmetry-breaking scales in SO(10) grand unification and particle masses
International Nuclear Information System (INIS)
Asatryan, G.M.; Ioannisyan, A.N.
1987-01-01
An SO(10) grand unification model is proposed in which the introduction of an additional discrete symmetry solves the problem of the quark mass spectrum arising in SO(10) breaking schemes with intermediate SU(4) x SU(2)/sub L/ x SU(2)/sub R/ or SU(3)/sub C/ x U(1)/sub B//sub -//sub L/ x SU(2)/sub L/ x SU(2)/sub R/ symmetry. When the breaking of this discrete symmetry is taken into account the condition that there exist only a single light Higgs boson leads to a relation between the b- and t-quark masses which makes it possible to fix the ratio of the grand unification scale M/sub X/ and the quark--lepton symmetry-breaking scale M/sub C/. The specific values of M/sub X/ and M/sub C/ and also the scale of the SU(2)/sub R/ symmetry breaking M/sub R/ depend on the experimental value of the Weinberg angle and are in agreement with the experimental data on proton decay
18. Neutrino Mass and Flavour Models
International Nuclear Information System (INIS)
King, Stephen F.
2010-01-01
We survey some of the recent promising developments in the search for the theory behind neutrino mass and tri-bimaximal mixing, and indeed all fermion masses and mixing. We focus in particular on models with discrete family symmetry and unification, and show how such models can also solve the SUSY flavour and CP problems. We also discuss the theoretical implications of the measurement of a non-zero reactor angle, as hinted at by recent experimental measurements.
19. ON THE ASSEMBLY OF THE MILKY WAY DWARF SATELLITES AND THEIR COMMON MASS SCALE
International Nuclear Information System (INIS)
Rashkov, Valery; Madau, Piero; Kuhlen, Michael; Diemand, Jürg
2012-01-01
We use a particle tagging technique to dynamically populate the N-body Via Lactea II high-resolution simulation with stars. The method is calibrated using the observed luminosity function of Milky Way (MW) satellites and the concentration of their stellar populations, and self-consistently follows the accretion and disruption of progenitor dwarfs and the buildup of the stellar halo in a cosmological 'live host'. Simple prescriptions for assigning stellar populations to collisionless particles are able to reproduce many properties of the observed MW halo and its surviving dwarf satellites, like velocity dispersions, sizes, brightness profiles, metallicities, and spatial distribution. Our model predicts the existence of approximately 1850 subhalos harboring 'extremely faint' satellites (with mass-to-light ratios >5 × 10 3 ) lying beyond the Sloan Digital Sky Survey detection threshold. Of these, about 20 are 'first galaxies', i.e., satellites that formed a stellar mass above 10 M ☉ before redshift 9. The 10 most luminous satellites (L > 10 6 L ☉ ) in the simulation are hosted by subhalos with peak circular velocities today in the range V max = 10-40 km s –1 that have shed between 80% and 99% of their dark mass after being accreted at redshifts 1.7 max and stellar line-of-sight velocity dispersion σ los today follow the relation V max = 2.2σ los . We apply a standard mass estimation algorithm based on Jeans modeling of the line-of-sight velocity dispersion profiles to the simulated dwarf spheroidals and test the accuracy of this technique. The inner (within 300 pc) mass-luminosity relation for currently detectable satellites is nearly flat in our model, in qualitative agreement with the 'common mass scale' found in MW dwarfs. We do, however, predict a weak, but significant positive correlation for these objects: M 300 ∝L 0.088±0.024 .
20. Genetic algorithms and experimental discrimination of SUSY models
International Nuclear Information System (INIS)
Allanach, B.C.; Quevedo, F.; Grellscheid, D.
2004-01-01
We introduce genetic algorithms as a means to estimate the accuracy required to discriminate among different models using experimental observables. We exemplify the technique in the context of the minimal supersymmetric standard model. If supersymmetric particles are discovered, models of supersymmetry breaking will be fit to the observed spectrum and it is beneficial to ask beforehand: what accuracy is required to always allow the discrimination of two particular models and which are the most important masses to observe? Each model predicts a bounded patch in the space of observables once unknown parameters are scanned over. The questions can be answered by minimising a 'distance' measure between the two hypersurfaces. We construct a distance measure that scales like a constant fraction of an observable, since that is how the experimental errors are expected to scale. Genetic algorithms, including concepts such as natural selection, fitness and mutations, provide a solution to the minimisation problem. We illustrate the efficiency of the method by comparing three different classes of string models for which the above questions could not be answered with previous techniques. The required accuracy is in the range accessible to the Large Hadron Collider (LHC) when combined with a future linear collider (LC) facility. The technique presented here can be applied to more general classes of models or observables. (author)
1. Pebble-isolation mass: Scaling law and implications for the formation of super-Earths and gas giants
Science.gov (United States)
Bitsch, Bertram; Morbidelli, Alessandro; Johansen, Anders; Lega, Elena; Lambrechts, Michiel; Crida, Aurélien
2018-04-01
The growth of a planetary core by pebble accretion stops at the so-called pebble isolation mass, when the core generates a pressure bump that traps drifting pebbles outside its orbit. The value of the pebble isolation mass is crucial in determining the final planet mass. If the isolation mass is very low, gas accretion is protracted and the planet remains at a few Earth masses with a mainly solid composition. For higher values of the pebble isolation mass, the planet might be able to accrete gas from the protoplanetary disc and grow into a gas giant. Previous works have determined a scaling of the pebble isolation mass with cube of the disc aspect ratio. Here, we expand on previous measurements and explore the dependency of the pebble isolation mass on all relevant parameters of the protoplanetary disc. We use 3D hydrodynamical simulations to measure the pebble isolation mass and derive a simple scaling law that captures the dependence on the local disc structure and the turbulent viscosity parameter α. We find that small pebbles, coupled to the gas, with Stokes number τf gap at pebble isolation mass. However, as the planetary mass increases, particles must be decreasingly smaller to penetrate the pressure bump. Turbulent diffusion of particles, however, can lead to an increase of the pebble isolation mass by a factor of two, depending on the strength of the background viscosity and on the pebble size. We finally explore the implications of the new scaling law of the pebble isolation mass on the formation of planetary systems by numerically integrating the growth and migration pathways of planets in evolving protoplanetary discs. Compared to models neglecting the dependence of the pebble isolation mass on the α-viscosity, our models including this effect result in higher core masses for giant planets. These higher core masses are more similar to the core masses of the giant planets in the solar system.
2. Ultra high energy cosmic rays: clustering, GUT scale and neutrino masses
International Nuclear Information System (INIS)
Fodor, Z.
2002-01-01
The clustering of ultra high energy (above 5 · 10 19 eV) cosmic rays (UHECR) suggests that they might be emitted by compact sources. We present a statistical analysis on the source density based on the multiplicities. The propagation of UHECR protons is studied in detail. The UHECR spectrum is consistent with the decay of GUT scale particles and/or with the Z-burst. The predicted GUT mass is m x = 10 b GeV, where b 14.6 -1.7 +1.6 . Our neutrino mass prediction depends on the origin of the power part of the spectrum: m ν = 2.75 -0.97 +1.28 eV for halo and 0.26 -0.14 +0.20 eV for extragalactic (EG) origin
3. Comparison of relativity theories with observer-independent scales of both velocity and length/mass
International Nuclear Information System (INIS)
Amelino-Camelia, Giovanni; Benedetti, Dario; D'Andrea, Francesco; Procaccini, Andrea
2003-01-01
We consider the two most studied proposals of relativity theories with observer-independent scales of both velocity and length/mass: the one discussed by Amelino-Camelia as an illustrative example for the original proposal (Preprint gr-qc/0012051) of theories with two relativistic invariants, and an alternative more recently proposed by Magueijo and Smolin (Preprint hep-th/0112090). We show that these two relativistic theories are much more closely connected than it would appear on the basis of a naive analysis of their original formulations. In particular, in spite of adopting a rather different formal description of the deformed boost generators, they end up assigning the same dependence of momentum on rapidity, which can be described as the core feature of these relativistic theories. We show that this observation can be used to clarify the concepts of particle mass, particle velocity and energy-momentum conservation rules in these theories with two relativistic invariants
4. Higgs mass scales and matter-antimatter oscillations in grand unified theories
International Nuclear Information System (INIS)
Senjanovic, G.
1982-01-01
A general discussion of mass scales in grand unified theories is presented, with special emphasis on Higgs scalars which mediate neutron-antineutron (n-anti n) and hydrogen-antihydrogen (H-anti H) oscillations. It is shown that the analogue of survival hypothesis for fermions naturally makes such particles superheavy, thus leading to unobservable lifetimes. If this hypothesis is relaxed, an interesting possibility of potentially observable n-anti n and H-anti H transitions, mutually related arises in the context of SU(5) theory with spontaneously broken B-L symmetry
5. Theoretical Re-evaluations of Scaling Relations between SMBHs and Their Host Galaxies—1. Effect of Seed BH Mass
Energy Technology Data Exchange (ETDEWEB)
Shirakata, Hikari [Department of Cosmosciences, Graduate School of Science, Hokkaido University, Sapporo (Japan); Kawaguchi, Toshihiro [Department of Economics, Management and Information Science, Onomichi City University, Onomichi (Japan); Okamoto, Takashi [Department of Cosmosciences, Graduate School of Science, Hokkaido University, Sapporo (Japan); Makiya, Ryu [Kavli Institute for the Physics and Mathematics of the Universe, Todai Institutes for Advanced Study, University of Tokyo, Kashiwa (Japan); Max-Planck-Institut fur Astrophysik, Garching (Germany); Ishiyama, Tomoaki [Institute of Management and Information Technologies, Chiba University, Chiba (Japan); Matsuoka, Yoshiki [Research Center for Space and Cosmic Evolution, Ehime University, Matsuyama (Japan); Nagashima, Masahiro [Faculty of Education, Bunkyo University, Koshigaya (Japan); Enoki, Motohiro [Faculty of Business Administration, Tokyo Keizai University, Kokubunji (Japan); Oogi, Taira [Kavli Institute for the Physics and Mathematics of the Universe, Todai Institutes for Advanced Study, University of Tokyo, Kashiwa (Japan); Kobayashi, Masakazu A. R., E-mail: [email protected] [Faculty of Natural Sciences, National Institute of Technology, Kure College, Kure (Japan)
2017-09-21
We use a semi-analytic model of galaxy formation and investigate how the mass of a seed black hole affect the scaling relation between black hole mass and bulge mass at z ~ 0. When the mass of the seed is set at 10{sup 5}M{sub ⊙}, we find that the model results become inconsistent with recent observational results of the scaling relation for dwarf galaxies. On the other hand, when we set seed black hole mass as 10{sup 3}M{sub ⊙} or as randomly chosen value within a 10{sup 3-5}M{sub ⊙} range, we find the results are consistent with observational results including the dispersion. We also find that black hole mass—bulge mass relations for less massive bulges at z ~ 0 put stronger constraints on the seed BH mass than the relations at higher redshifts.
6. A Three Dimensional Picture of Galactic Center Mass Flows From Kiloparsec to Subparsec Scales
Science.gov (United States)
Mills, Elisabeth A.
2018-06-01
The centers of galaxies host extreme and energetic phenomena, from the amassing of incredibly dense reservoirs of gas to nuclear starbursts producing tens to hundreds of solar masses per year to accreting supermassive black holes launching jets. All of these are found on compact scales from hundreds of parsecs to less than a microparsec. The nearest laboratory for examining these processes is the center of our own Milky Way Galaxy. Although the black hole is not currently active and the star formation rate is relatively low, it is still our best opportunity for detailed insight into the processes that regulate the growth of the central supermassive black hole. By providing access to mid and far infrared wavelengths, SOFIA plays a unique role in connecting large and small scales in the Galactic center and studying the cycling of gas through this region. In this talk I will highlight several key open questions and outline the role that SOFIA continues to play in answering them.
7. Effects of the application of different particle sizes of mill scale (residue) in mass red ceramic
International Nuclear Information System (INIS)
Arnt, A.B.C.; Rocha, M.R.; Meller, J.G.
2012-01-01
This study aims to evaluate the influence of particle size of mill scale, residue, when added to a mass ceramic. This residue rich in iron oxide may be used as pigment in the ceramics industry. The use of pigments in ceramic products is related to the characteristics of non-toxicity, chemical stability and determination of tone. The tendency to solubilize the pigment depends on the specific surface area. The residue study was initially subjected to physical and chemical characterization and added in a proportion of 5% at a commercial ceramic white burning, with different particle sizes. Both formulations were sintered at a temperature of 950 ° C and evaluated for: loss on ignition, firing linear shrinkage, water absorption, flexural strength and difference of tone. Samples with finer particles of mill scale 0.038 μ showed higher mechanical strength values in the order of 18 MPa. (author)
8. Mass
International Nuclear Information System (INIS)
Quigg, Chris
2007-01-01
In the classical physics we inherited from Isaac Newton, mass does not arise, it simply is. The mass of a classical object is the sum of the masses of its parts. Albert Einstein showed that the mass of a body is a measure of its energy content, inviting us to consider the origins of mass. The protons we accelerate at Fermilab are prime examples of Einsteinian matter: nearly all of their mass arises from stored energy. Missing mass led to the discovery of the noble gases, and a new form of missing mass leads us to the notion of dark matter. Starting with a brief guided tour of the meanings of mass, the colloquium will explore the multiple origins of mass. We will see how far we have come toward understanding mass, and survey the issues that guide our research today.
9. Measurement of Galaxy Cluster Integrated Comptonization and Mass Scaling Relations with the South Pole Telescope
Energy Technology Data Exchange (ETDEWEB)
Saliwanchik, B. R.; et al.
2015-01-22
We describe a method for measuring the integrated Comptonization (Y (SZ)) of clusters of galaxies from measurements of the Sunyaev-Zel'dovich (SZ) effect in multiple frequency bands and use this method to characterize a sample of galaxy clusters detected in the South Pole Telescope (SPT) data. We use a Markov Chain Monte Carlo method to fit a β-model source profile and integrate Y (SZ) within an angular aperture on the sky. In simulated observations of an SPT-like survey that include cosmic microwave background anisotropy, point sources, and atmospheric and instrumental noise at typical SPT-SZ survey levels, we show that we can accurately recover β-model parameters for inputted clusters. We measure Y (SZ) for simulated semi-analytic clusters and find that Y (SZ) is most accurately determined in an angular aperture comparable to the SPT beam size. We demonstrate the utility of this method to measure Y (SZ) and to constrain mass scaling relations using X-ray mass estimates for a sample of 18 galaxy clusters from the SPT-SZ survey. Measuring Y (SZ) within a 0.'75 radius aperture, we find an intrinsic log-normal scatter of 21% ± 11% in Y (SZ) at a fixed mass. Measuring Y (SZ) within a 0.3 Mpc projected radius (equivalent to 0.'75 at the survey median redshift z = 0.6), we find a scatter of 26% ± 9%. Prior to this study, the SPT observable found to have the lowest scatter with mass was cluster detection significance. We demonstrate, from both simulations and SPT observed clusters that Y (SZ) measured within an aperture comparable to the SPT beam size is equivalent, in terms of scatter with cluster mass, to SPT cluster detection significance.
10. Lepton Dipole Moments in Supersymmetric Low-Scale Seesaw Models
CERN Document Server
Ilakovac, Amon; Popov, Luka
2014-01-01
We study the anomalous magnetic and electric dipole moments of charged leptons in supersymmetric low-scale seesaw models with right-handed neutrino superfields. We consider a minimally extended framework of minimal supergravity, by assuming that CP violation originates from complex soft SUSY-breaking bilinear and trilinear couplings associated with the right-handed sneutrino sector. We present numerical estimates of the muon anomalous magnetic moment and the electron electric dipole moment (EDM), as functions of key model parameters, such as the Majorana mass scale mN and tan(\\beta). In particular, we find that the contributions of the singlet heavy neutrinos and sneutrinos to the electron EDM are naturally small in this model, of order 10^{-27} - 10^{-28} e cm, and can be probed in the present and future experiments.
11. Generalized Jaynes-Cummings Hamiltonians by shape-invariant hierarchies and their SUSY partners
International Nuclear Information System (INIS)
Hussin, V; Kuru, S; Negro, J
2006-01-01
A generalization of the matrix Jaynes-Cummings model in the rotating wave approximation is proposed by means of the shape-invariant hierarchies of scalar factorized Hamiltonians. A class of Darboux transformations (sometimes called SUSY transformations in this context) suitable for these generalized Jaynes-Cummings models is constructed. Finally one example is worked out using the methods developed
12. Holographic entanglement entropy and entanglement thermodynamics of 'black' non-susy D3 brane
Science.gov (United States)
Bhattacharya, Aranya; Roy, Shibaji
2018-06-01
Like BPS D3 brane, the non-supersymmetric (non-susy) D3 brane of type IIB string theory is also known to have a decoupling limit and leads to a non-supersymmetric AdS/CFT correspondence. The throat geometry in this case represents a QFT which is neither conformal nor supersymmetric. The 'black' version of the non-susy D3 brane in the decoupling limit describes a QFT at finite temperature. Here we first compute the entanglement entropy for small subsystem of such QFT from the decoupled geometry of 'black' non-susy D3 brane using holographic technique. Then we study the entanglement thermodynamics for the weakly excited states of this QFT from the asymptotically AdS geometry of the decoupled 'black' non-susy D3 brane. We observe that for small subsystem this background indeed satisfies a first law like relation with a universal (entanglement) temperature inversely proportional to the size of the subsystem and an (entanglement) pressure normal to the entangling surface. Finally we show how the entanglement entropy makes a cross-over to the thermal entropy at high temperature.
13. Bremsstrahlung and Ion Beam Current Measurements with SuSI ECR Ion Source
International Nuclear Information System (INIS)
Ropponen, T.
2012-01-01
This series of slides presents: the Superconducting Source for Ions (SuSI), the X-ray measurement setup, the different collimation schemes, the flat B operation versus B(min) operation, and the impact of tuning ∇B while keeping fixed field profile
14. Primordial cosmological inflation versus local supersymmetry breaking in SUSY GUTs coupled to N = 1 supergravity
International Nuclear Information System (INIS)
Gato, B.; Leon, J.; Ramon-Medrano, M.
1984-01-01
We present a model for a SUSY GUT coupled to N=1 supergravity in which local supersymmetry breaks down in the gauge singlet sector. The constraints for the model to be physically acceptable are incompatible with inflation. The simultaneous breaking of local supersymmetry and gauge symmetry is proposed as a good prospect for inflation. (orig.)
15. Decoupling limit and throat geometry of non-susy D3 brane
Energy Technology Data Exchange (ETDEWEB)
Nayek, Kuntal, E-mail: [email protected]; Roy, Shibaji, E-mail: [email protected]
2017-03-10
Recently it has been shown by us that, like BPS Dp branes, bulk gravity gets decoupled from the brane even for the non-susy Dp branes of type II string theories indicating a possible extension of AdS/CFT correspondence for the non-supersymmetric case. In that work, the decoupling of gravity on the non-susy Dp branes has been shown numerically for the general case as well as analytically for some special case. Here we discuss the decoupling limit and the throat geometry of the non-susy D3 brane when the charge associated with the brane is very large. We show that in the decoupling limit the throat geometry of the non-susy D3 brane, under appropriate coordinate change, reduces to the Constable–Myers solution and thus confirming that this solution is indeed the holographic dual of a (non-gravitational) gauge theory discussed there. We also show that when one of the parameters of the solution takes a specific value, it reduces, under another coordinate change, to the five-dimensional solution obtained by Csaki and Reece, again confirming its gauge theory interpretation.
16. Effect of enhanced manganese oxidation in the hyporheic zone on basin-scale geochemical mass balance
Science.gov (United States)
Harvey, Judson W.; Fuller, Christopher C.
1998-01-01
cumulative effect of hyporheic exchange in Pinal Creek basin was to remove approximately 20% of the dissolved manganese flowing out of the drainage basin. Our results illustrate that the cumulative significance of reactive uptake in the hyporheic zone depends on the balance between chemical reaction rates, hyporheic porewater residence time, and turnover of streamflow through hyporheic flow paths. The similarity between the hyporheic reaction timescale (1/λs ≈ 1.3 hours), and the hyporheic porewater residence timescale (ts ≈ 8 min) ensured that there was adequate time for the reaction to progress. Furthermore, it was the similarity between the turnover length for stream water flow through hyporheic flow paths (Ls = stream velocity/storage-zone exchange coefficient ≈ 1.3 km) and the length of Pinal Creek (L ≈ 7 km), which ensured that all stream water passed through hyporheic flow paths several times. As a means to generalize our findings to other sites where similar types of hydrologic and chemical information are available, we suggest a cumulative significance index for hyporheic reactions, Rs = λstsL/Ls (dimensionless); higher values indicate a greater potential for hyporheic reactions to influence geochemical mass balance. Our experience in Pinal Creek basin suggests that values of Rs > 0.2 characterize systems where hyporheic reactions are likely to influence geochemical mass balance at the drainage-basin scale.
17. Determining Central Black Hole Masses in Distant Active Galaxies and Quasars. II. Improved Optical and UV Scaling Relationships
DEFF Research Database (Denmark)
Vestergaard, Marianne; Peterson, B. M.
2006-01-01
We present four improved empirical relationships useful for estimating the central black hole mass in nearby AGNs and distant luminous quasars alike using either optical or UV single-epoch spectroscopy. These mass-scaling relationships between line widths and luminosity are based on recently...
18. Search for SUperSYmmetry (SUSY) in Opposite Sign (OS) di-lepton final states with Parked Data collected at $\\sqrt{s}$ = 8 TeV using the CMS detector
CERN Document Server
Bhattacharya, Saptaparna
2015-01-01
The Large Hadron Collider (LHC) has had a very successful data-taking phase with Run 1. After the discovery of the Higgs, confirming the predictions of the Standard Model (SM), the focus is on finding new physics, especially in the context of supersymmetry (SUSY). One of the potential hiding places of natural SUSY is in models with compressed spectra, that is, models where the mass difference between the parent SUSY particle and the Lightest Supersymmetric Particle (LSP) is small. Such signals are characterized by low transverse momentum (p${_T}$) objects, low hadronic activity and missing transverse energy (MET). In this analysis, we focus on di-lepton final states, specifically in the low p${_T}$ regime. We use 7.4 fb$^{-1}$ of parked data collected at $\\sqrt{s}$ = 8 TeV. The analysis is enabled by the use of triggers that place no restrictions on the di-lepton p${_T}$, instead relying on methods like Initial State Radiation (ISR) tagging by triggering on a high p${_T}$ photon, to reduce the trigger rate....
19. Plasmon mass scale and quantum fluctuations of classical fields on a real time lattice
Directory of Open Access Journals (Sweden)
Kurkela Aleksi
2018-01-01
Full Text Available Classical real-time lattice simulations play an important role in understanding non-equilibrium phenomena in gauge theories and are used in particular to model the prethermal evolution of heavy-ion collisions. Above the Debye scale the classical Yang-Mills (CYM theory can be matched smoothly to kinetic theory. First we study the limits of the quasiparticle picture of the CYM fields by determining the plasmon mass of the system using 3 different methods. Then we argue that one needs a numerical calculation of a system of classical gauge fields and small linearized fluctuations, which correspond to quantum fluctuations, in a way that keeps the separation between the two manifest. We demonstrate and test an implementation of an algorithm with the linearized fluctuation showing that the linearization indeed works and that the Gauss’s law is conserved.
20. Plasmon mass scale and quantum fluctuations of classical fields on a real time lattice
Science.gov (United States)
Kurkela, Aleksi; Lappi, Tuomas; Peuron, Jarkko
2018-03-01
Classical real-time lattice simulations play an important role in understanding non-equilibrium phenomena in gauge theories and are used in particular to model the prethermal evolution of heavy-ion collisions. Above the Debye scale the classical Yang-Mills (CYM) theory can be matched smoothly to kinetic theory. First we study the limits of the quasiparticle picture of the CYM fields by determining the plasmon mass of the system using 3 different methods. Then we argue that one needs a numerical calculation of a system of classical gauge fields and small linearized fluctuations, which correspond to quantum fluctuations, in a way that keeps the separation between the two manifest. We demonstrate and test an implementation of an algorithm with the linearized fluctuation showing that the linearization indeed works and that the Gauss's law is conserved.
1. Starobinsky-like inflation, supercosmology and neutrino masses in no-scale flipped SU(5)
Energy Technology Data Exchange (ETDEWEB)
Ellis, John [Theoretical Particle Physics and Cosmology Group, Department of Physics, King' s College London, WC2R 2LS London (United Kingdom); Garcia, Marcos A.G. [Physics and Astronomy Department, Rice University, 6100 Main Street, Houston, TX 77005 (United States); Nagata, Natsumi [Department of Physics, University of Tokyo, Bunkyo-ku, Tokyo 113-0033 (Japan); Nanopoulos, Dimitri V. [George P. and Cynthia W. Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, 77843 Texas (United States); Olive, Keith A., E-mail: [email protected], E-mail: [email protected], E-mail: [email protected], E-mail: [email protected], E-mail: [email protected] [William I. Fine Theoretical Physics Institute, School of Physics and Astronomy, University of Minnesota, 116 Church Street SE, Minneapolis, MN 55455 (United States)
2017-07-01
We embed a flipped SU(5) × U(1) GUT model in a no-scale supergravity framework, and discuss its predictions for cosmic microwave background observables, which are similar to those of the Starobinsky model of inflation. Measurements of the tilt in the spectrum of scalar perturbations in the cosmic microwave background, n {sub s} , constrain significantly the model parameters. We also discuss the model's predictions for neutrino masses, and pay particular attention to the behaviours of scalar fields during and after inflation, reheating and the GUT phase transition. We argue in favor of strong reheating in order to avoid excessive entropy production which could dilute the generated baryon asymmetry.
2. Performance ceramic red mass containing mill scale of rolling in different firing temperatures
International Nuclear Information System (INIS)
Meller, J.G.; Arnt, A.B.C; Rocha, M.R.
2014-01-01
This study aimed to evaluate the performance of the properties of samples of red clay with addition of mill scale steel. This residue consists of oxides of iron has the function replace pigments used in ceramic materials. The mechanical strength of the sintered material can be associated with reactions that occur during sintering, leading to the formation of compounds provided with good mechanical characteristics, particle size of the components and the structure of the dough piece after the compactation. After chemical and microstructural characterization diffraction and fluorescence X-rays, this residue was added in the proportion of 1.45% of a commercial ceramic mass. The formulations were subjected to different temperatures and performance of the formulations was evaluated for physical characteristics: loss on ignition, linear firing shrinkage, water absorption, flexural strength by 3 and intensity of tone. The loss on ignition and linear firing shrinkage tests relate to the sintering temperature with the performance of the tested formulations. (author)
3. A Fault-Tolerant Radiation-Robust Mass Storage Concept for Highly Scaled Flash Memory
Science.gov (United States)
Fuchs, Cristian M.; Trinitis, Carsten; Appel, Nicolas; Langer, Martin
2015-09-01
Future spacemissions will require vast amounts of data to be stored and processed aboard spacecraft. While satisfying operational mission requirements, storage systems must guarantee data integrity and recover damaged data throughout the mission. NAND-flash memories have become popular for space-borne high performance mass memory scenarios, though future storage concepts will rely upon highly scaled flash or other memory technologies. With modern flash memory, single bit erasure coding and RAID based concepts are insufficient. Thus, a fully run-time configurable, high performance, dependable storage concept, requiring a minimal set of logic or software. The solution is based on composite erasure coding and can be adjusted for altered mission duration or changing environmental conditions.
4. Modeling Coronal Mass Ejections with the Multi-Scale Fluid-Kinetic Simulation Suite
International Nuclear Information System (INIS)
Pogorelov, N. V.; Borovikov, S. N.; Wu, S. T.; Yalim, M. S.; Kryukov, I. A.; Colella, P. C.; Van Straalen, B.
2017-01-01
The solar eruptions and interacting solar wind streams are key drivers of geomagnetic storms and various related space weather disturbances that may have hazardous effects on the space-borne and ground-based technological systems as well as on human health. Coronal mass ejections (CMEs) and their interplanetary counterparts, interplanetary CMEs (ICMEs), belong to the strongest disturbances and therefore are of great importance for the space weather predictions. In this paper we show a few examples of how adaptive mesh refinement makes it possible to resolve the complex CME structure and its evolution in time while a CME propagates from the inner boundary to Earth. Simulations are performed with the Multi-Scale Fluid-Kinetic Simulation Suite (MS-FLUKSS). (paper)
5. Higgs and superparticle mass predictions from the landscape
Science.gov (United States)
Baer, Howard; Barger, Vernon; Serce, Hasan; Sinha, Kuver
2018-03-01
Predictions for the scale of SUSY breaking from the string landscape go back at least a decade to the work of Denef and Douglas on the statistics of flux vacua. The assumption that an assortment of SUSY breaking F and D terms are present in the hidden sector, and their values are uniformly distributed in the landscape of D = 4, N = 1 effective supergravity models, leads to the expectation that the landscape pulls towards large values of soft terms favored by a power law behavior P( m soft) ˜ m soft n . On the other hand, similar to Weinberg's prediction of the cosmological constant, one can assume an anthropic selection of weak scales not too far from the measured value characterized by m W,Z,h ˜ 100 GeV. Working within a fertile patch of gravity-mediated low energy effective theories where the superpotential μ term is ≪ m 3/2, as occurs in models such as radiative breaking of Peccei-Quinn symmetry, this biases statistical distributions on the landscape by a cutoff on the parameter ΔEW, which measures fine-tuning in the m Z - μ mass relation. The combined effect of statistical and anthropic pulls turns out to favor low energy phenomenology that is more or less agnostic to UV physics. While a uniform selection n = 0 of soft terms produces too low a value for m h , taking n = 1 and 2 produce most probabilistically m h ˜ 125 GeV for negative trilinear terms. For n ≥ 1, there is a pull towards split generations with {m}_{\\tilde{q},\\tilde{ℓ}}(1,2)˜ 10-30 TeV whilst {m}_{{\\tilde{t}}_1}˜ 1-2 TeV . The most probable gluino mass comes in at ˜ 3 - 4 TeV — apparently beyond the reach of HL-LHC (although the required quasi-degenerate higgsinos should still be within reach). We comment on consequences for SUSY collider and dark matter searches.
6. Mass and charge transfer on various relevant scales in polymer electrolyte fuel cells[Dissertation 16991
Energy Technology Data Exchange (ETDEWEB)
Freunberger, S. A.
2007-07-01
This dissertation is concerned with the development, experimental diagnostics and mathematical modelling and simulation of polymer electrolyte fuel cells (PEFC). The central themes throughout this thesis are the closely interlinked phenomena of mass and charge transfer. In the face of developing a PEFC system for vehicle propulsion these phenomena are scrutinized on a broad range of relevant scales. Starting from the material related level of the membrane and the gas diffusion layer (GDL) we turn to length scales, where structural features of the cell additionally come into play. These are the scale of flow channels and ribs, the single cell and the cell stack followed by the cell, stack, and system development for an automotive power train. In Chapter 3 selected fundamental material models and properties, respectively, are explored that are crucial for the mathematical modelling and simulation of PEFC, as needed in some succeeding parts of this work. First, established mathematical models for mass and charge transfer in the membrane are compared within the framework of the membrane electrode assembly (MEA), which represents the electrochemical unit. Second, reliable values for effective diffusivities in the GDLs which are vital for the simulation of gaseous mass transport are measured. Therefore, a method is developed that allows measuring this quantity both as a function of compression and direction as this is a prerequisite of sophisticated more-dimensional numerical PEFC-models. Besides the cross section of the catalyst layer (CL) mass transfer under channels and ribs is considered as a major source of losses in particular under high load operation. As up to now there have been solely non-validated theoretical investigations, in Chapter 4 an experimental method is developed that is for the first time capable of resolving the current density distribution on the this scale. For this, the electron conductors in the cell are considered as 2-dimensional shunt
7. Pore-scale investigation of mass transport and electrochemistry in a solid oxide fuel cell anode
Energy Technology Data Exchange (ETDEWEB)
Grew, Kyle N.; Joshi, Abhijit S.; Peracchio, Aldo A.; Chiu, Wilson K.S. [Department of Mechanical Engineering, University of Connecticut, 191 Auditorium Road, Storrs, CT 06269-3139 (United States)
2010-04-15
The development and validation of a model for the study of pore-scale transport phenomena and electrochemistry in a Solid Oxide Fuel Cell (SOFC) anode are presented in this work. This model couples mass transport processes with a detailed reaction mechanism, which is used to model the electrochemical oxidation kinetics. Detailed electrochemical oxidation reaction kinetics, which is known to occur in the vicinity of the three-phase boundary (TPB) interfaces, is discretely considered in this work. The TPB regions connect percolating regions of electronic and ionic conducting phases of the anode, nickel (Ni) and yttria-stabilized zirconia (YSZ), respectively; with porous regions supporting mass transport of the fuel and product. A two-dimensional (2D), multi-species lattice Boltzmann method (LBM) is used to describe the diffusion process in complex pore structures that are representative of the SOFC anode. This diffusion model is discretely coupled to a kinetic electrochemical oxidation mechanism using localized flux boundary conditions. The details of the oxidation kinetics are prescribed as a function of applied activation overpotential and the localized hydrogen and water mole fractions. This development effort is aimed at understanding the effects of the anode microstructure within TPB regions. This work describes the methods used so that future studies can consider the details of SOFC anode microstructure. (author)
8. Strain in shock-loaded skeletal muscle and the time scale of muscular wobbling mass dynamics.
Science.gov (United States)
Christensen, Kasper B; Günther, Michael; Schmitt, Syn; Siebert, Tobias
2017-10-16
In terrestrial locomotion, muscles undergo damped oscillations in response to limb impacts with the ground. Muscles are also actuators that generate mechanical power to allow locomotion. The corresponding elementary contractile process is the work stroke of an actin-myosin cross-bridge, which may be forcibly detached by superposed oscillations. By experimentally emulating rat leg impacts, we found that full activity and non-fatigue must meet to possibly prevent forcible cross-bridge detachment. Because submaximal muscle force represents the ordinary locomotor condition, our results show that forcible, eccentric cross-bridge detachment is a common, physiological process even during isometric muscle contractions. We also calculated the stiffnesses of the whole muscle-tendon complex and the fibre material separately, as well as Young's modulus of the latter: 1.8 MPa and 0.75 MPa for fresh, fully active and passive fibres, respectively. Our inferred Young's modulus of the tendon-aponeurosis complex suggests that stiffness in series to the fibre material is determined by the elastic properties of the aponeurosis region, rather than the tendon material. Knowing these stiffnesses and the muscle mass, the complex' eigenfrequency for responses to impacts can be quantified, as well as the size-dependency of this time scale of muscular wobbling mass dynamics.
9. RECONNECTION PROPERTIES OF LARGE-SCALE CURRENT SHEETS DURING CORONAL MASS EJECTION ERUPTIONS
Energy Technology Data Exchange (ETDEWEB)
Lynch, B. J.; Kazachenko, M. D. [Space Sciences Laboratory, University of California, Berkeley, CA 94720 (United States); Edmondson, J. K. [Climate and Space Sciences and Engineering Department, University of Michigan, Ann Arbor, MI 48109 (United States); Guidoni, S. E. [Heliophysics Science Division, NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States)
2016-07-20
We present a detailed analysis of the properties of magnetic reconnection at large-scale current sheets (CSs) in a high cadence version of the Lynch and Edmondson 2.5D MHD simulation of sympathetic magnetic breakout eruptions from a pseudostreamer source region. We examine the resistive tearing and break-up of the three main CSs into chains of X- and O-type null points and follow the dynamics of magnetic island growth, their merging, transit, and ejection with the reconnection exhaust. For each CS, we quantify the evolution of the length-to-width aspect ratio (up to ∼100:1), Lundquist number (∼10{sup 3}), and reconnection rate (inflow-to-outflow ratios reaching ∼0.40). We examine the statistical and spectral properties of the fluctuations in the CSs resulting from the plasmoid instability, including the distribution of magnetic island area, mass, and flux content. We show that the temporal evolution of the spectral index of the reconnection-generated magnetic energy density fluctuations appear to reflect global properties of the CS evolution. Our results are in excellent agreement with recent, high-resolution reconnection-in-a-box simulations even though our CSs’ formation, growth, and dynamics are intrinsically coupled to the global evolution of sequential sympathetic coronal mass ejection eruptions.
10. Measuring the black hole mass in ultraluminous X-ray sources with the X-ray scaling method
Science.gov (United States)
Jang, I.; Gliozzi, M.; Satyapal, S.; Titarchuk, L.
2018-01-01
In our recent work, we demonstrated that a novel X-ray scaling method, originally introduced for Galactic black holes (BH), could be reliably extended to estimate the mass of supermassive black holes accreting at moderate to high level. Here, we apply this X-ray scaling method to ultraluminous X-ray sources (ULXs) to constrain their MBH. Using 49 ULXs with multiple XMM-Newton observations, we infer that ULXs host both stellar mass BHs and intermediate mass BHs. The majority of the sources of our sample seem to be consistent with the hypothesis of highly accreting massive stellar BHs with MBH ∼ 100 M⊙. Our results are in general agreement with the MBH values obtained with alternative methods, including model-independent variability methods. This suggests that the X-ray scaling method is an actual scale-independent method that can be applied to all BH systems accreting at moderate-high rate.
11. Identifying fake leptons in ATLAS while hunting SUSY in 8 TeV proton-proton collisions
CERN Document Server
Gillam, Thomas P S
For several theoretically and experimentally motivated reasons, super- symmetry (SUSY) has for some time been identified as an interesting candidate for a theory of fundamental particle physics beyond the Stan- dard Model. The ATLAS collaboration, of which I am a member, possess a detector emplaced in the Large Hadron Collider experiment at CERN. If SUSY does in fact describe our universe, then it is hoped that evidence of it will be visible in data collected in the ATLAS detector. I present an analysis looking for a particular signature that could indicate the presence of SUSY; events containing two like-charge leptons (e or μ). This signature benefits from having both low Standard Model backgrounds as well as potential to observe several SUSY scenarios, par- ticularly those involving strong production processes. These include pair production of squarks and gluinos. The latter of these are particularly relevant for the analysis presented herein since gluinos are Majorana fermions; hence they can decay to...
12. Lifting scalar-quark and -lepton masses with sideways U(1)-II
International Nuclear Information System (INIS)
1984-01-01
We investigate the phenomenological consequences of an SUSY model with a gauged O'Raifeartaigh sector on scalar partner masses. The model has the gauge symmetry SU(5) x U(1). We find that this form of spontaneous SUSY breaking leads to large scalar partner masses through one loop graphs without changing quark and lepton masses from tree values, and without breaking SU(5) symmetries by the scalar partner sector. To calculate the scalar partner masses we extend previous work on supergraph techniques to include cases when SUSY is broken at tree level. We are able to sum exactly the corrections to unbroken propagators with the aid of a supersymmetric version of tree-level Dyson equations. We show how the same ideas can be implemented in an SU(5) gauge model where the normal Higgs give large masses radiatively to the scalar-quarks and -leptons. 7 references
13. Feasibility study of a large-scale tuned mass damper with eddy current damping mechanism
Science.gov (United States)
Wang, Zhihao; Chen, Zhengqing; Wang, Jianhui
2012-09-01
Tuned mass dampers (TMDs) have been widely used in recent years to mitigate structural vibration. However, the damping mechanisms employed in the TMDs are mostly based on viscous dampers, which have several well-known disadvantages, such as oil leakage and difficult adjustment of damping ratio for an operating TMD. Alternatively, eddy current damping (ECD) that does not require any contact with the main structure is a potential solution. This paper discusses the design, analysis, manufacture and testing of a large-scale horizontal TMD based on ECD. First, the theoretical model of ECD is formulated, then one large-scale horizontal TMD using ECD is constructed, and finally performance tests of the TMD are conducted. The test results show that the proposed TMD has a very low intrinsic damping ratio, while the damping ratio due to ECD is the dominant damping source, which can be as large as 15% in a proper configuration. In addition, the damping ratios estimated with the theoretical model are roughly consistent with those identified from the test results, and the source of this error is investigated. Moreover, it is demonstrated that the damping ratio in the proposed TMD can be easily adjusted by varying the air gap between permanent magnets and conductive plates. In view of practical applications, possible improvements and feasibility considerations for the proposed TMD are then discussed. It is confirmed that the proposed TMD with ECD is reliable and feasible for use in structural vibration control.
14. Multi-scale mass movements: example of the Nile deep-sea fan (NDSF)
Science.gov (United States)
Loncke, L.; Droz, L.; Bellaiche, G.; Gaullier, V.; Mascle, J.; Migeon, S.
2003-04-01
The almost 90 000 km2 NDSF, fed by one of the major river in the world, has been nearly entirely surveyed by swath bathymetry and back-scatter imagery during the last four years. Seismic-reflection and 3-5 kHz profiles, and in some places, high resolution data were collected. Some profiles have been provided by BP-Egypt. Using this set of data, we have conducted a multi-scale regional synthesis which stresses the importance of gravity processes in the edification and evolution of this major deep turbidite system. Gravity processes range from regional gravity-driven spreading and gliding of the Plio-Pleistocene sediments above the Messinian mobile evaporites, to huge collapses of large areas of the upper continental slope as well as very localized levee destabilizations and related avulsion mechanisms. The Eastern - tectonized - area of the NDSF is characterized by lens-shaped transparent bodies, likely indicating debris-flow deposits, settled at crestal graben flanks, themselves generated by reactive diapir rise. Debris flows are probably triggered by local readjustments of salt-related tectonic features destabilizing their sedimentary cover. In contrast, within the poorly deformed Western part of the NDSF, we mainly observe recent slumping and gliding phenomenons, incising the upper slope where salt layers are absent. These slumps and glidings evolved downslope to large debris flows. Some of them exhibit volumes up to 1900 km3 and are covered by recent stacked channel-levees units. Smaller scale debris-flows are inter-fingered within these constructional units and led to numerous channel migrations and avulsions, characterized by typical HARP's seismic facies. Recent sedimentary destabilizations seem to be associated with gas seeping or under-compacted mud ascents: in the Central NDSF, the association between pock-marks (or mounds) and destabilizated masses suggest the existence of gas hydrates. Given the variety of processes (either triggered by tectonics
15. Higgs mass prediction with non-universal soft supersymmetry breaking in MSSM
International Nuclear Information System (INIS)
Codoban, S.; Jurcisin, M.; Kazakov, D.
2001-01-01
In the framework of the MSSM (Minimal supersymmetric extension of the standard model) the non-universal boundary conditions of soft SUSY breaking parameters are considered. Taking as input the top, bottom and Z-boson masses, the values of the gauge couplings at the EW scale and the infrared quasi-fixed points for Yukawa couplings and the soft parameters the mass of the lightest CP-even Higgs boson is found to be m h = 92.7 -4.9 +10 ± 5 ± 0.4 GeV/c 2 for the low tan(β) case and m h 125.7 -9.0 +6.4 ± 5 ± 0.4 GeV/c 2 (μ > 0) or m h 125.4 -9.0 +6.6 ± 5 ± 0.4 Ge V/c 2 (μ < 0) in the case of large tan(β). (authors)
16. Post-sphaleron baryogenesis and n- anti n oscillation in non-SUSY SO(10) GUT with gauge coupling unification
International Nuclear Information System (INIS)
Patra, Sudhanwa; Pritimita, Prativa
2014-01-01
''Post-sphaleron baryogenesis'', a fresh and profound mechanism of baryogenesis accounts for the matter-antimatter asymmetry of our present universe in a framework of Pati-Salam symmetry. We attempt here to embed this mechanism in a non-SUSY SO(10) grand unified theory by reviving a novel symmetry breaking chain with Pati-Salam symmetry as an intermediate symmetry breaking step and as well to address post-sphaleron baryogenesis and neutron-antineutron oscillation in a rational manner. The Pati-Salam symmetry based on the gauge group SU(2) L x SU(2) R x SU(4) C is realized in our model at 10 5 -10 6 GeV and the mixing time for the neutron-antineutron oscillation process having ΔB = 2 is found to be τ n- anti n ≅ 10 8 -10 10 s with the model parameters, which is within the reach of forthcoming experiments. Other novel features of the model include low scale right-handed W R ± , Z R gauge bosons, explanation for neutrino oscillation data via the gauged inverse (or extended) seesaw mechanism and most importantly TeV scale color sextet scalar particles responsible for an observable n- anti n oscillation which may be accessible to LHC. We also look after gauge coupling unification and an estimation of the proton lifetime with and without the addition of color sextet scalars. (orig.)
17. A low-energy β-function in a finite super-Yang-Mills model with multiple mass scales
International Nuclear Information System (INIS)
Foda, O.; Helayel-Neto, J.A.
1985-01-01
We compute the one-loop contribution to the low-energy light-fermion gauge coupling in a finite supersymmetric gauge theory with two mass scales: a heavy mass that breaks an initial N=4 supersymmetry down to N=2, but respects the finiteness, and a light mass that, for simplicity, is set to zero. We find that coupling grows with the mass of the heavy intermediate states. Hence the latter do not decouple at low energies, leading to large logarithms that invalidate low-energy perturbation theory. Consequently, further manipulations are required to obtain a meaningful perturbative expansion. Enforcing decoupling through finite renormalizations, that absorb the heavy mass effects into a redefinition of the parameters of the lagrangian, introduces an arbitrary subtraction mass μ. The requirement that the S-matrix elements be independent of μ leads to a non-trivial renormalization-group equation for the low-energy theory, with a non-vanishing β-function. (orig.)
18. Low-energy. beta. -function in a finite super-Yang-Mills model with multiple mass scales
Energy Technology Data Exchange (ETDEWEB)
Foda, O.; Helayel-Neto, J.A. (International Centre for Theoretical Physics, Trieste (Italy))
1985-02-14
We compute the one-loop contribution to the low-energy light-fermion gauge coupling in a finite supersymmetric gauge theory with two mass scales: a heavy mass that breaks an initial N=4 supersymmetry down to N=2, but respects the finiteness, and a light mass that, for simplicity, is set to zero. We find that coupling grows with the mass of the heavy intermediate states. Hence the latter do not decouple at low energies, leading to large logarithms that invalidate low-energy perturbation theory. Consequently, further manipulations are required to obtain a meaningful perturbative expansion. Enforcing decoupling through finite renormalizations, that absorb the heavy mass effects into a redefinition of the parameters of the lagrangian, introduces an arbitrary subtraction mass ..mu... The requirement that the S-matrix elements be independent of ..mu.. leads to a non-trivial renormalization-group equation for the low-energy theory, with a non-vanishing ..beta..-function.
19. AS ABOVE, SO BELOW: EXPLOITING MASS SCALING IN BLACK HOLE ACCRETION TO BREAK DEGENERACIES IN SPECTRAL INTERPRETATION
International Nuclear Information System (INIS)
Markoff, Sera; Silva, Catia V.; Nowak, Michael A.; Gallo, Elena; Plotkin, Richard M.; Hynes, Robert; Wilms, Jörn; Maitra, Dipankar; Drappeau, Samia
2015-01-01
Over the past decade, evidence has mounted that several aspects of black hole (BH) accretion physics proceed in a mass-invariant way. One of the best examples of this scaling is the empirical “fundamental plane of BH accretion” relation linking mass, radio, and X-ray luminosity over eight orders of magnitude in BH mass. The currently favored theoretical interpretation of this relation is that the physics governing power output in weakly accreting BHs depends more on relative accretion rate than on mass. In order to test this theory, we explore whether a mass-invariant approach can simultaneously explain the broadband spectral energy distributions from two BHs at opposite ends of the mass scale but that are at similar Eddington accretion fractions. We find that the same model, with the same value of several fitted physical parameters expressed in mass-scaling units to enforce self-similarity, can provide a good description of two data sets from V404 Cyg and M81*, a stellar and supermassive BH, respectively. Furthermore, only one of several potential emission scenarios for the X-ray band is successful, suggesting it is the dominant process driving the fundamental plane relation at this accretion rate. This approach thus holds promise for breaking current degeneracies in the interpretation of BH high-energy spectra and for constructing better prescriptions of BH accretion for use in various local and cosmological feedback applications
20. Benchmark models, planes lines and points for future SUSY searches at the LHC
International Nuclear Information System (INIS)
AbdusSalam, S.S.; Allanach, B.C.; Dreiner, H.K.
2012-03-01
We define benchmark models for SUSY searches at the LHC, including the CMSSM, NUHM, mGMSB, mAMSB, MM-AMSB and p19MSSM, as well as models with R-parity violation and the NMSSM. Within the parameter spaces of these models, we propose benchmark subspaces, including planes, lines and points along them. The planes may be useful for presenting results of the experimental searches in different SUSY scenarios, while the specific benchmark points may serve for more detailed detector performance tests and comparisons. We also describe algorithms for defining suitable benchmark points along the proposed lines in the parameter spaces, and we define a few benchmark points motivated by recent fits to existing experimental data.
1. Mandelstam cuts and light-like Wilson loops in N=4 SUSY
Energy Technology Data Exchange (ETDEWEB)
Lipatov, L.N. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; St. Petersburg Inst. of Nuclear Physics, Gatchina (Russian Federation); Prygarin, A. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik
2010-08-15
We perform an analytic continuation of the two-loop remainder function for the six-point planar MHV amplitude in N=4 SUSY, found by Goncharov, Spradlin, Vergu and Volovich from the light-like Wilson loop representation. The remainder function is continued into a physical region, where all but two energy invariants are negative. It turns out to be pure imaginary in the multi-Regge kinematics, which is in an agreement with the predictions based on the Steinmann relations for the Regge poles and Mandelstam cut contributions. The leading term reproduces correctly the expression calculated by one of the authors in the BFKL approach, while the subleading term presents a result, that was not yet found with the use of the unitarity techniques. This supports the applicability of the Wilson loop approach to the planar MHV amplitudes in N=4 SUSY. (orig.)
2. Mandelstam cuts and light-like Wilson loops in N=4 SUSY
International Nuclear Information System (INIS)
Lipatov, L.N.; Prygarin, A.
2010-08-01
We perform an analytic continuation of the two-loop remainder function for the six-point planar MHV amplitude in N=4 SUSY, found by Goncharov, Spradlin, Vergu and Volovich from the light-like Wilson loop representation. The remainder function is continued into a physical region, where all but two energy invariants are negative. It turns out to be pure imaginary in the multi-Regge kinematics, which is in an agreement with the predictions based on the Steinmann relations for the Regge poles and Mandelstam cut contributions. The leading term reproduces correctly the expression calculated by one of the authors in the BFKL approach, while the subleading term presents a result, that was not yet found with the use of the unitarity techniques. This supports the applicability of the Wilson loop approach to the planar MHV amplitudes in N=4 SUSY. (orig.)
3. Benchmark models, planes lines and points for future SUSY searches at the LHC
Energy Technology Data Exchange (ETDEWEB)
AbdusSalam, S.S. [The Abdus Salam International Centre for Theoretical Physics, Trieste (Italy); Allanach, B.C. [Cambridge Univ. (United Kingdom). Dept. of Applied Mathematics and Theoretical Physics; Dreiner, H.K. [Bonn Univ. (DE). Bethe Center for Theoretical Physics and Physikalisches Inst.] (and others)
2012-03-15
We define benchmark models for SUSY searches at the LHC, including the CMSSM, NUHM, mGMSB, mAMSB, MM-AMSB and p19MSSM, as well as models with R-parity violation and the NMSSM. Within the parameter spaces of these models, we propose benchmark subspaces, including planes, lines and points along them. The planes may be useful for presenting results of the experimental searches in different SUSY scenarios, while the specific benchmark points may serve for more detailed detector performance tests and comparisons. We also describe algorithms for defining suitable benchmark points along the proposed lines in the parameter spaces, and we define a few benchmark points motivated by recent fits to existing experimental data.
4. Analytic properties of high energy production amplitudes in N=4 SUSY
International Nuclear Information System (INIS)
Lipatov, L.N.; Hamburg Univ.
2010-08-01
We investigate analytic properties of the six point planar amplitude in N=4 SUSY at the multi-Regge kinematics for final state particles. For inelastic processes the Steinmann relations play an important role because they give a possibility to fix the phase structure of the Regge pole and Mandelstam cut contributions. The analyticity and factorization constraints allow us to reproduce the two-loop correction to the 6- point BDS amplitude in N=4 SUSY obtained earlier in the leading logarithmic approximation with the use of the s-channel unitarity. The cut contribution has the Moebius invariant form in the transverse momentum subspace. The exponentiation hypothesis for the amplitude in the multi-Regge kinematics is also investigated in LLA. (orig.)
5. Prospects for R-Parity Conserving SUSY searches at the LHC
CERN Document Server
The ATLAS collaboration
2009-01-01
The talk reviews the current strategies to search for generic SUSY models with R-parity conservation in the ATLAS and CMS detectors at the LHC. The discovery reach in early data is presented for different search channels based on missing transverse momentum from undetected neutralinos and multiple jets. The talk will also describe the search for models of gauge-mediated supersymmetry breaking for which the NLSP is a neutralino decaying to a photon and a gravitino. In this scenario, the search strategy exploits the distinct signature of a non-pointing photon. Finally, we present recent work on techniques used to reconstruct the decays of SUSY particles at the LHC in early data, based on the selection of final-state exclusive decay chains.
6. Prospects for R-Parity Conserving SUSY searches at the LHC
CERN Document Server
Genest, Marie-Helene
2009-01-01
We review the current strategies to search for generic SUSY models with R-parity conservation in the ATLAS and CMS detectors at the LHC. The discovery reach in early data will be presented for the different search channels based on missing transverse momentum from undetected neutralinos and multiple jets. We will also describe the search for models of gauge-mediated supersymmetry breaking for which the NLSP is a neutralino decaying to a photon and a gravitino. Finally, we will present recent work on techniques used to reconstruct the decays of SUSY particles at the LHC in early data, based on the selection of final-state exclusive decay chains.
7. Benchmark Models, Planes, Lines and Points for Future SUSY Searches at the LHC
CERN Document Server
AbdusSalam, S S; Dreiner, H K; Ellis, J; Ellwanger, U; Gunion, J; Heinemeyer, S; Krämer, M; Mangano, M L; Olive, K A; Rogerson, S; Roszkowski, L; Schlaffer, M; Weiglein, G
2011-01-01
We define benchmark models for SUSY searches at the LHC, including the CMSSM, NUHM, mGMSB, mAMSB, MM-AMSB and p19MSSM, as well as models with R-parity violation and the NMSSM. Within the parameter spaces of these models, we propose benchmark subspaces, including planes, lines and points along them. The planes may be useful for presenting results of the experimental searches in different SUSY scenarios, while the specific benchmark points may serve for more detailed detector performance tests and comparisons. We also describe algorithms for defining suitable benchmark points along the proposed lines in the parameter spaces, and we define a few benchmark points motivated by recent fits to existing experimental data.
8. Analytic properties of high energy production amplitudes in N=4 SUSY
Energy Technology Data Exchange (ETDEWEB)
Lipatov, L.N. [St. Petersburg Inst. of Nuclear Physics, Gatchina (Russian Federation); Hamburg Univ. (Germany). 1. Inst. fuer Theoretische Physik
2010-08-15
We investigate analytic properties of the six point planar amplitude in N=4 SUSY at the multi-Regge kinematics for final state particles. For inelastic processes the Steinmann relations play an important role because they give a possibility to fix the phase structure of the Regge pole and Mandelstam cut contributions. The analyticity and factorization constraints allow us to reproduce the two-loop correction to the 6- point BDS amplitude in N=4 SUSY obtained earlier in the leading logarithmic approximation with the use of the s-channel unitarity. The cut contribution has the Moebius invariant form in the transverse momentum subspace. The exponentiation hypothesis for the amplitude in the multi-Regge kinematics is also investigated in LLA. (orig.)
9. Multiple linear regression to develop strength scaled equations for knee and elbow joints based on age, gender and segment mass
DEFF Research Database (Denmark)
D'Souza, Sonia; Rasmussen, John; Schwirtz, Ansgar
2012-01-01
and valuable ergonomic tool. Objective: To investigate age and gender effects on the torque-producing ability in the knee and elbow in older adults. To create strength scaled equations based on age, gender, upper/lower limb lengths and masses using multiple linear regression. To reduce the number of dependent...... flexors. Results: Males were signifantly stronger than females across all age groups. Elbow peak torque (EPT) was better preserved from 60s to 70s whereas knee peak torque (KPT) reduced significantly (PGender, thigh mass and age best...... predicted KPT (R2=0.60). Gender, forearm mass and age best predicted EPT (R2=0.75). Good crossvalidation was established for both elbow and knee models. Conclusion: This cross-sectional study of muscle strength created and validated strength scaled equations of EPT and KPT using only gender, segment mass...
10. Extension of the SUSY Les Houches Accord 2 for see-saw mechanisms
International Nuclear Information System (INIS)
Basso, L.; Belyaev, A.; Chowdhury, D.; Ghosh, D.K.; Hirsch, M.; Khalil, S.; Moretti, S.; O'Leary, B.; Porod, W.; Staub, F.
2012-01-01
The SUSY Les Houches Accord (SLHA) 2 extended the first SLHA to include various generalisations of the Minimal Supersymmetric Standard Model (MSSM) as well as its simplest next-to-minimal version. Here, we propose further extensions to it, to include the most general and well-established see-saw descriptions (types I/II/III, inverse, and linear) in both an effective and a simple gauged extension of the MSSM framework. (authors)
11. Convergence of macroscopic tongue anatomy in ruminants and scaling relationships with body mass or tongue length.
Science.gov (United States)
Meier, Andrea R; Schmuck, Ute; Meloro, Carlo; Clauss, Marcus; Hofmann, Reinhold R
2016-03-01
Various morphological measures demonstrate convergent evolution in ruminants with their natural diet, in particular with respect to the browser/grazer dichotomy. Here, we report quantitative macroanatomical measures of the tongue (length and width of specific parts) of 65 ruminant species and relate them to either body mass (BM) or total tongue length, and to the percentage of grass in the natural diet (%grass). Models without and with accounting for the phylogenetic structures of the dataset were used, and models were ranked using Akaike's Information Criterion. Scaling relationships followed geometric principles, that is, length measures scaled with BM to the power of 0.33. Models that used tongue length rather than BM as a body size proxy were consistently ranked better, indicating that using size proxies that are less susceptible to a wider variety of factors (such as BM that fluctuates with body condition) should be attempted whenever possible. The proportion of the freely mobile tongue tip of the total tongue (and hence also the corpus length) was negatively correlated to %grass, in accordance with concepts that the feeding mechanism of browsers requires more mobile tongues. It should be noted that some nonbrowsers, such as cattle, use a peculiar mechanism for grazing that also requires long, mobile tongues, but they appear to be exceptions. A larger corpus width with increasing %grass corresponds to differences in snout shape with broader snouts in grazers. The Torus linguae is longer with increasing %grass, a finding that still warrants functional interpretation. This study shows that tongue measures covary with diet in ruminants. In contrast, the shape of the tongue (straight or "hourglass-shaped" as measured by the ratio of the widest and smallest corpus width) is unrelated to diet and is influenced strongly by phylogeny. © 2015 Wiley Periodicals, Inc.
12. Scale effect experiment in a fractured rock mass. Pilot study in the certified Fanay-Augeres mine (F)
International Nuclear Information System (INIS)
Durand, E.; Peaudecerf, P.; Ledoux, E.; De Marsily, G.
1985-01-01
This report (in two volumes) presents the results of a first phase of research about ''scale effect'' on permeability and solute transport in a fractured rock mass, to assess its suitability for future disposal of radioactive wastes. The gallery which was ''certified'' is located in the Fanay-Augeres mine(F), at a depth of about 175 m, in a granite mass. The portion selected for the subsequent experimental work is about 100 m long
13. Neutrino Majorana masses from string theory instanton effects
International Nuclear Information System (INIS)
Ibanez, Luis E.; Uranga, Angel M.
2007-01-01
Finding a plausible origin for right-handed neutrino Majorana masses in semirealistic compactifications of string theory remains one of the most difficult problems in string phenomenology. We argue that right-handed neutrino Majorana masses are induced by non-perturbative instanton effects in certain classes of string compactifications in which the U(1) B-L gauge boson has a Stueckelberg mass. The induced operators are of the form e -U ν R ν R where U is a closed string modulus whose imaginary part transforms appropriately under B-L. This mass term may be quite large since this is not a gauge instanton and Re U is not directly related to SM gauge couplings. Thus the size of the induced right-handed neutrino masses could be a few orders of magnitude below the string scale, as phenomenologically required. It is also argued that this origin for neutrino masses would predict the existence of R-parity in SUSY versions of the SM. Finally we comment on other phenomenological applications of similar instanton effects, like the generation of a μ-term, or of Yukawa couplings forbidden in perturbation theory
14. The hyperbolic step potential: Anti-bound states, SUSY partners and Wigner time delays
Energy Technology Data Exchange (ETDEWEB)
Gadella, M. [Departamento de Física Teórica, Atómica y Óptica and IMUVA, Universidad de Valladolid, E-47011 Valladolid (Spain); Kuru, Ş. [Department of Physics, Faculty of Science, Ankara University, 06100 Ankara (Turkey); Negro, J., E-mail: [email protected] [Departamento de Física Teórica, Atómica y Óptica and IMUVA, Universidad de Valladolid, E-47011 Valladolid (Spain)
2017-04-15
We study the scattering produced by a one dimensional hyperbolic step potential, which is exactly solvable and shows an unusual interest because of its asymmetric character. The analytic continuation of the scattering matrix in the momentum representation has a branch cut and an infinite number of simple poles on the negative imaginary axis which are related with the so called anti-bound states. This model does not show resonances. Using the wave functions of the anti-bound states, we obtain supersymmetric (SUSY) partners which are the series of Rosen–Morse II potentials. We have computed the Wigner reflection and transmission time delays for the hyperbolic step and such SUSY partners. Our results show that the more bound states a partner Hamiltonian has the smaller is the time delay. We also have evaluated time delays for the hyperbolic step potential in the classical case and have obtained striking similitudes with the quantum case. - Highlights: • The scattering matrix of hyperbolic step potential is studied. • The scattering matrix has a branch cut and an infinite number of poles. • The poles are associated to anti-bound states. • Susy partners using antibound states are computed. • Wigner time delays for the hyperbolic step and partner potentials are compared.
15. An industry-scale mass marking technique for tracing farmed fish escapees.
Directory of Open Access Journals (Sweden)
Fletcher Warren-Myers
Full Text Available Farmed fish escape and enter the environment with subsequent effects on wild populations. Reducing escapes requires the ability to trace individuals back to the point of escape, so that escape causes can be identified and technical standards improved. Here, we tested if stable isotope otolith fingerprint marks delivered during routine vaccination could be an accurate, feasible and cost effective marking method, suitable for industrial-scale application. We tested seven stable isotopes, (134Ba, (135Ba, (136Ba, (137Ba, (86Sr, (87Sr and (26Mg, on farmed Atlantic salmon reared in freshwater, in experimental conditions designed to reflect commercial practice. Marking was 100% successful with individual Ba isotopes at concentrations as low as 0.001 µg. g-1 fish and for Sr isotopes at 1 µg. g-1 fish. Our results suggest that 63 unique fingerprint marks can be made at low cost using Ba (0.0002 - 0.02 $US per mark and Sr (0.46 - 0.82$US per mark isotopes. Stable isotope fingerprinting during vaccination is feasible for commercial application if applied at a company level within the world's largest salmon producing nations. Introducing a mass marking scheme would enable tracing of escapees back to point of origin, which could drive greater compliance, better farm design and improved management practices to reduce escapes.
16. Quantifying in-stream retention of nitrate at catchment scales using a practical mass balance approach.
Science.gov (United States)
Schwientek, Marc; Selle, Benny
2016-02-01
As field data on in-stream nitrate retention is scarce at catchment scales, this study aimed at quantifying net retention of nitrate within the entire river network of a fourth-order stream. For this purpose, a practical mass balance approach combined with a Lagrangian sampling scheme was applied and seasonally repeated to estimate daily in-stream net retention of nitrate for a 17.4 km long, agriculturally influenced, segment of the Steinlach River in southwestern Germany. This river segment represents approximately 70% of the length of the main stem and about 32% of the streambed area of the entire river network. Sampling days in spring and summer were biogeochemically more active than in autumn and winter. Results obtained for the main stem of Steinlach River were subsequently extrapolated to the stream network in the catchment. It was demonstrated that, for baseflow conditions in spring and summer, in-stream nitrate retention could sum up to a relevant term of the catchment's nitrogen balance if the entire stream network was considered.
17. Thermospheric mass density model error variance as a function of time scale
Science.gov (United States)
Emmert, J. T.; Sutton, E. K.
2017-12-01
In the increasingly crowded low-Earth orbit environment, accurate estimation of orbit prediction uncertainties is essential for collision avoidance. Poor characterization of such uncertainty can result in unnecessary and costly avoidance maneuvers (false positives) or disregard of a collision risk (false negatives). Atmospheric drag is a major source of orbit prediction uncertainty, and is particularly challenging to account for because it exerts a cumulative influence on orbital trajectories and is therefore not amenable to representation by a single uncertainty parameter. To address this challenge, we examine the variance of measured accelerometer-derived and orbit-derived mass densities with respect to predictions by thermospheric empirical models, using the data-minus-model variance as a proxy for model uncertainty. Our analysis focuses mainly on the power spectrum of the residuals, and we construct an empirical model of the variance as a function of time scale (from 1 hour to 10 years), altitude, and solar activity. We find that the power spectral density approximately follows a power-law process but with an enhancement near the 27-day solar rotation period. The residual variance increases monotonically with altitude between 250 and 550 km. There are two components to the variance dependence on solar activity: one component is 180 degrees out of phase (largest variance at solar minimum), and the other component lags 2 years behind solar maximum (largest variance in the descending phase of the solar cycle).
18. A scale space approach for unsupervised feature selection in mass spectra classification for ovarian cancer detection.
Science.gov (United States)
Ceccarelli, Michele; d'Acierno, Antonio; Facchiano, Angelo
2009-10-15
Mass spectrometry spectra, widely used in proteomics studies as a screening tool for protein profiling and to detect discriminatory signals, are high dimensional data. A large number of local maxima (a.k.a. peaks) have to be analyzed as part of computational pipelines aimed at the realization of efficient predictive and screening protocols. With this kind of data dimensions and samples size the risk of over-fitting and selection bias is pervasive. Therefore the development of bio-informatics methods based on unsupervised feature extraction can lead to general tools which can be applied to several fields of predictive proteomics. We propose a method for feature selection and extraction grounded on the theory of multi-scale spaces for high resolution spectra derived from analysis of serum. Then we use support vector machines for classification. In particular we use a database containing 216 samples spectra divided in 115 cancer and 91 control samples. The overall accuracy averaged over a large cross validation study is 98.18. The area under the ROC curve of the best selected model is 0.9962. We improved previous known results on the problem on the same data, with the advantage that the proposed method has an unsupervised feature selection phase. All the developed code, as MATLAB scripts, can be downloaded from http://medeaserver.isa.cnr.it/dacierno/spectracode.htm.
19. Considerations of anthropometric, tissue volume, and tissue mass scaling for improved patient specificity of skeletal S values
International Nuclear Information System (INIS)
Bolch, W.E.; Patton, P.W.; Shah, A.P.; Rajon, D.A.; Jokisch, D.W.
2002-01-01
It is generally acknowledged that reference man (70 kg in mass and 170 cm in height) does not adequately represent the stature and physical dimensions of many patients undergoing radionuclide therapy, and thus scaling of radionuclide S values is required for patient specificity. For electron and beta sources uniformly distributed within internal organs, the mean dose from self-irradiation is noted to scale inversely with organ mass, provided no escape of electron energy occurs at the organ boundaries. In the skeleton, this same scaling approach is further assumed to be correct for marrow dosimetry; nevertheless, difficulties in quantitative assessments of marrow mass in specific skeletal regions of the patient make this approach difficult to implement clinically. Instead, scaling of marrow dose is achieved using various anthropometric parameters that presumably scale in the same proportion. In this study, recently developed three-dimensional macrostructural transport models of the femoral head and humeral epiphysis in three individuals (51-year male, 82-year female, and 86-year female) are used to test the abilities of different anthropometric parameters (total body mass, body surface area, etc.) to properly scale radionuclide S values from reference man models. The radionuclides considered are 33 P, 177 Lu, 153 Sm, 186 Re, 89 Sr, 166 Ho, 32 P, 188 Re, and 90 Y localized in either the active marrow or endosteal tissues of the bone trabeculae. S value scaling is additionally conducted in which the 51-year male subject is assigned as the reference individual; scaling parameters are then expanded to include tissue volumes and masses for both active marrow and skeletal spongiosa. The study concludes that, while no single anthropometric parameter emerges as a consistent scaler of reference man S values, lean body mass is indicated as an optimal scaler when the reference S values are based on 3D transport techniques. Furthermore, very exact patient-specific scaling of
20. Effects of fracture distribution and length scale on the equivalent continuum elastic compliance of fractured rock masses
Directory of Open Access Journals (Sweden)
Marte Gutierrez
2015-12-01
Full Text Available Fracture systems have strong influence on the overall mechanical behavior of fractured rock masses due to their relatively lower stiffness and shear strength than those of the rock matrix. Understanding the effects of fracture geometrical distribution, such as length, spacing, persistence and orientation, is important for quantifying the mechanical behavior of fractured rock masses. The relation between fracture geometry and the mechanical characteristics of the fractured rock mass is complicated due to the fact that the fracture geometry and mechanical behaviors of fractured rock mass are strongly dependent on the length scale. In this paper, a comprehensive study was conducted to determine the effects of fracture distribution on the equivalent continuum elastic compliance of fractured rock masses over a wide range of fracture lengths. To account for the stochastic nature of fracture distributions, three different simulation techniques involving Oda's elastic compliance tensor, Monte Carlo simulation (MCS, and suitable probability density functions (PDFs were employed to represent the elastic compliance of fractured rock masses. To yield geologically realistic results, parameters for defining fracture distributions were obtained from different geological fields. The influence of the key fracture parameters and their relations to the overall elastic behavior of the fractured rock mass were studied and discussed. A detailed study was also carried out to investigate the validity of the use of a representative element volume (REV in the equivalent continuum representation of fractured rock masses. A criterion was also proposed to determine the appropriate REV given the fracture distribution of the rock mass.
1. Geoelectrical Measurement of Multi-Scale Mass Transfer Parameters Final Report to the Subsurface Biogeochemical Research Program
Energy Technology Data Exchange (ETDEWEB)
Day-Lewis, Frederick; Singha, Kamini; Haggerty, Roy; Johnson, Timothy; Binley, Andrew; Lane, John
2014-03-10
. In this project, we sought to capitalize on the geophysical signatures of mass transfer. Previous numerical modeling and pilot-scale field experiments suggested that mass transfer produces a geoelectrical signature—a hysteretic relation between sampled (mobile-domain) fluid conductivity and bulk (mobile + immobile) conductivity—over a range of scales relevant to aquifer remediation. In this work, we investigated the geoelectrical signature of mass transfer during tracer transport in a series of controlled experiments to determine the operation of controlling parameters, and also investigated the use of complex-resistivity (CR) as a means of quantifying mass transfer parameters in situ without tracer experiments. In an add-on component to our grant, we additionally considered nuclear magnetic resonance (NMR) to help parse mobile from immobile porosities. Our study objectives were to: 1. Develop and demonstrate geophysical approaches to measure mass-transfer parameters spatially and over a range of scales, including the combination of electrical resistivity monitoring, tracer tests, complex resistivity, nuclear magnetic resonance, and materials characterization; and 2. Provide mass-transfer estimates for improved understanding of contaminant fate and transport at DOE sites, such as uranium transport at the Hanford 300 Area. To achieve our objectives, we implemented a 3-part research plan involving (1) development of computer codes and techniques to estimate mass-transfer parameters from time-lapse electrical data; (2) bench-scale experiments on synthetic materials and materials from cores from the Hanford 300 Area; and (3) field demonstration experiments at the DOE’s Hanford 300 Area.
2. SUSI 62 A ROBUST AND SAFE PARACHUTE UAV WITH LONG FLIGHT TIME AND GOOD PAYLOAD
Directory of Open Access Journals (Sweden)
H. P. Thamm
2012-09-01
Full Text Available In many research areas in the geo-sciences (erosion, land use, land cover change, etc. or applications (e.g. forest management, mining, land management etc. there is a demand for remote sensing images of a very high spatial and temporal resolution. Due to the high costs of classic aerial photo campaigns, the use of a UAV is a promising option for obtaining the desired remote sensed information at the time it is needed. However, the UAV must be easy to operate, safe, robust and should have a high payload and long flight time. For that purpose, the parachute UAV SUSI 62 was developed. It consists of a steel frame with a powerful 62 cm3 2- stroke engine and a parachute wing. The frame can be easily disassembled for transportation or to replace parts. On the frame there is a gimbal mounted sensor carrier where different sensors, standard SLR cameras and/or multi-spectral and thermal sensors can be mounted. Due to the design of the parachute, the SUSI 62 is very easy to control. Two different parachute sizes are available for different wind speed conditions. The SUSI 62 has a payload of up to 8 kg providing options to use different sensors at the same time or to extend flight duration. The SUSI 62 needs a runway of between 10 m and 50 m, depending on the wind conditions. The maximum flight speed is approximately 50 km/h. It can be operated in a wind speed of up to 6 m/s. The design of the system utilising a parachute UAV makes it comparatively safe as a failure of the electronics or the remote control only results in the UAV coming to the ground at a slow speed. The video signal from the camera, the GPS coordinates and other flight parameters are transmitted to the ground station in real time. An autopilot is available, which guarantees that the area of investigation is covered at the desired resolution and overlap. The robustly designed SUSI 62 has been used successfully in Europe, Africa and Australia for scientific projects and also for
3. High-frequency spectral ultrasound imaging (SUSI) visualizes early post-traumatic heterotopic ossification (HO) in a mouse model.
Science.gov (United States)
Ranganathan, Kavitha; Hong, Xiaowei; Cholok, David; Habbouche, Joe; Priest, Caitlin; Breuler, Christopher; Chung, Michael; Li, John; Kaura, Arminder; Hsieh, Hsiao Hsin Sung; Butts, Jonathan; Ucer, Serra; Schwartz, Ean; Buchman, Steven R; Stegemann, Jan P; Deng, Cheri X; Levi, Benjamin
2018-04-01
Early treatment of heterotopic ossification (HO) is currently limited by delayed diagnosis due to limited visualization at early time points. In this study, we validate the use of spectral ultrasound imaging (SUSI) in an animal model to detect HO as early as one week after burn tenotomy. Concurrent SUSI, micro CT, and histology at 1, 2, 4, and 9weeks post-injury were used to follow the progression of HO after an Achilles tenotomy and 30% total body surface area burn (n=3-5 limbs per time point). To compare the use of SUSI in different types of injury models, mice (n=5 per group) underwent either burn/tenotomy or skin incision injury and were imaged using a 55MHz probe on VisualSonics VEVO 770 system at one week post injury to evaluate the ability of SUSI to distinguish between edema and HO. Average acoustic concentration (AAC) and average scatterer diameter (ASD) were calculated for each ultrasound image frame. Micro CT was used to calculate the total volume of HO. Histology was used to confirm bone formation. Using SUSI, HO was visualized as early as 1week after injury. HO was visualized earliest by 4weeks after injury by micro CT. The average acoustic concentration of HO was 33% more than that of the control limb (n=5). Spectroscopic foci of HO present at 1week that persisted throughout all time points correlated with the HO present at 9weeks on micro CT imaging. SUSI visualizes HO as early as one week after injury in an animal model. SUSI represents a new imaging modality with promise for early diagnosis of HO. Copyright © 2018 Elsevier Inc. All rights reserved.
4. Calibration of a surface mass balance model for global-scale applications
NARCIS (Netherlands)
Giesen, R. H.; Oerlemans, J.
2012-01-01
Global applications of surface mass balance models have large uncertainties, as a result of poor climate input data and limited availability of mass balance measurements. This study addresses several possible consequences of these limitations for the modelled mass balance. This is done by applying a
5. The potential for optical beam shaping of UV laser sources for mass scale quarantine disinfection applications
Science.gov (United States)
Lizotte, Todd
2010-08-01
Recent events concerning H1N1 "swine flu", have demonstrated to the world the significant potential of rapid increases in death and illness among all age groups and even among the healthy population [1] when a highly infectious influenza virus is introduced. In terms of mass casualties due to a pandemic, preparedness and response planning must be done. One course of action to prevent a pandemic outbreak or reduce the impact of a bioterrorist event is the use of isolation or quarantine facilities. The first level of isolation or quarantine is within the personal residence of the person exposed or infected. In the case where, the specific virus is extremely contagious and its onset of symptoms is rapid and severe, there will be a need for the deployment and setup of larger self contained quarantine facilities. Such facilities are used to house infectious individuals to minimize the exposure of susceptible individuals to contagious individuals, especially when specialized care or treatment is required and during the viral shedding period (5 to 7 days). These types of facilities require non-shared air conditioning, heating and ventilating systems where 100% of air is vented to the outside through a series of disinfection systems and staged filters. Although chemical disinfection is possible, there is a desire to incorporate intense UV radiation as a means to deactivate and disinfect airborne virus within hospital settings and isolated mass scale quarantine facilities. UV radiation is also being considered for disinfection of contaminated surfaces, such as table tops, walls and floors in hospitals and temporary quarantine facilities. In such applications the use of UV bulb technology can create many problems, for instance bulb technology requires numerous bulbs to treat a large volume of air, generates significant heat, uses significant power and does not produce large fluxes of UV light efficiently. This paper provides several methods of creating quarantine level
6. MSSM with mh = 125 GeV in high-scale gauge mediation
International Nuclear Information System (INIS)
Zheng, Sibo
2014-01-01
After the discovery of an SM-like Higgs with m h = 125 GeV, it is increasingly urgent to explore a solution to the hierarchy problem. In the context of MSSM from gauge-mediated SUSY breaking, the lower bound on the gluino mass suggests that the messenger scale M is probably large if the magnitude of Λ ∝ 100 TeV. In this paper, we study the 5 + 5 model with M ∝ 10 8 -10 12 GeV and Λ ≅ 100 TeV. For moderate Higgs C messenger coupling, a viable model will be shown with moderate fine tuning. In this model, μ ∝ 800 GeV, and B μ nearly vanishes at the input scale, which can be constructed in a microscopic model. (orig.)
7. Strong Sector in non-minimal SUSY model
Directory of Open Access Journals (Sweden)
Costantini Antonio
2016-01-01
Full Text Available We investigate the squark sector of a supersymmetric theory with an extended Higgs sector. We give the mass matrices of stop and sbottom, comparing the Minimal Supersymmetric Standard Model (MSSM case and the non-minimal case. We discuss the impact of the extra superfields on the decay channels of the stop searched at the LHC.
8. The sea-level budget along the Northwest Atlantic coast : GIA, mass changes, and large-scale ocean dynamics
NARCIS (Netherlands)
Frederikse, T.; Simon, K.M.; Katsman, C.A.; Riva, R.E.M.
2017-01-01
Sea-level rise and decadal variability along the northwestern coast of the North Atlantic Ocean are studied in a self-consistent framework that takes into account the effects of solid-earth deformation and geoid changes due to large-scale mass redistribution processes. Observations of sea and
9. Ontogenetic body-mass scaling of nitrogen excretion relates to body surface area in diverse pelagic invertebrates
DEFF Research Database (Denmark)
Hirst, Andrew G.; Lilley, M.K.S.; Glazier, D.S.
2017-01-01
. Among diverse pelagic invertebrates that change shape during ontogeny, recent analysis has demonstrated a significant positive correlation between the body-mass allometry of respiration rates (measured as the ontogenetic body mass-scaling exponent bR) and the allometry of body surface area (b......A, as predicted from body-shape changes using a Euclidean model). As many pelagic invertebrates use a large portion of their external body surface for both resource uptake and waste excretion, we predicted that body-mass scaling exponents for rates of excretion of soluble N (bN) should also then relate...... to the degree of body-shape change during growth. We tested this hypothesis using literature data on bN for 39 species of pelagic invertebrates across five different phyla, and find strong support: bN is significantly positively correlated with predicted bA, whilst also co-varying with bR. Intraspecific...
10. A new approach to Naturalness in SUSY models
CERN Document Server
Ghilencea, D M
2013-01-01
We review recent results that provide a new approach to the old problem of naturalness in supersymmetric models, without relying on subjective definitions for the fine-tuning associated with {\\it fixing} the EW scale (to its measured value) in the presence of quantum corrections. The approach can address in a model-independent way many questions related to this problem. The results show that naturalness and its measure (fine-tuning) are an intrinsic part of the likelihood to fit the data that {\\it includes} the EW scale. One important consequence is that the additional {\\it constraint} of fixing the EW scale, usually not imposed in the data fits of the models, impacts on their overall likelihood to fit the data (or chi^2/ndf, ndf: number of degrees of freedom). This has negative implications for the viability of currently popular supersymmetric extensions of the Standard Model.
11. HICOSMO - cosmology with a complete sample of galaxy clusters - I. Data analysis, sample selection and luminosity-mass scaling relation
Science.gov (United States)
Schellenberger, G.; Reiprich, T. H.
2017-08-01
The X-ray regime, where the most massive visible component of galaxy clusters, the intracluster medium, is visible, offers directly measured quantities, like the luminosity, and derived quantities, like the total mass, to characterize these objects. The aim of this project is to analyse a complete sample of galaxy clusters in detail and constrain cosmological parameters, like the matter density, Ωm, or the amplitude of initial density fluctuations, σ8. The purely X-ray flux-limited sample (HIFLUGCS) consists of the 64 X-ray brightest galaxy clusters, which are excellent targets to study the systematic effects, that can bias results. We analysed in total 196 Chandra observations of the 64 HIFLUGCS clusters, with a total exposure time of 7.7 Ms. Here, we present our data analysis procedure (including an automated substructure detection and an energy band optimization for surface brightness profile analysis) that gives individually determined, robust total mass estimates. These masses are tested against dynamical and Planck Sunyaev-Zeldovich (SZ) derived masses of the same clusters, where good overall agreement is found with the dynamical masses. The Planck SZ masses seem to show a mass-dependent bias to our hydrostatic masses; possible biases in this mass-mass comparison are discussed including the Planck selection function. Furthermore, we show the results for the (0.1-2.4) keV luminosity versus mass scaling relation. The overall slope of the sample (1.34) is in agreement with expectations and values from literature. Splitting the sample into galaxy groups and clusters reveals, even after a selection bias correction, that galaxy groups exhibit a significantly steeper slope (1.88) compared to clusters (1.06).
12. LoCuSS: THE SUNYAEV–ZEL'DOVICH EFFECT AND WEAK-LENSING MASS SCALING RELATION
International Nuclear Information System (INIS)
Marrone, Daniel P.; Carlstrom, John E.; Gralla, Megan; Greer, Christopher H.; Hennessy, Ryan; Leitch, Erik M.; Plagge, Thomas; Smith, Graham P.; Okabe, Nobuhiro; Bonamente, Massimiliano; Hasler, Nicole; Culverhouse, Thomas L.; Hawkins, David; Lamb, James W.; Muchovej, Stephen; Joy, Marshall; Martino, Rossella; Mazzotta, Pasquale; Miller, Amber; Mroczkowski, Tony
2012-01-01
We present the first weak-lensing-based scaling relation between galaxy cluster mass, M WL , and integrated Compton parameter Y sph . Observations of 18 galaxy clusters at z ≅ 0.2 were obtained with the Subaru 8.2 m telescope and the Sunyaev-Zel'dovich Array. The M WL -Y sph scaling relations, measured at Δ = 500, 1000, and 2500 ρ c , are consistent in slope and normalization with previous results derived under the assumption of hydrostatic equilibrium (HSE). We find an intrinsic scatter in M WL at fixed Y sph of 20%, larger than both previous measurements of M HSE -Y sph scatter as well as the scatter in true mass at fixed Y sph found in simulations. Moreover, the scatter in our lensing-based scaling relations is morphology dependent, with 30%-40% larger M WL for undisturbed compared to disturbed clusters at the same Y sph at r 500 . Further examination suggests that the segregation may be explained by the inability of our spherical lens models to faithfully describe the three-dimensional structure of the clusters, in particular, the structure along the line of sight. We find that the ellipticity of the brightest cluster galaxy, a proxy for halo orientation, correlates well with the offset in mass from the mean scaling relation, which supports this picture. This provides empirical evidence that line-of-sight projection effects are an important systematic uncertainty in lensing-based scaling relations.
13. Scaling and χPT description of pions from Nf=2 twisted mass QCD
International Nuclear Information System (INIS)
Dimopoulos, Petros; Frezzotti, Roberto; Herdoiza, Gregorio; Jansen, Karl; Michael, Chris; Urbach, Carsten; Bonn Univ.
2009-12-01
We study light-quark observables by means of dynamical lattice QCD simulations using two flavours of twisted mass fermions at maximal twist. We employ chiral perturbation theory to describe our data for the pion mass and decay constant. In this way, we extract precise determinations for the low-energy constants of the effective theory as well as for the light-quark mass and the chiral condensate. (orig.)
14. Radiative corrections to light neutrino masses in low scale type I seesaw scenarios and neutrinoless double beta decay
Energy Technology Data Exchange (ETDEWEB)
Lopez-Pavon, J. [SISSA and INFN - sezione di Trieste, via Bonomea 265, 34136 Trieste (Italy); Molinaro, E. [CP-Origins and Danish Institute for Advanced Study, University of Southern Denmark,Campusvej 55, DK-5230 Odense M (Denmark); Petcov, S.T. [SISSA and INFN - sezione di Trieste, via Bonomea 265, 34136 Trieste (Italy); Kavli IPMU (WPI), University of Tokyo, 5-1-5 Kashiwanoha, 277-8583 Kashiwa (Japan)
2015-11-05
We perform a detailed analysis of the one-loop corrections to the light neutrino mass matrix within low scale type I seesaw extensions of the Standard Model and their implications in experimental searches for neutrinoless double beta decay. We show that a sizable contribution to the effective Majorana neutrino mass from the exchange of heavy Majorana neutrinos is always possible, provided one requires a fine-tuned cancellation between the tree-level and one-loop contribution to the light neutrino masses. We quantify the level of fine-tuning as a function of the seesaw parameters and introduce a generalisation of the Casas-Ibarra parametrization of the neutrino Yukawa matrix, which easily allows to include the one-loop corrections to the light neutrino masses.
15. Confronting SUSY models with LHC data via electroweakino production
International Nuclear Information System (INIS)
Arina, Chiara; Chala, Mikael; Martin-Lozano, Victor; Bonn Univ.; Nardini, Germano
2016-12-01
We investigate multi-lepton signals produced by ElectroWeakino (EWino) decays in the MSSM and the TMSSM scenarios with sfermions, gluinos and non Standard Model Higgses at the TeV scale, being the Bino electroweak-scale dark matter. We recast the present LHC constraints on EWinos for these models and we find that wide MSSM and TMSSM parameter regions prove to be allowed. We forecast the number of events expected in the signal regions of the experimental multi-lepton analyses in the next LHC runs. The correlations among these numbers will help to determine whether future deviations in multi-lepton data are ascribable to the EWinos, as well as the supersymmetric model they originate from.
16. Confronting SUSY models with LHC data via electroweakino production
Energy Technology Data Exchange (ETDEWEB)
Arina, Chiara [Centre for Cosmology, Particle Physics and Phenomenology (CP3),Université catholique de Louvain,B-1348 Louvain-la-Neuve (Belgium); Chala, Mikael [Deutsches Elektronen Synchrotron,Notkestrasse 85, D-22603, Hamburg (Germany); Martín-Lozano, Víctor [Departamento de Física Teórica & Instituto de Física Teórica UAM/CSIC,Universidad Autónoma de Madrid,E-28049, Madrid (Spain); Bethe Center for Theoretical Physics & Physikalisches Institut der Universität Bonn,Nußallee 12, 53115, Bonn (Germany); Nardini, Germano [Albert Einstein Center for Fundamental Physics, Institute for Theoretical Physics,University of Bern,Sidlerstrasse 5, CH-3012 Bern (Switzerland)
2016-12-29
We investigate multi-lepton signals produced by ElectroWeakino (EWino) decays in the MSSM and the TMSSM scenarios with sfermions, gluinos and non Standard Model Higgses at the TeV scale, with dark matter due to electroweak-scale Binos. We recast the present LHC constraints on EWinos for these models and we find that wide MSSM and TMSSM parameter regions prove to be allowed. We forecast the number of events expected in the signal regions of the experimental multi-lepton analyses in the next LHC runs. The correlations among these numbers will help to determine whether future deviations in multi-lepton data are ascribable to the EWinos, as well as the supersymmetric model they originate from.
17. Results on SUSY and Higgs searches at CMS
CERN Multimedia
CERN. Geneva
2011-01-01
We present the results of searches for Supersymmetry and the Higgs boson performed using data collected in 2010 by the CMS experiment at the LHC in pp-collisions at a centre-of-mass energy of 7 TeV. Searches for Supersymmetry are performed in all-hadronic final states with jets and missing transverse energy and in final states including one or more isolated leptons or photons. No evidence for new physics is observed and limits are set on the predictions of a range of Supersymmetric scenarios. The results of searches for the Higgs boson are presented and limits set.
18. Extracting SUSY parameters from selectron and chargino production
International Nuclear Information System (INIS)
Diaz, M.A.
1997-08-01
We review the extraction of fundamental supersymmetric parameters from experimental observables related to the detection of charginos and selectrons at e + e - colliders. We consider supergravity models with universal scalar and gaugino masses and radiatively broken electroweak symmetry. Two scenarios are considered: (a) the lightest chargino is light enough to be produced at LEP2, and (b) the right handed selectron is light enough to be produced at LEP2. We show how the validity of supergravity models can be tested even if experimental errors are large. Interesting differences between the spectrum in the two scenarios are pointed out. (author). 16 refs, 9 figs
19. Searches for electroweak SUSY with ATLAS at HL-LHC
CERN Document Server
Amoroso, Simone; The ATLAS collaboration
2018-01-01
The High Luminosity-Large Hadron Collider (HL-LHC) is expected to start in 2026 and to pro- vide an integrated luminosity of 3000 fb$^{−1}$ in ten years, a factor 10 more than what will be collected by 2023. This high statistics will allow ATLAS to improve searches for new physics at the TeV scale. In this talk search prospects for the electroweak production of supersymmetric particles are presented.
20. Mixing and mass transfer in a pilot scale U-loop bioreactor
DEFF Research Database (Denmark)
2017-01-01
A system capable of handling a large volumetric gas fraction while providing a high gas to liquid mass transfer is a necessity if the metanotrophic bacterium Methylococcus capsulatus is to be used in single cell protein (SCP) production. In this study mixing time and mass transfer coefficients we...
1. Nine cases of nonpalpable testicular mass. An incidental finding in a large scale ultrasonography survey
International Nuclear Information System (INIS)
Avci, A.; Eken, C.; Ozgok, Y.; Erol, B.
2008-01-01
Nonpalpable testicular masses are usually diagnosed during routine ultrasonography (US) examinations for other conditions. There are conflicting results on the final diagnosis and management of these lesions. In the present study we report the results of a large US series of 5104 patients on nonpalpable testicular masses and discuss the management of these patients. This retrospective observational study was performed in a secondary care military hospital. A total of 5104 patients underwent a US and 11 of them were diagnosed as having a nonpalpable testicular mass. These 11 patients also underwent magnetic resonance imaging (MRI). Two of them refused surgery and were excluded from the study. The remaining nine patients underwent intraoperative US-guided localization and excisional biopsy of the non-palpable testicular parenchymal mass. A radical orchiectomy was required in all of them. US and MRI findings, frozen and final pathology results were recorded. The median age of study subjects was 24 years. The final pathology revealed a malign tumor in eight patients and an inflammatory mass in one patient. There were inconsistent results in four patients between frozen section analysis and final pathology. MRI improved the definition of the solid masses in all patients. MRI enhances the certainty of the diagnosis of malignity in nonpalpable testicular masses, particularly in conditions that generally can not be diagnosed with ultrasonography alone. Frozen section analysis is not an accredited method in diagnosing malign lesions in non-palpable testicular masses. (author)
2. SARAH 4: A tool for (not only SUSY) model builders
Science.gov (United States)
Staub, Florian
2014-06-01
We present the new version of the Mathematica package SARAH which provides the same features for a non-supersymmetric model as previous versions for supersymmetric models. This includes an easy and straightforward definition of the model, the calculation of all vertices, mass matrices, tadpole equations, and self-energies. Also the two-loop renormalization group equations for a general gauge theory are now included and have been validated with the independent Python code PyR@TE. Model files for FeynArts, CalcHep/CompHep, WHIZARD and in the UFO format can be written, and source code for SPheno for the calculation of the mass spectrum, a set of precision observables, and the decay widths and branching ratios of all states can be generated. Furthermore, the new version includes routines to output model files for Vevacious for both, supersymmetric and non-supersymmetric, models. Global symmetries are also supported with this version and by linking Susyno the handling of Lie groups has been improved and extended.
3. Soil organic matter dynamics and CO2 fluxes in relation to landscape scale processes: linking process understanding to regional scale carbon mass-balances
Science.gov (United States)
Van Oost, Kristof; Nadeu, Elisabet; Wiaux, François; Wang, Zhengang; Stevens, François; Vanclooster, Marnik; Tran, Anh; Bogaert, Patrick; Doetterl, Sebastian; Lambot, Sébastien; Van wesemael, Bas
2014-05-01
In this paper, we synthesize the main outcomes of a collaborative project (2009-2014) initiated at the UCL (Belgium). The main objective of the project was to increase our understanding of soil organic matter dynamics in complex landscapes and use this to improve predictions of regional scale soil carbon balances. In a first phase, the project characterized the emergent spatial variability in soil organic matter storage and key soil properties at the regional scale. Based on the integration of remote sensing, geomorphological and soil analysis techniques, we quantified the temporal and spatial variability of soil carbon stock and pool distribution at the local and regional scales. This work showed a linkage between lateral fluxes of C in relation with sediment transport and the spatial variation in carbon storage at multiple spatial scales. In a second phase, the project focused on characterizing key controlling factors and process interactions at the catena scale. In-situ experiments of soil CO2 respiration showed that the soil carbon response at the catena scale was spatially heterogeneous and was mainly controlled by the catenary variation of soil physical attributes (soil moisture, temperature, C quality). The hillslope scale characterization relied on advanced hydrogeophysical techniques such as GPR (Ground Penetrating Radar), EMI (Electromagnetic induction), ERT (Electrical Resistivity Tomography), and geophysical inversion and data mining tools. Finally, we report on the integration of these insights into a coupled and spatially explicit model and its application. Simulations showed that C stocks and redistribution of mass and energy fluxes are closely coupled, they induce structured spatial and temporal patterns with non negligible attached uncertainties. We discuss the main outcomes of these activities in relation to sink-source behavior and relevance of erosion processes for larger-scale C budgets.
4. Dark matter and the Higgs in natural SUSY
Energy Technology Data Exchange (ETDEWEB)
Basirnia, Aria; Macaluso, Sebastian; Shih, David [NHETC, Department of Physics and Astronomy, Rutgers University, Piscataway, NJ 08854 (United States)
2017-03-14
Null results from dark matter (DM) direct detection experiments and the 125 GeV Higgs both pose serious challenges to minimal supersymmetry. In this paper, we propose a simple extension of the MSSM that economically solves both problems: a “dark sector” consisting of a singlet and a pair of SU(2) doublets. Loops of the dark sector fields help lift the Higgs mass to 125 GeV consistent with naturalness, while the lightest fermion in the dark sector can be viable thermal relic DM, provided that it is mostly singlet. The DM relic abundance is controlled by s-wave annihilation to tops and Higgsinos, leading to a tight relation between the relic abundance and the spin-dependent direct detection cross section. As a result, the model will be fully probed by the next generation of direct detection experiments. Finally we discuss the discovery potential at LHC Run II.
5. Search for SUSY in final states with photons at CMS
Directory of Open Access Journals (Sweden)
Ntomari Eleni
2013-05-01
Full Text Available Résumé The Compact Muon Solenoid (CMS collaboration has developed a complete program of searches beyond the Standard Model (SM covering a wide range of final states. This document focuses on searches in final states with photons and missing transverse energy ETmiss organised in three analyses. The first two include comparison of the ETmiss distribution (isolation sideband method in events with either at least two photons plus at least one hadronic jet, or at least one photon plus at least two hadronic jets. The third analysis corresponds to a new approach, the Jet-Gamma Balance (JGB method, for events with at least one photon plus at least three hadronic jets.We observe no significant deviations from the SM expectation and thus derive upper limits on the signal cross section at the 95% confidence level (CL for a range of squark, gluino and neutralino mass points in the Gauge Mediated Supersymmetry Breaking scenario.
6. Agent-Based Simulation of Mass Shootings: Determining How to Limit the Scale of a Tragedy
OpenAIRE
Roy Hayes; Reginald Hayes
2014-01-01
An agent-based simulation was created to examine key parameters in mass shootings. The goal of the simulation was to examine the potential effectiveness of Senator Dianne Feinstein’s (D-Calif.) assault weapons and high-capacity magazines bill. Based on the analysis, the proposed law would have a negligible effect on the number of people shot during mass shootings. The assault weapons portion of the proposed bill will have no effect on the number of people killed or wounded in a mass shootin...
7. Susy-QCD corrections to neutrlino pair production in association with a jet
Energy Technology Data Exchange (ETDEWEB)
Cullen, Gavin [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Greiner, Nicolas; Heinrich, Gudrun [Max-Planck-Institut fuer Physik, Muenchen (Germany)
2012-12-15
We present the NLO Susy-QCD corrections to the production of a pair of the lightest neutralinos plus one jet at the LHC, appearing as a monojet signature in combination with missing energy. We fully include all non-resonant diagrams, i.e. we do not assume that production and decay factorise. We derive a parameter point based on the p19MSSM which is compatible with current experimental bounds and show distributions based on missing transverse energy and jet observables. Our results are produced with the program GoSam for automated one-loop calculations in combination with MadDipole/- MadGraph for the real radiation part.
8. SUSY-QCD corrections to Higgs boson production at hadron colliders
International Nuclear Information System (INIS)
1999-12-01
We analyze the next-to-leading order SUSY-QCD corrections to the production of Higgs particles at hadron colliders in supersymmetric extensions of the standard model. Besides the standard QCD corrections due to gluon exchange and emission, genuine supersymmetric corrections due to the virtual exchange of squarks and gluinos are present. At both the Tevatron and the LHC, these corrections are found to be small in the Higgs-strahlung, Drell-Yan-like Higgs pair production and vector boson fusion processes. (orig.)
9. Prospects for (non-SUSY) new physics with first LHC data
International Nuclear Information System (INIS)
Butterworth, Jonathan
2007-01-01
The ATLAS and CMS experiments will take first data soon. I consider here the prospects for new physics (excluding SUSY) with a few fb -1 of data. This means processes with signal cross sections of a few 100 fb or less, with clear and fairly simple signatures--precision comparison of data to Standard Model tails will take longer, needing more luminosity and very good understanding of detector calibrations, resolutions and trigger efficiencies. The approach I take here is signature rather than model based, but examples of models will be given
10. On new scaling group of transformation for Prandtl-Eyring fluid model with both heat and mass transfer
Science.gov (United States)
Rehman, Khalil Ur; Malik, Aneeqa Ashfaq; Malik, M. Y.; Tahir, M.; Zehra, Iffat
2018-03-01
A short communication is structured to offer a set of scaling group of transformation for Prandtl-Eyring fluid flow yields by stretching flat porous surface. The fluid flow regime is carried with both heat and mass transfer characteristics. To seek solution of flow problem a set of scaling group of transformation is proposed by adopting Lie approach. These transformations are used to step down the partial differential equations into ordinary differential equations. The reduced system is solved by numerical method termed as shooting method. A self-coded algorithm is executed in this regard. The obtain results are elaborated by means of figures and tables.
11. Measurement of the High-Mass Drell-Yan Cross Section and Limits on Quark-Electron Compositeness Scales
International Nuclear Information System (INIS)
Grinstein, S.; Mostafa, M.; Piegaia, R.; Alves, G.A.; Carvalho, W.; Maciel, A.K.; Motta, H. da; Oliveira, E.; Santoro, A.; Lima, J.G.; Oguri, V.; Gomez, B.; Hoeneisen, B.; Mooney, P.; Negret, J.P.; Ducros, Y.; Beri, S.B.; Bhatnagar, V.; Kohli, J.M.; Singh, J.B.; Shivpuri, R.K.; Acharya, B.S.; Banerjee, S.; Dugad, S.R.; Gupta, A.; Krishnaswamy, M.R.; Mondal, N.K.; Narasimham, V.S.; Parua, N.; Shankar, H.C.; Park, Y.M.; Choi, S.; Kim, S.K.; Castilla-Valdez, H.; Gonzalez Solis, J.L.; Hernandez-Montoya, R.; Magana-Mendoza, L.; Sanchez-Hernandez, A.; Pawlik, B.; Gavrilov, V.; Gershtein, Y.; Kuleshov, S.; Belyaev, A.; Dudko, L.V.; Ermolov, P.; Karmanov, D.; Leflat, A.; Manankov, V.; Merkin, M.; Shabalina, E.; Abramov, V.; Babintsev, V.V.; Bezzubov, V.A.; Bojko, N.I.; Burtovoi, V.S.; Chekulaev, S.V.; Denisov, S.P.; Dyshkant, A.; Eroshin, O.V.; Evdokimov, V.N.; Galyaev, A.N.; Goncharov, P.I.; Gurzhiev, S.N.; Kostritskiy, A.V.; Kozelov, A.V.; Kozlovsky, E.A.; Mayorov, A.A.; Babukhadia, L.; Davis, K.; Fein, D.; Forden, G.E.; Guida, J.A.; Johns, K.; Nang, F.; Narayanan, A.; Rutherfoord, J.; Shupe, M.; Aihara, H.; Barberis, E.; Clark, A.R.
1999-01-01
We present a measurement of the Drell-Yan cross section at high dielectron invariant mass using 120 pb -1 of data collected in p bar p collisions at √ (s) =1.8 TeV by the D0 Collaboration during 1992 - 1996. No deviation from standard model expectations is observed. We use the data to set limits on the quark-electron compositeness scale. The 95% confidence level lower limits on the compositeness scale vary between 3.3 and 6.1thinspthinspTeV depending on the assumed form of the effective contact interaction. copyright 1999 The American Physical Society
12. On the relation between E.M. mass differences and scaling in deep inelastic scattering, ch. 1
International Nuclear Information System (INIS)
Holwerda, M.J.
1977-01-01
The author concentrates on the problem of electromagnetic mass differences. The possible connection with the experimental phenomenon of Bjorken-scaling in deep inelastic electron-nucleon scattering is investigated. He starts from the formalism, implied by the ansatz by H. Fritsch and M. Gell-Mann for a light cone algebra of (bilocal) current operators, that is abstracted from free field theory. Later on the problem is reconsidered with the help of field theoretic techniques in the framework of a color gauge theory model for the strong interactions; this theory exhibits the property of 'asymptotic freedom' and thus offers the famous explanation for (approximate) Bjorken scaling
13. A low-energy β-function in a finite super-Yang-Mills model with multiple mass scales
International Nuclear Information System (INIS)
Foda, O.; Helayel-Neto, J.A.
1984-08-01
We compute the one-loop contribution to the low-energy light-fermion gauge coupling in a finite supersymmetric gauge theory with two mass scales: a heavy mass that breaks an initial N=4 supersymmetry down to N=2, but respects the finiteness, and a light mass that, for simplicity, is set to zero. We find that the coupling grows with the mass of the heavy intermediate states. Hence the latter do not decouple at low energies, leading to large logarithms that invalidate low-energy perturbation theory. Consequently, further manipulations are required to obtain a meaningful perturbative expansion. Enforcing decoupling through finite renormalizations, that absorb the heavy mass effects into a redefinition of the parameters of the Lagrangian, introduces an arbitrary subtraction mass μ. The requirement that the S-matrix elements be independent of μ leads to a non-trivial renormalization-group equation for the low-energy theory, with a non-vanishing β-function. (author)
14. Breeding and mass-scale rearing of three spotted seahorse, Hippocampus trimaculatus Leach under captive conditions
Digital Repository Service at National Institute of Oceanography (India)
Murugan, A.; Dhanya, S.; Sreepada, R.A.; Rajagopal, S.; Balasubramanian, T.
ornamental fish markets (Project Seahorse, 2006). 3 Compared to the proposition of mass culture of other seahorse species, H. trimaculatus, inhabiting different geographical regions, has not been thought of seriously from a commercial standpoint...
15. Comparison of direct and geodetic mass balances on a multi-annual time scale
Directory of Open Access Journals (Sweden)
A. Fischer
2011-02-01
Full Text Available The geodetic mass balances of six Austrian glaciers over 19 periods between 1953 and 2006 are compared to the direct mass balances over the same periods. For two glaciers, Hintereisferner and Kesselwandferner, case studies showing possible reasons for discrepancies between the geodetic and the direct mass balance are presented. The mean annual geodetic mass balance for all periods is −0.5 m w.e. a−1, the mean annual direct mass balance −0.4 m w.e. a−1. The mean cumulative difference is −0.6 m w.e., the minimum −7.3 m w.e., and the maximum 5.6 m w.e. The accuracy of geodetic mass balance may depend on the accuracy of the DEMs, which ranges from 2 m w.e. for photogrammetric data to 0.02 m w.e. for airborne laser scanning (LiDAR data. Basal melt, seasonal snow cover, and density changes of the surface layer also contribute up to 0.7 m w.e. to the difference between the two methods over the investigated period of 10 yr. On Hintereisferner, the fraction of area covered by snow or firn has been changing within 1953–2006. The accumulation area is not identical with the firn area, and both are not coincident with areas of volume gain. Longer periods between the acquisition of the DEMs do not necessarily result in a higher accuracy of the geodetic mass balance. Trends in the difference between the direct and the geodetic data vary from glacier to glacier and can differ systematically for specific glaciers under specific types of climate forcing. Ultimately, geodetic and direct mass balance data are complementary, and great care must be taken when attempting to combine them.
16. Rate of mass deposition of scaling compounds from seawater on the outer surface of heat exchangers in MED evaporators
Energy Technology Data Exchange (ETDEWEB)
Omar, W. [Department of Natural Resources and Chemical Engineering, Tafila Technical University, Tafila (Jordan); Ulrich, J. [FB Ingenieurwissenschaften, Institut fuer Verfahrenstechnik/TVT, Martin-Luther-Universitaet Halle-Wittenberg, Halle (Germany)
2006-08-15
The scaling problem in Multi Effect Distillation (MED) evaporators is investigated by the experimental measurement of the deposition rate under different operating conditions. The measurements are conducted in a batch vessel containing artificial seawater, which is allowed to contact the outer surface of a hot pipe under controlled temperature, salinity and pH. The rate of mass deposition is higher at elevated temperature. The salinity of the seawater also influences the scaling process - an increase in salinity from 47-59 g/L leads to an increase of 75.6 % in the deposition rate. Decreasing the pH value of seawater to 2.01 results in a complete inhibition of scaling, whereas the severity of the scaling increases in neutral and basic mediums. Polyacrylic acid is tested as an antifoulant and it was found that its presence in seawater reduces the scaling process. The nature of the heat transfer surface material also plays an important role in the scaling process. It is found experimentally that the rate of scaling is higher in the case of a Cu-Ni alloy as the surface material of the tube rather than stainless steel. (Abstract Copyright [2006], Wiley Periodicals, Inc.)
17. The di-photon excess in a perturbative SUSY model
Energy Technology Data Exchange (ETDEWEB)
Benakli, Karim, E-mail: [email protected] [Sorbonne Universités, UPMC Univ Paris 06, UMR 7589, LPTHE, F-75005, Paris (France); CNRS, UMR 7589, LPTHE, F-75005, Paris (France); Darmé, Luc, E-mail: [email protected] [Sorbonne Universités, UPMC Univ Paris 06, UMR 7589, LPTHE, F-75005, Paris (France); CNRS, UMR 7589, LPTHE, F-75005, Paris (France); Sorbonne Universités, Institut Lagrange de Paris (ILP), 98 bis Boulevard Arago, 75014 Paris (France); Goodsell, Mark D., E-mail: [email protected] [Sorbonne Universités, UPMC Univ Paris 06, UMR 7589, LPTHE, F-75005, Paris (France); CNRS, UMR 7589, LPTHE, F-75005, Paris (France); Harz, Julia, E-mail: [email protected] [Sorbonne Universités, UPMC Univ Paris 06, UMR 7589, LPTHE, F-75005, Paris (France); CNRS, UMR 7589, LPTHE, F-75005, Paris (France); Sorbonne Universités, Institut Lagrange de Paris (ILP), 98 bis Boulevard Arago, 75014 Paris (France)
2016-10-15
We show that a 750 GeV di-photon excess as reported by the ATLAS and CMS experiments can be reproduced by the Minimal Dirac Gaugino Supersymmetric Standard Model (MDGSSM) without the need of any ad-hoc addition of new states. The scalar resonance is identified with the spin-0 partner of the Dirac bino. We perform a thorough analysis of constraints coming from the mixing of the scalar with the Higgs boson, the stability of the vacuum and the requirement of perturbativity of the couplings up to very high energy scales. We exhibit examples of regions of the parameter space that respect all the constraints while reproducing the excess. We point out how trilinear couplings that are expected to arise in supersymmetry-breaking mediation scenarios, but were ignored in the previous literature on the subject, play an important role.
18. Shifts in mass-scaling of respiration, feeding, and growth rates across life-form transitions in marine pelagic organisms
DEFF Research Database (Denmark)
Kiørboe, Thomas; Hirst, Andrew G.
2014-01-01
The metabolic rate of organisms may be viewed as a basic property from which other vital rates and many ecological patterns emerge and that follows a universal allometric mass scaling law, or it may be considered a property of the organism that emerges as a result of the adaptation to the environ...... and be the result of the optimization of trade-offs that allow sufficient feeding and growth rates to balance mortality...
19. Anomalous leptonic U(1) symmetry: Syndetic origin of the QCD axion, weak-scale dark matter, and radiative neutrino mass
Science.gov (United States)
Ma, Ernest; Restrepo, Diego; Zapata, Óscar
2018-01-01
The well-known leptonic U(1) symmetry of the Standard Model (SM) of quarks and leptons is extended to include a number of new fermions and scalars. The resulting theory has an invisible QCD axion (thereby solving the strong CP problem), a candidate for weak-scale dark matter (DM), as well as radiative neutrino masses. A possible key connection is a color-triplet scalar, which may be produced and detected at the Large Hadron Collider.
20. Higgs mass in the gauge-Higgs unification
International Nuclear Information System (INIS)
Haba, Naoyuki; Takenaga, Kazunori; Yamashita, Toshifumi
2005-01-01
The gauge-Higgs unification theory identifies the zero mode of the extra-dimensional component of the gauge field as the usual Higgs doublet. Since this degree of freedom is the Wilson line phase, the Higgs does not have the mass term nor quartic coupling at the tree level. Through quantum corrections, the Higgs can take a vacuum expectation value, and its mass is induced. The radiatively induced mass tends to be small, although it can be lifted to O(100) GeV by introducing the O(10) numbers of bulk fields. Perturbation theory becomes unreliable when a large number of bulk fields are introduced. We reanalyze the Higgs mass based on useful expansion formulae for the effective potential and find that even a small number of bulk field can have the suitable heavy Higgs mass. We show that a small (large) number of bulk fields are enough (needed) when the SUSY breaking mass is large (small). We also study the case of introducing the soft SUSY breaking scalar masses in addition to the Scherk-Schwarz SUSY breaking and obtain the heavy Higgs mass due to the effect of the scalar mass | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9180156588554382, "perplexity": 3025.763640859863}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155676.21/warc/CC-MAIN-20180918185612-20180918205612-00032.warc.gz"} |
http://usersguidetotheuniverse.com/index.php/2011/11/02/what-is-the-biggest-problem-in-physics/ | # What is the biggest problem in physics?
I like to be reasonably forthcoming both here and in my “Ask a Physicist” columns at io9 about what we do and don’t know about the world. As successful as physics (and in particular, the idea of symmetry) has been in unifying various phenomena, there are at least two classes of questions that we don’t seem to be particularly close to answering at all:
1. Why these symmetries and not others?
It seems very strange that the laws of the universe are symmetric under CPT transformations (simultaneously flipping the arrow of time, looking at the universe in a mirror, and trading every particle for its antiparticle) or the continuous “U(1) symmetry,” while other symmetries, like “SU(5),” (which was thought to be a prime candidate for a Grand Unified Theory), turn out to be wrong, experimentally.
All we can do is check with the universe and see whether certain symmetries hold, and if they don’t, check other symmetries instead.
2. What about all of the free parameters?
Some of my colleagues are experimental neutrino physicists. They spend their efforts trying to figure out the masses and mixing angles between the various neutrino species — numbers that tell us, essentially how likely it is that one type of neutrino turns into another. But these angles and the masses, and the mixing angles in quarks and the strength of the various forces and so forth… all of these numbers have to be put into our theories more or less by hand.
Even “obvious” numbers like the number of spatial dimensions in the universe or the fact that there are three generations of quarks and leptons ($e^-, mu^-,tau^-$, for instance) are put in in a completely ad hoc way.
Many, perhaps all of these numbers may not ultimately have a deeper explanation. They may, in fact, vary significantly over the multiverse. This is the origin, as you may know, the so-called “weak anthropic principle.” It’s only in our region of space that the parameters and symmetries are just right to produce complicated life.
But to my mind, these aren’t anywhere near the worst problems in physics. The biggest problem in physics comes from the vacuum all around us. I don’t want to make this an overly mathematical discussion, but I do want to give you a feel of why the vacuum poses such a big problem in physics. But first, let me give you a simple result that comes from the Uncertainty Principle of quantum mechanics.
Suppose you had a little mass on a spring.
This is a good model for lots of physical systems. The most obvious is molecules, which are in a continuous state of oscillation, but as we’ll see, if we take a lot of these, it turns out to be a great model for the universe as a whole. No matter how much you cool down your oscillator, it turns out that you can’t extract all of the energy. There’s a lowest possible energy, which is:
$displaystyle E_0=frac{1}{2}hbar omega$
where $hbar$ is the reduced Planck constant (which basically says that we’re doing quantum mechanics) and $omega$ is the angular frequency of the oscillator.
One way of thinking of this is that if it were possible to stop the oscillations exactly, you’d be able to know the exact position of the mass (the equilibrium position) and the exact momentum (zero) simultaneously. That is expressly forbidden by the Uncertainty Principle.
Now here’s the big twist: There are fields surrounding us, even in empty space, and the way a physicist might imagine it, the field behaves a lot like a rubber sheet or a mattress:
What you see here is a cartoon version of a field (like the electromagnetic field) in a two dimensional universe. The height of each of the points is something like the amplitude of the field. In this picture, we basically have two particles flying around, hence two peaks.
(Notes to experts: a) I realize that this really only describes a spin-zero field, and even so, we could have troughs or imaginary numbers as well as positive amplitudes. b) Nobody likes a showoff.)
But then quantum mechanics intervenes. I described our field as behaving exactly like little masses on springs. As a result of that, every single spring contributes some minimum amount of energy to the universe. Given that there are an infinite number of them, this is an infinite contribution — an infinite vacuum energy density.
In practice, we expect that you wouldn’t get any oscillations smaller than the Planck Length, about $10^{-35} m$. This is the scale where quantum mechanics and gravity combine to make all of our knowledge of physics completely useless. Saying anything smaller than the Planck scale just makes us look silly.
So the good news is that the vacuum energy isn’t infinite. The bad news comes in two parts:
1. Even if the vacuum energy density isn’t infinite, it still ends up being about $10^{96} kg/m^3$, or about 120 orders of magnitude denser than the universe itself.
2. Experimentally, there really is a non-zero vacuum density out there. I’m not going to get into the Casimir effect, but the basic idea is that you can use metal plates to measure a force from the vacuum directly. The diagram up top or the wikipedia link may be of some help, but in either case, it’s a discussion for another day.
If the vacuum energy is so huge (and real), why don’t we see it gravitationally?
Ah, but we do see a gravitational source in the universe that has the exact properties of the vacuum energy (including a bizarre “negative pressure.”) It’s called “Dark Energy” or “Cosmological Constant,” and as you may recall, it’s the mysterious substance that drives the acceleration of the universe. Unfortunately, the cosmological constant is about $10^{120}$ times smaller than reasonable estimates of the vacuum energy.
This, in my opinion, is the worst problem in physics.
Without getting into even further anthropic arguments, the question remains as to why we should have any cosmological constant at all?
And yet, as the Nobel committee recently confirmed, we do seem to have just that.
Curious universe.
-Dave
This entry was posted in Uncategorized and tagged , . Bookmark the permalink. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 7, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8055911064147949, "perplexity": 323.2846302180654}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607593.1/warc/CC-MAIN-20170523083809-20170523103809-00464.warc.gz"} |
http://math.stackexchange.com/questions/214634/prove-that-sum-k-1n-frac2k1a-1a-2-a-k4-sum-k-1n-frac1a-k | # Prove that $\sum_{k=1}^n \frac{2k+1}{a_1+a_2+…+a_k}<4\sum_{k=1}^n\frac1{a_k}.$
Prove that for $a_k>0,k=1,2,\dots,n$,
$$\sum_{k=1}^n \frac{2k+1}{a_1+a_2+\ldots+a_k}<4\sum_{k=1}^n\frac1{a_k}\;.$$
-
I must confess this problem took me a very long time!
Step1. If $a_1,a_2,\alpha,\beta,\gamma$ are positive real numbers and $\gamma=\alpha+\beta$ holds, $$\frac{\gamma^2}{a_1+a_2}\leq \frac{\alpha^2}{a_1}+\frac{\beta^2}{a_2}$$ holds too, since it is equivalent to $(\alpha a_2-\beta a_1)^2\geq 0$.
Step2. If $a_1,a_2,\alpha,\beta,\gamma,\delta$ are positive real numbers and $\delta=\alpha+\beta+\gamma$ holds, $$\frac{\delta^2}{a_1+(a_2+a_3)}\leq \frac{\alpha^2}{a_1}+\frac{(\beta+\gamma)^2}{a_2+a_3}\leq\frac{\alpha^2}{a_1}+\frac{\beta^2}{a_2}+\frac{\gamma^2}{a_3}$$ holds too, in virtue of Step2. By induction, it is easy to prove the analogous statement for $k$ variables $a_1,\ldots,a_k$. In fact, this is useless to the proof, but quite interesting in itself :)
Step3. By Step1, $$\sum_{k=1}^{n}\frac{2k+1}{a_1+\ldots+a_k}-\frac{4}{a_n}\leq \sum_{k=1}^{n-1}\frac{2k+1}{a_1+\ldots+a_k}+\frac{(\sqrt{2n+1}-2)^2}{a_1+\ldots+a_{n-1}}\leq \sum_{k=1}^{n-2}\frac{2k+1}{a_1+\ldots+a_k}+\frac{n^2}{a_1+\ldots+a_{n-1}}$$
Step4. By Step3, $$\sum_{k=1}^{n}\frac{2k+1}{a_1+\ldots+a_k}-\left(\frac{4}{a_n}+\frac{4}{a_{n-1}}\right)\leq \sum_{k=1}^{n-2}\frac{2k+1}{a_1+\ldots+a_k}+\frac{(n-2)^2}{a_1+\ldots+a_{n-2}}\leq \sum_{k=1}^{n-3}\frac{2k+1}{a_1+\ldots+a_k}+\frac{(n-1)^2}{a_1+\ldots+a_{n-2}}.$$
Step5. By Step3, Step4, induction and Step1 again: $$\sum_{k=1}^{n}\frac{2k+1}{a_1+\ldots+a_k}\leq \frac{3}{a_1}+\frac{9}{a_2}+\sum_{j=3}^{n}\frac{4}{a_j}\leq \sum_{j=1}^{n}\frac{4}{a_j}.$$
-
In fact, it is much easier to prove the stronger inequality: $$\sum_{k=1}^{n}\frac{2k+1}{a_1+\ldots+a_k}\leq -\frac{n^2}{a_1+\ldots+a_n}+\sum_{k=1}^{n}\frac{4}{a_k}.$$ – Jack D'Aurizio Oct 30 '12 at 9:17 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9717926979064941, "perplexity": 281.1069690610121}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997865523.12/warc/CC-MAIN-20140722025745-00106-ip-10-33-131-23.ec2.internal.warc.gz"} |
http://wikidoc.org/index.php/Italian_language | # Italian language
Italian
Italiano
Pronunciation: /itaˈljaːno/
Spoken in: Italy, San Marino, Vatican City, Slovenia, Switzerland, Croatia.
Used by a significant part of population in: Monaco, Albania, France (Corsica and Nice), Croatia (Istria), Malta, Eritrea and Somalia. Significant immigrant communities are found throughout the Americas (primarily Argentina, Brazil, Canada, Uruguay, United States and Venezuela), Australia, and Western Europe (primarily in Belgium, France, Germany, Luxembourg, and the United Kingdom).
Total speakers: 62 million[1]
Ranking: 19
Language family: Indo-European
Italic
Romance
Italo-Western
Italo-Dalmatian
Italian
Official status
Official language of: Template:EUR
Italy
Switzerland
Template:SMR
Template:Country data Vatican City Vatican City
22px Sovereign Military Order of Malta
Template:CRO (Istria)
Template:SVN
(Pirano, Isola d'Istria and Capodistria)
Language codes
ISO 639-1: it
ISO 639-2: ita
ISO 639-3: ita — Italian (generic)
Italian (italiano , or lingua italiana) is a Romance language spoken by about 63 million people,[2] primarily in Italy. In Switzerland, Italian is one of four official languages. It is also the official language of San Marino and Vatican City. Standard Italian, adopted by the state after the unification of Italy, is based on Tuscan dialect and is somewhat intermediate between Italo-Dalmatian languages of the South and Northern Italian dialects of the North.
Unlike most other Romance languages, Italian has retained the contrast between short and long consonants which existed in Latin. As in most Romance languages, stress is distinctive. Of the Romance languages, Italian is considered to be one of the closest resembling Latin in terms of vocabulary,[3] though Romanian most closely preserves the noun declension system of Classical Latin, and Spanish the verb conjugation system (see Old Latin), while Sardinian is the most conservative in terms of phonology.
It is affectionately called il parlar gentile (the gentle language) by its speakers.
## History
The history of the Italian language is long, but the modern standard of the language was largely shaped by relatively recent events. The earliest surviving texts which can definitely be called Italian (or more accurately, vernacular, as opposed to its predecessor Vulgar Latin) are legal formulae from the region of Benevento dating from 960-963.[4] What would come to be thought of as Italian was first formalized in the first years of the 14th century through the works of Dante Alighieri, who mixed southern Italian languages, especially Sicilian, with his native Tuscan in his epic poems known collectively as the Commedia, to which Giovanni Boccaccio later affixed the title Divina. Dante's much-loved works were read throughout Italy and his written dialect became the "canonical standard" that others could all understand. Dante is still credited with standardizing the Italian language and, thus, the dialect of Tuscany became the basis for what would become the official language of Italy.
Italy has always had a distinctive dialect for each city, since the cities were until recently thought of as city-states. The latter does now have considerable variety, however. As Tuscan-derived Italian came to be used throughout the nation, features of local speech were naturally adopted, producing various versions of Regional Italian. The most characteristic differences, for instance, between Roman Italian and Milanese Italian are the gemination of initial consonants and the pronunciation of stressed "e", and of "s" in some cases (e.g. va bene "all right": is pronounced [va bˈbɛne] by a Roman, [va ˈbene] by a Milanese; a casa "at home": Roman [a kˈkasa], Milanese [a ˈkaza]).
In contrast to the dialects of northern Italy, southern Italian dialects were largely untouched by the Franco-Occitan influences introduced to Italy, mainly by bards from France, during the Middle Ages. Even in the case of Northern Italian dialects, however, scholars are careful not to overstate the effects of outsiders on the natural indigenous developments of the languages. (See La Spezia-Rimini Line.)
The economic might and relative advanced development of Tuscany at the time (Late Middle Ages), gave its dialect weight, though Venetian remained widespread in medieval Italian commercial life. Also, the increasing cultural relevance of Florence during the periods of 'Umanesimo (Humanism)' and the Rinascimento (Renaissance) made its volgare (dialect), or rather a refined version of it, a standard in the arts. The re-discovery of Dante's De vulgari eloquentia and a renewed interest in linguistics in the 16th century sparked a debate which raged throughout Italy concerning which criteria should be chosen to establish a modern Italian standard to be used as much as a literary as a spoken language. Scholars were divided into three factions: the purists, headed by Pietro Bembo who in his Gli Asolani claimed that the language might only be based on the great literary classics (notably, Petrarch, and Boccaccio but not Dante as Bembo believed that the Divine Comedy was not dignified enough as it used elements from other dialects), Niccolò Machiavelli and other Florentines who preferred the version spoken by ordinary people in their own times, and the Courtesans like Baldassarre Castiglione and Gian Giorgio Trissino who insisted that each local vernacular must contribute to the new standard. Eventually Bembo's ideas prevailed, the result being the publication of the first Italian dictionary in 1612 and the foundation of the Accademia della Crusca.
Italian literature's first modern novel, I Promessi Sposi (The Betrothed), by Alessandro Manzoni further defined the standard by "rinsing" his Milanese 'in the waters of the Arno" (Florence's river), as he states in the Preface to his 1840 edition.
After unification a huge number of civil servants and soldiers recruited from all over the country introduced many more words and idioms from their home dialects ("ciao" is Venetian, "panettone" is Milanese etc.).
## Classification
Italian is most closely related to the other two Italo-Dalmatian languages, Sicilian and the extinct Dalmatian. The three are part of the Italo-Western grouping of the Romance languages, which are a subgroup of the Italic branch of Indo-European.
## Geographic distribution
File:ItalophoneEuropeMap.png
The geographic distribution of the Italian language in Europe.
Italian is the official language of Italy and San Marino, and one of the official languages of Switzerland, spoken mainly in Ticino and Grigioni cantons, a region referred to as Italian Switzerland. It is also the second official language in the Vatican City and in some areas of Istria in Slovenia and Croatia with an Italian minority. It is widely used and taught in Monaco and Malta.[5] It is also widely understood in Corsica, Savoy and Nice (areas that historically spoke Italian dialects before annexation to France), and Albania.
Italian is spoken by some in former Italian colonies in Africa (Libya, Somalia and Eritrea). However, its use has sharply dropped off since the colonial period. While Italian was the language of instruction in Eritrea during the colonial period, as of 1997, there is only one Italian language school remaining, with 470 pupils.[6]
Italian and Italian dialects are widely used by Italian immigrants and their descendants living throughout Western Europe (especially Luxembourg, Germany, the United Kingdom and Belgium), the United States, Canada, Australia, and Latin America (especially Uruguay, Brazil, Argentina, and Venezuela).
In the United States, Italian speakers are most commonly found in four cities: Boston (7,000)[7], Chicago (12,000)[8], New York City (140,000)[9], and Philadelphia (15,000)[10]. In Canada there are large Italian-speaking communities in Montreal (120,000) and Toronto (195,000).[citation needed] Italian is the second most commonly-spoken language in Australia, where 353,605 Italian Australians, or 1.9% of the population, reported speaking Italian at home in the 2001 Census.[11] In 2001 there were 130,000 Italian speakers in Melbourne,[12] and 90,000 in Sydney.[13]
### Italian language education
Italian is widely taught in many schools around the world, but rarely as the first non-native language of pupils. In anglophone parts of Canada, Italian is, after French, the third most taught language. In the United States and the United Kingdom, Italian ranks fourth (after Spanish-French-German and French-German-Spanish respectively). Throughout the world, Italian is the fifth most taught non-native language, after English, French, Spanish, and German.[14]
In the European Union, Italian is spoken as a mother tongue by 13% of the population (mainly in Italy itself) and as a second language by 3%; among EU member states, it is most likely to be desired (and therefore learned) as a second language in Malta (61%), Croatia (14%), Slovenia (12%), Austria (11%), Romania (8%), France (6%), and Greece (6%).[15] It is also an important second language in Albania and Switzerland, which are not EU members or candidates.
### Influence and derived languages
From the late 19th to the mid 20th century, thousands of Italians settled in Argentina, Uruguay and southern Brazil, where they formed a very strong physical and cultural presence (see the Italian diaspora).
In some cases, colonies were established where variants of Italian dialects were used, and some continue to use a derived dialect. An example is Rio Grande do Sul, Brazil, where Talian is used and in the town of Chipilo near Puebla, Mexico each continuing to use a derived form of Venetian dating back to the 19th century. Another example is Cocoliche, an Italian-Spanish pidgin once spoken in Argentina and especially in Buenos Aires, and Lunfardo.
Rioplatense Spanish, and particularly the speech of the city of Buenos Aires, has intonation patterns that resemble those of Italian dialects,[16] due to the fact that Argentina had a constant, large influx of Italian settlers since the second half of the nineteenth century; initially primarily from Northern Italy then, since the beginning of the twentieth century, mostly from Southern Italy.
### Lingua Franca
Starting in late medieval times, Italian language variants replaced Latin to become the primary commercial language for much of Europe (especially the Tuscan and Venetian variants). This became solidified during the Renaissance with the strength of Italian banking and the rise of humanism in the arts.
During the period of the Renaissance, Italy held artistic sway over the rest of Europe. All educated European gentlemen were expected to make the Grand Tour, visiting Italy to see its great historical monuments and works of art. It thus became expected that educated Europeans would learn at least some Italian; the English poet John Milton, for instance, wrote some of his early poetry in Italian. In England, Italian became the second most common modern language to be learned, after French (though the classical languages, Latin and Greek, came first). However, by the late eighteenth century, Italian tended to be replaced by German as the second modern language on the curriculum. Yet Italian loanwords continue to be used in most other European languages in matters of art and music.
Today, the Italian language continues to be used as a lingua franca in some environments[citation needed]. Within the Catholic ecclesiastic hierarchy, Italian is known by a large part of members and is used in substitution of Latin in some official documents as well. The presence of Italian as the second official language in the Vatican City indicates not only use in the seat in Rome, but also in the whole world where an episcopal seat is present.
## Dialects
In Italy, all Romance languages spoken as the vernacular in Italy, other than standard Italian and other unrelated, non-Italian languages, are termed "Italian dialects". Many Italian dialects are, in fact, historical languages in their own right[17]. These include recognized language groups such as Friulian, Neapolitan, Sardinian, Sicilian, Venetian, and others, and regional variants of these languages such as Calabrian. Though the division between dialect and language has been used by scholars (such as by Francesco Bruni) to distinguish between the languages that made up the Italian koine, and those which had very little or no part in it, such as Albanian, Greek, German, Ladin, and Occitan, which are still spoken by minorities.
Dialects are generally not used for general mass communication and are usually limited to native speakers in informal contexts. In the past, speaking in dialect was often deprecated as a sign of poor education. Younger generations, especially those under 35 (though it may vary in different areas), speak almost exclusively standard Italian in all situations, usually with local accents and idioms. Regional differences can be recognized by various factors: the openness of vowels, the length of the consonants, and influence of the local dialect (for example, annà replaces andare in the area of Rome for the infinitive "to go").
## Sounds
### Vowels
Italian has seven vowel phonemes: /a/, /e/, /ɛ/, /i/, /o/, /ɔ/, /u/. The pairs /e/-/ɛ/ and /o/-/ɔ/ are seldom distinguished in writing and often confused, even though most varieties of Italian employ both phonemes consistently. Compare, for example: "perché" [perˈkɛ] (why, because) and "senti" [ˈsenti] (you listen, you are listening, listen!), employed by some northern speakers, with [perˈke] and [ˈsɛnti], as pronounced by most central and southern speakers. As a result, the usage is strongly indicative of a person's origin. The standard (Tuscan) usage of these vowels is listed in vocabularies, and employed outside Tuscany mainly by specialists, especially actors and very few (television) journalists. These are truly different phonemes, however: compare /ˈpeska/ (fishing) and /ˈpɛska/ (peach), both spelled pesca (listen ). Similarly /ˈbotte/ ('barrel') and /ˈbɔtte/ ('beatings'), both spelled botte, discriminate /o/ and /ɔ/ (listen ).
In general, vowel combinations usually pronounce each vowel separately. Diphthongs exist (e.g. uo, iu, ie, ai), but are limited to an unstressed u or i before or after a stressed vowel.
The unstressed u in a diphthong approximates the English semivowel w, the unstressed i approximates the semivowel y. E.g.: buono [ˈbwɔno], ieri [ˈjɛri].
Triphthongs exist in Italian as well, like "continuiamo" ("we continue"). Three vowel combinations exist only in the form semiconsonant (/j/ or /w/), followed by a vowel, followed by a desinence vowel (usually /i/), as in miei, suoi, or two semiconsonants followed by a vowel, as the group -uia- exemplified above, or -iuo- in the word aiuola. [18]
### Mobile diphthongs
Many Latin words with a short stressed e or o have Italian counterparts with a mobile diphthong (ie and uo respectively). When the vowel sound is stressed, it is pronounced and written as a diphthong; when not stressed, it is pronounced and written as a single vowel.
So Latin focus gave rise to Italian fuoco (meaning both "fire" and "optical focus"): when unstressed, as in focale ("focal") the "o" remains alone. Latin pes (more precisely its accusative form pedem) is the source of Italian piede (foot): but unstressed "e" was left unchanged in pedone (pedestrian) and pedale (pedal). From Latin iocus comes Italian giuoco ("play", "game"), though in this case gioco is more common: giocare means "to play". From Latin homo comes Italian uomo (man), but also umano (human) and ominide (hominid). From Latin ovum comes Italian uovo (egg) and ovaie (ovaries). (The same phenomenon occurs in Spanish: juego (play, game) and jugar (to play), nieve (snow) and nevar (to snow)).
### Consonants
Two symbols in a table cell denote the voiceless and voiced consonant, respectively.
Consonants of Italian[19]
Bilabial Labio-
dental
Alveolar Post-
alveolar
Palatal Velar
Nasal m n ɲ
Plosive p, b , k, g
Affricate t̪s̪, d̪z̪ ,
Fricative f, v s, z ʃ
Trill r
Lateral l ʎ
Approximant j w
Nasals undergo assimilation when followed by a consonant, e.g., when preceding a velar (/k/ or /g/) only [ŋ] appears, etc.
Italian has geminate, or double, consonants, which are distinguished by length. Length is distinctive for all consonants except for /ʃ/, /ʦ/, /ʣ/, /ʎ/ /ɲ/, which are always geminate, and /z/ which is always single. Geminate plosives and affricates are realised as lengthened closures. Geminate fricatives, nasals, and /l/ are realized as lengthened continuants. The flap consonant /ɾː/ is typically dialectal, and it is called erre moscia. The correct standard pronunciation is [r].
Of special interest to the linguistic study of Italian is the Gorgia Toscana, or "Tuscan Throat", the weakening or lenition of certain intervocalic consonants in Tuscan dialects. See also Syntactic doubling.
### Assimilation
Italian has few diphthongs, so most unfamiliar diphthongs that are heard in foreign words (in particular, those beginning with vowel "a", "e", or "o") will be assimilated as the corresponding diaeresis (i.e., the vowel sounds will be pronounced separately). Italian phonotactics do not usually permit nouns and verbs to end with consonants, excepting poetry and song, so foreign words may receive extra terminal vowel sounds.
## Writing system
File:Jon Hawk.jpg
Example of Italian
${\displaystyle {\mathfrak {N}}}$el mezzo del cammin di nostra vita
mi ritrovai per una selva oscura,
che la diritta via era smarrita.
Ahi quanto a dir qual era è cosa dura
esta selva selvaggia e aspra e forte
che nel pensier rinova la paura!
Tant'è amara che poco è più morte;
ma per trattar del ben ch'i' vi trovai,
dirò de l'altre cose ch'i' v'ho scorte.
(Dante Alighieri), La Divina Commedia, Inferno, I, 1-9, AD 1304-1307
${\displaystyle {\mathfrak {T}}}$utti li stati, tutti e' dominii che hanno avuto et hanno imperio sopra li uomini, sono stati e sono o repubbliche o principati. E' principati sono o ereditarii, de' quali el sangue del loro signore ne sia suto lungo tempo principe, o e' sono nuovi. E' nuovi, o sono nuovi tutti, come fu Milano a Francesco Sforza, o sono come membri aggiunti allo stato ereditario del principe che li acquista, come è el regno di Napoli al re di Spagna. Sono questi dominii così acquistati, o consueti a vivere sotto uno principe, o usi ad essere liberi; et acquistonsi, o con le armi d'altri o con le proprie, o per fortuna o per virtù.
(Niccolò Machiavelli), Principe, Ch. 1, AD 1513
${\displaystyle {\mathfrak {Q}}}$uel ramo del lago di Como, che volge a mezzogiorno, tra due catene non interrotte di monti, tutto a seni e a golfi, a seconda dello sporgere e del rientrare di quelli che, vien, quasi a un tratto, a ristringersi, e a prender corso e figura di fiume, tra un promontorio a destra, e un'ampia costiera dall'altra parte; e il ponte, che ivi congiunge le due rive, par che renda ancor più sensibile all'occhio questa trasformazione, e segni il punto in cui il lago cessa, e l'Adda ricomincia, per ripigliar poi il nome di lago dove le rive, allontanandosi di nuovo, lascian l'acqua distendersi e rallentarsi in nuovi golfi e nuovi seni.
(Alessandro Manzoni), I promessi sposi, Ch.1, AD 1840
Italian is written using the Latin alphabet. The letters J, K, W, X and Y are not considered part of the standard Italian alphabet, but appear in loanwords (such as jeans, whisky, taxi). X has become a commonly used letter in genuine Italian words with the prefix extra-. J in Italian is an old-fashioned orthographic variant of I, appearing in the first name "Jacopo" as well as in some Italian place names, e.g., the towns of Bajardo, Bojano, Joppolo, Jesolo, Jesi, among numerous others, and in the alternate spelling Mar Jonio (also spelled Mar Ionio) for the Ionian Sea. J may also appear in many words from different dialects, but its use is discouraged in contemporary Italian, and it is not part of the standard 21-letter contemporary Italian alphabet. Each of these foreign letters had an Italian equivalent spelling: gi for j, c or ch for k, u or v for w (depending on what sound it makes), s, ss, or cs for x, and i for y.
• Italian uses the acute accent over the letter E (as in perché, why/because) to indicate a front mid-close vowel, and the grave accent (as in , tea) to indicate a front mid-open vowel. The grave accent is also used on letters A, I, O, and U to mark stress when it falls on final vowel of a word (for instance gioventù, youth). Typically, the penultimate syllable is stressed. If syllables other than the last one are stressed, the accent is not mandatory, unlike in Spanish, and, in virtually all cases, it is omitted. In some cases, when the word is ambiguous (as principi), the accent mark is sometimes used in order to disambiguate its meaning (in this case, prìncipi, princes, or princìpi, principles). This is however not compulsory. Rare words with three or more syllables can confuse Italians themselves, and the pronunciation of Istanbul is a common example of a word in which placement of stress is not clearly established. Another instance is the American State of Florida: the correct way to pronounce it in Italian is like in Spanish, "Florìda", but since there is an Italian word meaning the same ("flourishing"), "flòrida", and because of the influence of English, most Italians pronounce it that way.
• The letter H at the beginning of a word is used to distinguish ho, hai, ha, hanno (present indicative of avere, 'to have') from o ('or'), ai ('to the'), a ('to'), anno ('year'). In the spoken language this letter is always silent for the cases given above. H is also used in combinations with other letters (see below), but no phoneme [h] exists in Italian. In foreign words entered in common use, like "hotel" or "hovercraft", the H is commonly silent, so they are pronounced as /oˈtɛl/ and /ˈɔverkraft/
• The letter Z represents /ʣ/, for example: Zanzara /dzan'dzaɾa/ (mosquito), or /ʦ/, for example: Nazione /naˈttsjone/ (nation), depending on context, though there are few minimal pairs. The same goes for S, which can represent /s/ or /z/. However, these two phonemes are in complementary distribution everywhere except between two vowels in the same word, and even in such environment there are extremely few minimal pairs, so that this distinction is being lost in many varieties.
• However, an H can be added between C or G and E or I to represent a plosive, and an I can be added between C or G and A, O or U to signal that the consonant is an affricate. For example:
Before back vowel (A, O, U) Before front vowel (I, E)
Plosive C caramella /kaɾaˈmɛlla/ CH china /ˈkina/
G gallo /ˈgallo/ GH ghiro /ˈgiro/
Affricate CI ciaramella /ʧaɾaˈmɛlla/ C Cina /ˈʧina/
GI giallo /ˈʤallo/ G giro /ˈʤiro/
Note that the H is silent in the digraphs CH and GH, as also the I in cia, cio, ciu and even cie is not pronounced as a separate vowel, unless it carries the primary stress. For example, it is silent in ciao /ˈʧa.o/ and cielo /ˈʧɛ.lo/, but it is pronounced in farmacia /ˌfaɾ.ma.ˈʧi.a/ and farmacie /ˌfaɾ.ma.ˈʧi.e/.
• There are three other special digraphs in Italian: GN, GL and SC. GN represents /ɲ/. GL represents /ʎ/ only before i, and never at the beginning of a word, except in the personal pronoun and definite article gli. (Compare with Spanish ñ and ll, Portuguese nh and lh.) SC represents fricative /ʃ/ before i or e. Except in the speech of some Northern Italians, all of these are normally geminate between vowels.
• In general, all letters or digraphs represent phonemes rather clearly, and in standard varieties of Italian, there is little allophonic variation. The most notable exceptions are assimilation of /n/ in point of articulation before consonants, assimilatory voicing of /s/ to following voiced consonants, and vowel length (vowels are long in stressed open syllables, and short elsewhere) — compare with the enormous number of allophones of the English phoneme /t/. Spelling is clearly phonemic and difficult to mistake given a clear pronunciation. Exceptions are generally only found in foreign borrowings. There are fewer cases of dyslexia than among speakers of languages such as English[citation needed], and the concept of a spelling bee is strange to Italians.
### Common variations in the writing systems
Some variations in the usage of the writing system may be present in practical use. These are scorned by educated people, but they are so common in certain contexts that knowledge of them may be useful.
• Usage of x instead of per: this is very common among teenagers and in SMS abbreviations. The multiplication operator is pronounced "per" in Italian, and so it is sometimes used to replace the word "per", which means "for"; thus, for example, "per te" ("for you") is shortened to "x te" (compare with English "4 U"). Words containing per can also have it replaced with x: for example, perché (both "why" and "because") is often shortened as xché or xké or x' (see below). This usage might be useful to jot down quick notes or to fit more text into the low character limit of an SMS, but it is considered unacceptable in formal writing.
• Usage of foreign letters such as k, j and y, especially in nicknames and SMS language: ke instead of che, Giusy instead of Giuseppina (or sometimes Giuseppe). This is curiously mirrored in the usage of i in English names such as Staci instead of Stacey, or in the usage of c in Northern Europe (Jacob instead of Jakob). The use of "k" instead of "ch" or "c" to represent a plosive sound is documented in some historical texts from before the standardization of the Italian language; however, that usage is no longer standard in Italian. Possibly because it is associated with the German language, the letter "k" has sometimes also been used in satire to suggest that a political figure is an authoritarian or even a "pseudo-nazi": Francesco Cossiga was famously nicknamed Kossiga by rioting students during his tenure as minister of internal affairs. [Cf. the politicized spelling Amerika in the USA.]
• Usage of the following abbreviations is limited to the electronic communications media and is deprecated in all other cases: nn instead of non (not), cmq instead of comunque (anyway, however), cm instead of come (how, like, as), d instead of di (of), (io/loro) sn instead of (io/loro) sono (I am/they are), (io) dv instead of (io) devo (I must/I have to) or instead of dove (where), (tu) 6 instead of (tu) sei (you are).
• Inexperienced typists often replace accents with apostrophes, such as in perche' instead of perché. Uppercase È is particularly rare, as it is absent from the Italian keyboard layout, and is very often written as E' (even though there are several ways of producing the uppercase È on a computer). This never happens in books or other professionally typeset material.
## Samples
English Italian Audio
Italian italiano (listen)
English inglese (listen)
Yes (listen)
No No (listen)
Of course! Certo! / Certamente!
Hello! Ciao! (informal) / Salve! (general) (listen)
How are you? Come stai? (informal) / Come sta? (formal) / Come state? (plural) / Come va? (general)
Good morning! Buongiorno! (= Good day!)
Good afternoon! Buon pomeriggio! (unusual) / Buonasera! (more usual)
Good evening! Buonasera!
Good night! Buonanotte! (for a good night sleeping) / Buona serata! (for a good night awake)
Have a good lunch/dinner! Le (plural, Vi) auguro un buon pranzo/una buona cena! (formal) / Buon appetito! (informal)
Welcome [to...] Benvenuto/-i (for male/males or mixed) / Benvenuta/-e (for female/females) [a / in...]
Goodbye! Arrivederci/-rLa (formal) / Ci vediamo! or simply Ciao! (informal) (listen)
Have a nice day! Buona giornata! (formal)
Good luck! Thank you! Buona fortuna! Grazie! (general) / In bocca al lupo! Crepi (il lupo)! (to wish s.o. to overcome a difficulty) (the call and response literally means: "Into the mouth of the wolf!" "May it die!"
Please Per piacere / Per favore / Per cortesia (listen)
Thank you! Grazie! (general) / Ti ringrazio! (informal) / La ringrazio! (formal) / Vi ringrazio! (plural) (listen)
You're welcome! Prego! / Di niente!
I'm sorry Mi dispiace (general) / Scusa(mi) (informal) / Mi scusi (formal) / Scusatemi (plural) / Sono desolato (if male) / Sono desolata (if female) (listen)
Excuse me Scusa(mi) (informal) / (Mi) scusi (formal) / Scusate(mi) (plural) / (Con) permesso! (in order to pass on, to advance)
Who? Chi?
What? Che cosa? / Cosa? / Che?
When? Quando?
Where? Dove?
Why? Perché?
What's your name? Come ti chiami? (informal) / Come si chiama? (formal) / Come vi chiamate? (plural)
Because Perché
How? Come?
How much? / How many? Quanto? / Quanti? / Quante?
I do not understand. Non capisco. / Non ho capito. (listen)
Yes, I understand. Sì, capisco. / Ho capito.
Help me! Aiutami! (informal) / Mi aiuti! (formal) / Aiutatemi! (plural) / Aiuto! (general)
You're right/wrong! (Tu) hai ragione/torto! (informal) / (Lei) ha ragione/torto! (formal) / (Voi) avete ragione/torto! (plural)
What time is it? Che ora è? / Che ore sono?
Where is the bathroom? Dov'è il bagno? (listen)
Do you speak English? Parli inglese? (informal) / Parla inglese? (formal) / Parlate inglese? (plural) (listen)
I don't understand Italian. Non capisco l'italiano. / Non comprendo l'italiano.
The check, please. (In restaurant) Il conto, grazie.
The study of Italian sharpens the mind. Lo studio dell'italiano aguzza l'ingegno.
## Examples
• Cheers (generic toast): cin cin /tʃin tʃin/ or Salute!/Alla salute!
• English: inglese /iŋˈglese/
• Good-bye: arrivederci /arriveˈdertʃi/
• Hello: ciao /ˈtʃao/
• Good morning/good day: buon giorno /bwɔnˈdʒorno/
• Good evening: buona sera /bwɔnaˈsera/
• Yes: /si/
• No: no /nɔ/
• How are you? : Come stai /ˈkome ˈstai/ (informal); Come sta /ˈkome 'sta/ (formal)
• Sorry: mi dispiace /mi disˈpjatʃe/
• Excuse me: scusa /ˈskuza/ (informal); scusi /ˈskuzi/ (formal)
• Again: di nuovo, /di ˈnwɔvo/; ancora /aŋˈkora/
• Always: sempre /ˈsɛmpre/
• When: quando /ˈkwando/
• Where: dove /'dove/
• Why/Because: perché /perˈke/
• How: come /'kome/
• How much: quanto /ˈkwanto/
• Thank you!: grazie! /ˈgrattsie/
• Bon appetit: buon appetito /ˌbwɔn appeˈtito/
• You're welcome!: prego! /ˈprɛgo/
• I love you: Ti amo /ti ˈamo/, Ti voglio bene /ti ˈvɔʎʎo ˈbɛne/. The difference is that you use "Ti amo" when you are in a romantic relationship, "Ti voglio bene" in any other occasion (to parents, to relatives, to friends...)
Counting to twenty:
• One: uno /ˈuno/
• Two: due /ˈdue/
• Three: tre /tre/
• Four: quattro /ˈkwattro/
• Five: cinque /ˈʧiŋkwe/
• Six: sei /ˈsɛi/
• Seven: sette /ˈsɛtte/
• Eight: otto /ˈɔtto/
• Nine: nove /ˈnɔve/
• Ten: dieci /ˈdjɛʧi/
• Eleven: undici /ˈundiʧi/
• Twelve: dodici /ˈdodiʧi/
• Thirteen: tredici /ˈtrediʧi/
• Fourteen: quattordici /kwat'tordiʧi/
• Fifteen: quindici /ˈkwindiʧi/
• Sixteen: sedici /ˈsediʧi/
• Seventeen: diciassette /diʧas'sɛtte/
• Eighteen: diciotto /di'ʧɔtto/
• Nineteen: diciannove /diʧan'nɔve/
• Twenty: venti /'venti/
The days of the week:
• Monday: lunedì /lune'di/ (the day of the Moon)
• Tuesday: martedì /marte'di/ (the day of Mars, the Roman god of war)
• Wednesday: mercoledì /merkole'di/ (the day of Mercury, the Roman god of commerce)
• Thursday: giovedì /dʒove'di/ (the day of Jupiter, the Roman god of sky and weather)
• Friday: venerdì /vener'di/ (the day of Venus, the Roman goddess of love)
• Saturday: sabato /ˈsabato/ (the day of rest, from Hebrew)
• Sunday: domenica /do'menika/ (the day of the Lord)
## Sample texts
You can hear a recording of Dante's Divine Comedy read by Lino Pertile at http://etcweb.princeton.edu/dante/pdp/
## References and notes
1. "Languages Spoken by More Than 10 Million People". Microsoft ® Encarta ® 2006. Retrieved 2007-02-18.
2. Ethnologue. SIL International. Tue 21 Oct 1997. As collected at: http://www.nicemice.net/amc/tmp/lang-pop.var
3. Grimes, Barbara F. (1996). Barbara F. Grimes, ed. Ethnologue: Languages of the World. Consulting Editors: Richard S. Pittman & Joseph E. Grimes (thirteenth edition ed.). Dallas, Texas: Summer Institute of Linguistics, Academic Pub. ISBN 1-55671-026-7. Unknown parameter `|month=` ignored (help)
4. "History of the Italian language". Retrieved 2006-09-24.
5. It served as Malta's official language until Maltese language was enshrined in the 1934 Constitution.
6. Tekle M. Woldemikael, "Language, Education, and Public Policy in Eritrea," in African Studies Review, Vol. 46, No. 1. (Apr., 2003), pp. 117–136.
7. Boston, Massachusetts, MLA Data Center
8. Chicago, Illinois, MLA Data Center
9. New York, New York, MLA Data Center
10. Philadelphia, Pennsylvania, MLA Data Center
11. Australian Bureau of Statistics, 2002, "A Snapshot of Melbourne"
12. www.iic-colonia.de
13. Eurobarometer – Europeans and their languagesPDF (485 KiB), February 2006
14. Unidad en la diversidad – Portal informativo sobre la lengua castellana
15. Ethnologue web reference for Italian
16. Serianni, Luca (1997). Italiano. Garzanti. p. 15. Unknown parameter `|coauthors=` ignored (help)
## Bibliography
• Rogers, Derek & Luciana d'Arcangeli (2004), "Italian", Journal of the International Phonetic Association 34(1): 117-121 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 3, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.47059014439582825, "perplexity": 22713.747820230525}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502097.77/warc/CC-MAIN-20200605143036-20200605173036-00428.warc.gz"} |
https://bookvea.com/is-750-ml-half-gallon/ | # Is 750 mL half gallon?
## Is 750 mL half gallon?
There are approximately 5.0472 750-milliliter bottles in a gallon.
## Is 750 mL more than a gallon?
750 milliliters is just about 25.4 ounces. This amount is the same as a standard wine bottle. The term fifth, however, comes from when bottles were 4/5 of a quart, which is the same as 1/5 of a gallon.
## Is 750ml the same as 1 liter?
No, 750ml is not equivalent to one liter. One liter is 1,000 milliliters. A 750 liter bottle is equivalent to three quarters of a liter.
3785.411784 mL
## Is 750 ml more than a gallon?
750 milliliters is just about 25.4 ounces. This amount is the same as a standard wine bottle. The term fifth, however, comes from when bottles were 4/5 of a quart, which is the same as 1/5 of a gallon.
## How many ml is a half gallon of alcohol?
NameUS customary unitsMetric unitsEuropean spirit bottle23.7 US fl oz700 mLfifth25.4 US fl oz750 mLlitre33.8 US fl oz1 Lhalf gallon59.2 US fl oz1.75 L8 more rows
## Is 750ml a fifth of a gallon?
It is an old measurement for a bottle of booze. These days most bottles are 750 ml, which is close to 1/5 of a gallon. A gallon contains 128 fluid ounces. So a fifth (1/5) or 750ml contains a tad more than 25 oz, or 25 one-ounce shots.
1.75 liters
5.0472 750
## How much mL makes a gallon?
Gallon (US) [gal (US)]Milliliter [mL]1 gal (US)3785.411784 mL2 gal (US)7570.823568 mL3 gal (US)11356.235352 mL5 gal (US)18927.05892 mL7 more rows
## How much is 750ml Is it a half gallon?
A fifth. A fifth of a gallon is 757.08 ml. The closest metric retail package to the half-gallon is the 1 liter which 143 ml (4.8 fl oz) short of being so. In the USA distilled spirits were once taxed by the gallon and typically sold at retail in fractions of a gallon like a half-gallon or a fifth of a gallon.
## Is 750 ml or 1 liter bigger?
How Big Is a Liter? A liter bottle of liquor is 1,000 ml or 1 liter. That makes it 25% larger than a standard 750ml fifth. Buying a liter of liquor in the U.S. is about as common as ordering a liter of cola.
## What’s the difference between 1l and 750 ml?
No, one liter is equivalent to 1,000 milliliters (mL). A 750 liter bottle is equivalent to three quarters of a liter
## Does 750ml equal 1.5 liters?
750 ml Standard: Common bottle size for most distributed wine. 1.5 L Magnum: Equivalent to two standard 750 ml bottles. 3.0 L Double Magnum: Equivalent to two Magnums or four standard 750 ml bottles. 4.5 L Rehoboam: A sparkling wine bottle with six standard 750 ml bottles.
1000 ml
3785.411784 mL
5.0472 750
## Is 1000ml equal to 1 gallon?
Milliliter to Gallon (US) Conversion Table.Milliliter [mL]Gallon (US) [gal (US)]100 mL0.0264172052 gal (US)1000 mL0.2641720524 gal (US)9 more rows
## How many mL is 1 gallon of water in the Philippines?
One US Gallon is equal to 3785.411784 milliliters. A milliliter is a measuring unit of capacity. The symbol of the milliliter is mL.
## How many mL is a half gallon of liquor?
NameUS customary unitsMetric unitsEuropean spirit bottle23.7 US fl oz700 mLfifth25.4 US fl oz750 mLlitre33.8 US fl oz1 Lhalf gallon59.2 US fl oz1.75 L8 more rows
## How much alcohol is in a half gallon?
So, as you can see from the breakdown above, the answer to the commonly asked question – ‘how many shots in a half gallon?’ is 39 shots.
## How many liters are in a half gallon of liquor?
1.75 liters, subtracting about 143ml.Today’s Liquor Bottle Sizes.Bottle Size, metricOuncesGallon, quart, or pint equivalent1 liter33.8oz.1 quart6 more rowsx26bull;11-Mar-2015
## What is a 180 mL bottle called?
Little is known about who decided on naming larger bottles as such, and when. The terminology for spirits in India is completely different: regular (750 ml) bottles are called quarts, half-bottles (375 ml) are called pints, and the smallest (180 ml) are called nips – for reasons that have never been clear to me.
## Is 750 ml a fifth of a gallon?
A fifth is a unit of volume formerly used for wine and distilled beverages in the United States, equal to one fifth of a US liquid gallon, or 253u20445 U.S. fluid ounces (757 milliliters); it has been superseded by the metric bottle size of 750 ml, sometimes called a metric fifth, which is the standard capacity of wine
5.0472 750 | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.800391435623169, "perplexity": 8428.349980627672}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711150.61/warc/CC-MAIN-20221207053157-20221207083157-00783.warc.gz"} |
https://www.physicsoverflow.org/24410/beta-function-vanishes-for-n-4-super-yang-mills-theory | # Beta function vanishes for N=4 Super Yang-Mills theory
+ 5 like - 0 dislike
1512 views
I would like to learn about N=4 Super Yang-Mills theory. It would be very nice if you could recommend me a self complete review of N=4 Super Yang-Mills theory. In specific I would like to see a proof that N=4 Yang-Mills theory has a vanishing Beta function.
edited Oct 12, 2014
+ 5 like - 0 dislike
The arguments for all-orders vanishing of the beta function for $N=4$ SYM theory is discussed in the classic review on supersymmetry by Sohnius (see section 13.2 page 160). However, some fun things to do to complement the arguments there are:
1. See the vanishing of the one-loop beta function for all $\mathcal{N}=4$ vector multiplets by combining the `known' answers for (adjoint) scalar fields and fermions along with that of the gauge field.
2. Read the paper by Leigh and Strassler, who show that there exists a two-parameter deformation of $\mathcal{N}=4$ theory that has $\mathcal{N}=1$ supersymmetry and preserves the vanishing of the beta function.
3. Read about the NSVZ (Novikov-Shifman-Vainshtein-Zakhorov) computation of the beta function described in section 4 of this review.
4. Read the paper by Seiberg titled "The power of holomorphy". Also, the review of Intriligator and Seiberg might be useful.
These have been written without too much deep thinking on my part. So any suggestions/modifications to this list are more than welcome.
answered Oct 12, 2014 by (1,545 points)
edited Oct 12, 2014 by suresh
+ 5 like - 0 dislike
Well, I am not sure if it can count as a proper proof but you can see that the β-function vanishes at 1-loop level by knowing how the various fields contribute to it in an $SU(N)$ theory. You do this by evaluating the (Dynkin) indices of the various representations (Weyl fermions, complex scalars and gauge fields) inside $b_0$and see what happens. You can find the Dynkin indices in Terning's "Modern Supersymmetry" Appendix B.
Furthermore, another simple argument on the vanishing of the β-function in N=4 SYM is given in the same book in section 14.4, page 241.
I hope this helps!
answered Oct 12, 2014 by (3,625 points)
edited Oct 12, 2014
Please use answers only to (at least partly) answer questions. To comment, discuss, or ask for clarification, leave a comment instead. To mask links under text, please type your text, highlight it, and click the "link" button. You can then enter your link URL. Please consult the FAQ for as to how to format your post. This is the answer box; if you want to write a comment instead, please use the 'add comment' button. Live preview (may slow down editor) Preview Your name to display (optional): Email me at this address if my answer is selected or commented on: Privacy: Your email address will only be used for sending these notifications. Anti-spam verification: If you are a human please identify the position of the character covered by the symbol $\varnothing$ in the following word:p$\hbar$ysics$\varnothing$verflowThen drag the red bullet below over the corresponding character of our banner. When you drop it there, the bullet changes to green (on slow internet connections after a few seconds). To avoid this verification in future, please log in or register. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 2, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5658520460128784, "perplexity": 1089.9700152197586}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487648194.49/warc/CC-MAIN-20210619111846-20210619141846-00002.warc.gz"} |
https://inlieuofabettertitle.wordpress.com/2012/06/02/721/ | It is well known that it is impossible to trisect an arbitrary angle using only a compass and straightedge. However, as we will see in this post, it is possible to trisect an angle using origami. The technique shown here dates back to the 1970s and is due to Hisashi Abe.
Assume, as in the figure below, that we begin with an acute angle $latex {\theta}&fg=000000$ formed by the bottom edge of the square of origami paper and a line (a fold, presumably), $latex {l_{1}}&fg=000000$, meeting at the lower left corner of the square. Create an arbitrary horizontal fold to form the line $latex {l_{2}}&fg=000000$, then fold the bottom edge up to $latex {l_{2}}&fg=000000$ to form the line $latex {l_{3}}&fg=000000$. Let $latex {B}&fg=000000$ be the lower left corner of the square and $latex {A}&fg=000000$ be the left endpoint of $latex {l_{2}}&fg=000000$. Fold the square so that $latex {A}&fg=000000$ and \$latex…
View original post 413 more words | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9477601051330566, "perplexity": 115.7945397533691}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278244.51/warc/CC-MAIN-20160524002118-00071-ip-10-185-217-139.ec2.internal.warc.gz"} |
https://paperswithcode.com/paper/fitted-q-learning-in-mean-field-games | # Fitted Q-Learning in Mean-field Games
31 Dec 2019Berkay AnahtarcıCan Deha KarıksızNaci Saldi
In the literature, existence of equilibria for discrete-time mean field games has been in general established via Kakutani's Fixed Point Theorem. However, this fixed point theorem does not entail any iterative scheme for computing equilibria... (read more)
PDF Abstract
# Code Edit Add Remove
No code implementations yet. Submit your code now | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8105664253234863, "perplexity": 7552.649217439919}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738380.22/warc/CC-MAIN-20200809013812-20200809043812-00321.warc.gz"} |
https://stupidsid.com/previous-question-papers/download/environmental-studies-336 | MORE IN Environmental Studies
MU First Year Engineering (Semester 1)
Environmental Studies
May 2013
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary
Solve any five of the following:
1(a) List
(i) the various sources of water pollution
(ii) common water pollutants
3 M
1(b) What is the role of the Ministry of Environment and Forests?
3 M
1(c) Define and explain the term sustainable development
3 M
1(d) Explain in brief, what is food web
3 M
1(e) Explain scientifically the concept of Green building
3 M
1(f) List the conventional energy sources and state their limitations
3 M
1(g) Define Noise pollution and explain its sources as well as ill effects
3 M
2(a) Explain how the environmental resource water is depleting
5 M
2(b) Explain working of Venturi scrubber with the help of an example
5 M
2(c) Explain working of hydropower electricity plant with the help of neat sketch
5 M
3(a) Explain how a geothermal electricity plant works. Draw a neat labelled schematic diagram for the same.
5 M
3(b) Define any five of the terms from the Environmental Protection Act, 1986
(i) Environment
(ii) Environmental pollutant
(iii) Environmental pollution
(iv) Hazardous substance
(v) Occupier
(vi) Handling
(vii) Prescribed
10 M
4(a) Explain various modes needed for public awareness to protect the earth from environmental degradation
5 M
4(b) Explain the term E-pollution. What are its sources and ill-effects?
5 M
4(c) State and explain working principle of flat plate collector used for solar energy
5 M
5(a) What do you mean by appropriate technology? What is their criteria for selection?
5 M
5(b) Write case study on Minamata disease in Japan
5 M
5(c) Explain what is Indoor pollution. Give examples of such pollutants and state their ill effects
5 M
6(a) Write a case study on Tsunami and Earthquakes in Japan
5 M
6(b) When one is setting up an industrial unit, what is the role of Environmental clearance consent and authorisation mechanism?
5 M
6(c) Explain generation of elecricity using wind energy, with help of neat and labelled sketch of wind turbine
5 M
More question papers from Environmental Studies | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8915472030639648, "perplexity": 11768.380831388575}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143365.88/warc/CC-MAIN-20200713100145-20200713130145-00348.warc.gz"} |
http://planetcalc.com/909/ | ##### Appearance
Sample
ProfessionalEngineering
# Side length of a triangle
##### This calculator computes side length of a triangle given two sides and angle between them (law of cosines)
Timur2011-07-31 21:31:58
After I've wrote Side length of a right triangle by user's request, I've recalled that Pythagorean theorem is a special case of more general theorem relating the lengths of sides in any triangle, the law of cosines
$c^2=a^2+b^2-2abcos\gamma$
Well, there are lot of things you can find about triangle. I've already used this law for finding Triangle angles for given triangle sides, now I use it to find length of side opposite the angle.
##### Side length of a triangle
View all calculators
(467 calculators in total. ) | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 1, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6716084480285645, "perplexity": 725.8892441956891}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187225.79/warc/CC-MAIN-20170322212947-00417-ip-10-233-31-227.ec2.internal.warc.gz"} |
https://nbviewer.org/github/amaiya/ktrain/blob/v0.24.2/tutorials/tutorial-06-sequence-tagging.ipynb | In [1]:
%reload_ext autoreload
%matplotlib inline
import os
os.environ["CUDA_DEVICE_ORDER"]="PCI_BUS_ID";
os.environ["CUDA_VISIBLE_DEVICES"]="0";
ktrain uses TensorFlow 2. To support sequence-tagging, ktrain also currently uses the CRF module from keras_contrib, which is not yet fully compatible with TensorFlow 2. To use the BiLSTM-CRF model (which currently requires keras_contrib) for sequence-tagging in ktrain, you must disable V2 behavior in TensorFlow 2 by adding the following line to the top of your notebook or script before importing ktrain:
import os
os.environ['DISABLE_V2_BEHAVIOR'] = '1'
Since we are employing a CRF layer in this notebook, we will set this value here:
In [2]:
os.environ['DISABLE_V2_BEHAVIOR'] = '1'
In [3]:
import ktrain
from ktrain import text
Using DISABLE_V2_BEHAVIOR with TensorFlow
# Sequence Tagging¶
Sequence tagging (or sequence labeling) involves classifying words or sequences of words as representing some category or concept of interest. One example of sequence tagging is Named Entity Recognition (NER), where we classify words or sequences of words that identify some entity such as a person, organization, or location. In this tutorial, we will show how to use ktrain to perform sequence tagging in three simple steps.
## STEP 1: Load and Preprocess Data¶
The entities_from_txt function can be used to load tagged sentences from a text file. The text file can be in one of two different formats: 1) the CoNLL2003 format or 2) the Groningen Meaning Bank (GMB) format. In both formats, there is one word and its associated tag on each line (where the word and tag are delimited by a space, tab or comma). Words are ordered as they appear in the sentence. In the CoNLL2003 format, there is a blank line that delineates sentences. In the GMB format, there is a third column for Sentence ID that assignes a number to each row indicating the sentence to which the word belongs. If you are building a sequence tagger for your own use case with the entities_from_txt function, the training data should be formatted into one of these two formats. Alternatively, one can use the entities_from_aray function which simply expects arrays of the following form:
x_train = [['Hello', 'world', '!'], ['Hello', 'Barack', 'Obama'], ['I', 'love', 'Chicago']]
y_train = [['O', 'O', 'O'], ['O', 'B-PER', 'I-PER'], ['O', 'O', 'B-LOC']]
Note that the tags in this example follow the IOB2 format).
In this notebook, we will be using entities_from_txt and build a sequence tagger using the Groningen Meaning Bank NER dataset available on Kaggle here. The format essentially looks like this (with fields being delimited by comma):
SentenceID Word Tag
1 Paul B-PER
1 Newman I-PER
1 is O
1 a O
1 great O
1 actor O
1 . O
We will be using the file ner_dataset.csv (which conforms to the format above) and will load and preprocess it using the entities_from_txt function. The output is simlar to data-loading functions used in previous tutorials and includes the processed training set, processed validaton set, and an instance of NERPreprocessor.
The Kaggle dataset ner_dataset.csv the three columns of interest (mentioned above) are labeled 'Sentence #', 'Word', and 'Tag'. Thus, we specify these in the call to the function.
In [4]:
DATAFILE = '/home/amaiya/data/groningen_meaning_bank/ner_dataset.csv'
(trn, val, preproc) = text.entities_from_txt(DATAFILE,
sentence_column='Sentence #',
word_column='Word',
tag_column='Tag',
data_format='gmb',
use_char=True)
detected encoding: WINDOWS-1250 (if wrong, set manually)
Number of sentences: 47959
Number of words in the dataset: 35178
Tags: ['B-art', 'I-art', 'I-eve', 'B-geo', 'B-gpe', 'I-per', 'O', 'B-tim', 'I-gpe', 'B-nat', 'B-eve', 'B-org', 'I-nat', 'B-per', 'I-org', 'I-tim', 'I-geo']
Number of Labels: 17
Longest sentence: 104 words
When loading the dataset above, we specify use_char=True to instruct ktrain to extract the character vocabulary to be used in a character embedding layer of a model.
## STEP 2: Define a Model¶
The print_sequence_taggers function shows that, as of this writing, ktrain currently supports both Bidirectional LSTM-CRM and Bidirectional LSTM as base models for sequence tagging. Theses base models can be used with different embedding schemes.
For instance, the bilstm-bert model employs BERT word embeddings as features for a Bidirectional LSTM. See this notebook for an example of bilstm-bert. In this tutorial, we will use a Bidirectional LSTM model with a CRF layer.
In [5]:
text.print_sequence_taggers()
bilstm: Bidirectional LSTM (https://arxiv.org/abs/1603.01360)
bilstm-bert: Bidirectional LSTM w/ BERT embeddings
bilstm-crf: Bidirectional LSTM-CRF (https://arxiv.org/abs/1603.01360)
bilstm-elmo: Bidirectional LSTM w/ Elmo embeddings [English only]
bilstm-crf-elmo: Bidirectional LSTM-CRF w/ Elmo embeddings [English only]
In [6]:
WV_URL = 'https://dl.fbaipublicfiles.com/fasttext/vectors-crawl/cc.en.300.vec.gz'
model = text.sequence_tagger('bilstm-crf', preproc, wv_path_or_url=WV_URL)
Embedding schemes employed (combined with concatenation):
word embeddings initialized with fasttext word vectors (cc.en.300.vec.gz)
character embeddings
pretrained word embeddings will be loaded from:
https://dl.fbaipublicfiles.com/fasttext/vectors-crawl/cc.en.300.vec.gz
done.
In the cell above, notice that we suppied the wv_path_or_url argument. This directs ktrain to initialized word embeddings with one of the pretrained fasttext (word2vec) word vector sets from Facebook's fastttext site. When supplied with a valid URL to a .vec.gz, the word vectors will be automatically downloaded, extracted, and loaded in STEP 2 (download location is <home_directory>/ktrain_data). To disable pretrained word embeddings, set wv_path_or_url=None and randomly initialized word embeddings will be employed. Use of pretrained embeddings will typically boost final accuracy. When used in combination with a model that uses an embedding scheme like BERT (e.g., bilstm-bert), the different word embeddings are stacked together using concatenation.
Finally, we will wrap our selected model and datasets in a Learner object to facilitate training.
In [7]:
learner = ktrain.get_learner(model, train_data=trn, val_data=val, batch_size=128)
## STEP 3: Train and Evaluate the Model¶
Here, we will train for a single epoch using an initial learning rate of 0.01 with gradual decay using cosine annealing (via the cycle_len=1) parameter and see how well we do. The learning rate of 0.01 is determined with the learning-rate-finder (i.e., lr_find).
In [7]:
learner.lr_find()
simulating training for different learning rates... this may take a few moments...
Train for 337 steps
Epoch 1/1024
337/337 [==============================] - 144s 426ms/step - loss: 1.2752
Epoch 2/1024
337/337 [==============================] - 138s 408ms/step - loss: 0.6956
Epoch 3/1024
337/337 [==============================] - 137s 407ms/step - loss: 0.2069
Epoch 4/1024
337/337 [==============================] - 136s 405ms/step - loss: 0.0684
Epoch 5/1024
160/337 [=============>................] - ETA: 1:12 - loss: 0.1804
done.
Please invoke the Learner.lr_plot() method to visually inspect the loss plot to help identify the maximal learning rate associated with falling loss.
In [8]:
learner.lr_plot()
In [8]:
learner.fit(1e-2, 1, cycle_len=1)
preparing train data ...done.
preparing valid data ...done.
338/338 [==============================] - 123s 365ms/step - loss: 4.6233 - val_loss: 4.5265
Out[8]:
<tensorflow.python.keras.callbacks.History at 0x7f09b55ace48>
In [9]:
learner.validate()
F1: 84.19
precision recall f1-score support
tim 0.90 0.86 0.88 2078
geo 0.84 0.90 0.87 3728
org 0.75 0.69 0.72 1981
per 0.81 0.78 0.79 1717
gpe 0.97 0.93 0.95 1540
eve 0.60 0.21 0.31 29
art 0.00 0.00 0.00 47
nat 0.57 0.19 0.29 21
micro avg 0.85 0.84 0.84 11141
macro avg 0.84 0.84 0.84 11141
Out[9]:
0.8418623591692684
Our F1-score is 84.19 after a single pass through the dataset. Not bad for a single epoch of training.
Let's invoke view_top_losses to see the sentence we got the most wrong. This single sentence about James Brown contains 10 words that are misclassified. We can see here that our model has trouble with titles of songs. In addition, some of the ground truth labels for this example are sketchy and incomplete, which also makes things difficult.
In [12]:
learner.view_top_losses(n=1)
total incorrect: 10
Word True : (Pred)
==============================
Mr. :B-per (B-per)
Brown :I-per (I-per)
is :O (O)
known :O (O)
by :O (O)
millions :O (O)
of :O (O)
fans :O (O)
as :O (O)
" :O (O)
The :O (O)
Godfather :B-per (B-org)
of :O (O)
Soul :B-per (B-per)
" :O (O)
thanks :O (O)
to :O (O)
such :O (O)
classic :O (O)
songs :O (O)
as :O (O)
" :O (O)
, :O (O)
, :O (O)
, :O (O)
" :O (O)
" :O (O)
It :O (O)
's :O (O)
a :O (O)
Man :O (O)
's :O (O)
World :O (O)
, :O (O)
" :O (O)
and :O (O)
" :O (O)
Papa :B-art (B-org)
's :I-art (O)
Got :I-art (O)
a :I-art (O)
Brand :I-art (B-org)
New :I-art (I-org)
Bag :I-art (I-org)
. :O (O)
" :O (O)
## Making Predictions on New Sentences¶
Let's use our model to extract entities from new sentences. We begin by instantating a Predictor object.
In [13]:
predictor = ktrain.get_predictor(learner.model, preproc)
In [14]:
predictor.predict('As of 2019, Donald Trump is still the President of the United States.')
Out[14]:
[('As', 'O'),
('of', 'O'),
('2019', 'B-tim'),
(',', 'O'),
('Donald', 'B-per'),
('Trump', 'I-per'),
('is', 'O'),
('still', 'O'),
('the', 'O'),
('President', 'B-per'),
('of', 'O'),
('the', 'O'),
('United', 'B-geo'),
('States', 'I-geo'),
('.', 'O')]
We can save the predictor for later deployment.
In [15]:
predictor.save('/tmp/mypred')
In [16]:
reloaded_predictor = ktrain.load_predictor('/tmp/mypred')
In [17]:
reloaded_predictor.predict('Paul Newman is my favorite American actor.')
Out[17]:
[('Paul', 'B-per'),
('Newman', 'I-per'),
('is', 'O'),
('my', 'O'),
('favorite', 'O'),
('American', 'B-gpe'),
('actor', 'O'),
('.', 'O')]
### A Note on Sentence Tokenization¶
The predict method typically operates on individual sentences instead of entire paragraphs or documents. The model after all was trained on individual sentences. In production, you can use the sent_tokenize function to tokenize text into individual sentences.
from ktrain import text
text.textutils.sent_tokenize('This is the first sentence about Dr. Smith. This is the second sentence.')
The above will output:
['This is the first sentence about Dr . Smith .',
'This is the second sentence .']
In [ ]: | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 1, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3437632620334625, "perplexity": 15651.990494186297}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 20, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00754.warc.gz"} |
https://www.gradesaver.com/textbooks/math/algebra/algebra-1-common-core-15th-edition/chapter-1-foundations-for-algebra-1-5-adding-and-subtracting-real-numbers-practice-and-problem-solving-exercises-page-34/30 | ## Algebra 1: Common Core (15th Edition)
There are no negative numbers, so we treat this like normal subtraction. $5-15=-10$ | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.670249342918396, "perplexity": 4542.318249021259}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710192.90/warc/CC-MAIN-20221127041342-20221127071342-00459.warc.gz"} |
https://events.prace-ri.eu/event/1092/timetable/?view=nicecompact | [ONLINE] Fundamentals of Deep Learning for Multi-GPUs @ IT4Innovations
Friday, 11 December 2020 - 09:45
[ONLINE]
: Sessions
/ : Talks
: Breaks
11 Dec 2020
AM
09:45 --- Presentation --- 10:00 Intro (until 10:20) () 10:20 Stochastic Gradient Descent (until 12:00) ()
PM
12:00 --- Lunch Break --- 13:00 Introduction to Distributed Training (until 14:20) () 14:20 --- Coffee Break --- 14:30 Algorithmic Challenges of Distributed SGD (until 15:45) () 15:45 Q & A (until 16:00) () | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.8887106776237488, "perplexity": 27217.01513430824}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361510.12/warc/CC-MAIN-20210228145113-20210228175113-00374.warc.gz"} |
http://cms.math.ca/10.4153/CJM-2011-087-3 | Abstract view
# Finitely Related Algebras in Congruence Distributive Varieties Have Near Unanimity Terms
Published:2011-12-24
Printed: Feb 2013
• Libor Barto,
Department of Mathematics and Statistics, McMaster University, Hamilton, ON
Features coming soon:
Citations (via CrossRef) Tools: Search Google Scholar:
Format: LaTeX MathJax PDF
## Abstract
We show that every finite, finitely related algebra in a congruence distributive variety has a near unanimity term operation. As a consequence we solve the near unanimity problem for relational structures: it is decidable whether a given finite set of relations on a finite set admits a compatible near unanimity operation. This consequence also implies that it is decidable whether a given finite constraint language defines a constraint satisfaction problem of bounded strict width.
Keywords: congruence distributive variety, Jónsson operations, near unanimity operation, finitely related algebra, constraint satisfaction problem
MSC Classifications: 08B05 - Equational logic, Mal'cev (Mal'tsev) conditions 08B10 - Congruence modularity, congruence distributivity | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9118609428405762, "perplexity": 3895.251305276101}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164033438/warc/CC-MAIN-20131204133353-00051-ip-10-33-133-15.ec2.internal.warc.gz"} |
http://mathoverflow.net/questions/28480/finite-tor-dimension?sort=newest | # finite tor dimension
Hi. Can, every one, give me an example of finite surjective morphism of finite tor dimension (but not flat!) between reduced schemes or complex analytic spaces... Thank you.
-
Consider a smooth surface $Y$ with a point $p\in Y$. Let $X$ be obtained by gluing two copies of $Y$ at $p$, with the obvious morphism $X \to Y$. This is surjective and finite, and has finite Tor-dimension (because $Y$ is regular, hence every morphism to $Y$ has finite Tor dimension). However, it is not flat (for example, because $X$ is not Cohen-Macaulay). | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9993929862976074, "perplexity": 311.31606423024226}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152130.53/warc/CC-MAIN-20160205193912-00234-ip-10-236-182-209.ec2.internal.warc.gz"} |
https://www.bootstrapworld.org/materials/fall2015/courses/bs1/units/unit1/index.html | Unit 1Videogames and Coordinate Planes
Unit Overview
Students discuss the components of their favorite videogames, and discover that they can be reduced to a series of coordinates. They then explore coordinates in Cartesian space, and identify the coordinates for the characters in a game at various points in time. Once they are comfortable with coordinates, they brainstorm their own games and create sample coordinate lists for different points in time in their own game.
Product Outcomes:
• In workbooks, students create a data model that describes a simple videogame
• Students identify the coordinates of characters in a picture
• Students complete the Videogame Design Worksheet to design their own game
• Students convert several arithmetic expressions between multiple representations
Standards and Evidence Statements:
Standards with prefix BS are specific to Bootstrap; others are from the Common Core. Mouse over each standard to see its corresponding evidence statements. Our Standards Document shows which units cover each standard.
• 5.G.1-2: Graph points on the coordinate plane to solve real-world and mathematical problems
• Use a pair of perpendicular number lines, called axes, to define a coordinate system
• Represent real world and mathematical problems by graphing points in the first quadrant of the coordinate plane, and interpret coordinate values of points in the context of the situation.
• 5.OA.1-2: Write and interpret numerical expressions
• Use parentheses, brackets, or braces in numerical expressions, and evaluate expressions with these symbols
• Write simple expressions that record calculations with numbers, and interpret numerical expressions without evaluating them.
• 6.NS.5-8: The student performs operations with negative numbers, works with the number line and coordinate plane, order and absolute value of numbers, and solves real-world problems with rational numbers.
• graphs of negative numbers on the number line.
• A-SSE.1-2: The student interprets the structure of expressions to solve problems in context
• interpretation of complicated expressions by viewing one or more of their parts as a single entity
• N-Q: The student reasons quantitatively in using units to solve problems
• selection of (Identification of) appropriate quantities for the purpose of descriptive modeling
• BS-CE: The student translates between structured expressions as arithmetic, code, and Circles of Evaluation
• translating a simple (1-operation) equation into a Circle of Evaluation
• translating a nested (multi-operation) equation into a Circle of Evaluation
• translating a Circle of Evaluation into its equivalent arithmetic expression
• translating a Circle of Evaluation into its equivalent programming syntax
• BS-IDE: The student is familiar with using a REPL, entering expressions properly, and interpreting error messages
• enter and evaluate expressions on the computer
• look to error messages as a way of diagnosing syntax errors
• BS-M: The student models a problem in context and determines the data needed to describe the problem
• identifying which quantities are fixed and which are variable
• BS-PL.1: The student is familiar with declaring values and applying built-in functions using the programming language
• interpreting a function application and identifying its arguments
Length: 85 minutes
Glossary:
• apply: use a given function on some inputs
• arguments: the inputs to a function; expressions for arguments follow the name of a function
• circle of evaluation: a diagram of the structure of an expression (arithmetic or code)
• definitions area
• editor: software in which you can write and evaluate code
• error message: information from the computer about errors in code
• evaluate: perform the computation in an expression, producing an answer
• evaluates to: the result of computing an expression
• expression: a computation written in the rules of some language (such as arithmetic, code, or a Circle of Evaluation)
• function: a mathematical object that takes in some inputs and produces an output
• interactions area
• legal expression: code that follows the Code Rules for a language
• mathematical expression: a computation in arithmetic
• programming language: a set of rules for writing code that a computer can evaluate
• value: a specific piece of data, like 5 or "hello"
Materials:
• Editing environment (WeScheme or DrRacket with the bootstrap-teachpack installed)
• Cutouts of NinjaCat, Dog and the Ruby
• Student Workbooks, and something to write with
Preparation:
• OPTIONAL: Hand out Warmup activity sheet.
• Computer for each student (or pair), running WeScheme or DrRacket
• If using DrRacket, make sure the Ninja.rkt file is loaded
• "NinjaCat" [NinjaCat.rkt from source-files.zip | WeScheme] preloaded on students’ machines
• Student workbook folders with names on covers, and something to write with
• Student Workbooks, and something to write with
Types Functions
Introduction
Overview
Learning Objectives
Evidence Statements
Product Outcomes
Materials
Preparation
Introduction (Time 5 minutes)
• Welcome to Bootstrap! In this course, you’ll be learning a new programming language - a way to tell computers exactly what you want them to do. Just like English, Spanish or French, a programming language has its own vocabulary and grammar that you’ll have to learn. Fortunately, the language you’ll be using here has a lot in common with simple math that you already know!
Set expectations and rules for the class. Connect the material to come with things students already know:
• What makes a language? Do some students already speak more than one language?
• Programming is very much a language, with its own syntax, semantics, etc
• Ask students about their favorite videogames. Be open about the scale of a modern game: they cost millions of dollars, are built by huge teams of programmers and artists, and are developed over years.
• Set expectations about what can be accomplished in a single, introductory programming class.
Dissecting a Demo
Overview
Play a simple game, then take it apart and figure out what’s going on in the computer.
Learning Objectives
• Model a simple videogame
Evidence Statements
• Students will be able to identify the elements of a game and how each one changes during gameplay
Product Outcomes
• In workbooks, students create a data model that describes a simple videogame
Materials
• Editing environment (WeScheme or DrRacket with the bootstrap-teachpack installed)
Preparation
• Computer for each student (or pair), running WeScheme or DrRacket
• If using DrRacket, make sure the Ninja.rkt file is loaded
• "NinjaCat" [NinjaCat.rkt from source-files.zip | WeScheme] preloaded on students’ machines
• Student workbook folders with names on covers, and something to write with
Dissecting a Demo (Time 10 minutes)
• Let’s begin by exploring a simple videogame, and then figuring out how it works. Open this link to play the game, and spend a minute or two exploring it. You can use the arrow keys to move the cat left, right and jump - try to catch the ruby and avoid the dog!
[Video] Show the kids NinjaCat, either letting them play or by demoing it in front of the class. You can move the cat up, down, left and right by using the arrow keys. Play until the students see all the characters (the clouds, the ruby, the dog and the cat), and be sure to point out the title and score as well.
• This game is made up of characters, each of which has its own behavior. The Ruby moves from the right to the left, as does the Dog. NinjaCat only moves when you hit the arrow keys, and she can move left, right, up and down. We can figure out how the game works by first understanding how each character works.
• Turn to Page 2 in your workbook. Here we have a table, which we’ll use to reverse-engineer NinjaCat and see how it works. Fill out the first column with a complete list of all things in the game.
This can be a team activity. Solicit a few examples from students, to make sure they understand what’s being listed here: nouns like "the cat", not verbs like "jumping". During this activity, walk around and see how groups are doing. This is the time to encourage expectations of community and respect - call out good teamwork when you see it! When time is up, give them a countdown: "30...10... 5... 4... 3... 2... 1... PENCILS DOWN, EYES UP HERE!" Wait for total silence and complete attention.
• Did you list all four moving characters? What else is in the game? Is the background a part of the game? The score?
Have students come up to the board, and fill in the table with what they’ve found. If time is short, call on students and have them tell you what to write.
• We also need to think about what is changing when we play the game. What about the Ruby? Does it get bigger? Does it change color? Does it spin around? The only thing that changes about the Ruby is its position! Everything else about it is the same. What about the Dog? The Cat? Fill in the rest of the second column, listing everything that changes about each character.
• Did you notice that the Dog, Ruby, Cloud and Cat only change position, and nothing else? What about the Background - it doesn’t change at all, so we can leave that cell in table blank! Did you notice the Score changes value? You’ll want to add that to your table, too!
Quickly fill in the second column on the board. Assign scores.
Coordinate Planes
Overview
Students must use the Cartesian plane to describe the location of characters in a picture.
Learning Objectives
• Understand the use of number lines in defining locations via coordinates
Evidence Statements
• Students apply the number line as a tool for objectively defining location, first identifying how to apply it to describe the position of a character onscreen in one dimension. This understanding is extended to two dimensions, ultimately motivating the use of a coordinate grid.
Product Outcomes
• Students identify the coordinates of characters in a picture
Materials
• Cutouts of NinjaCat, Dog and the Ruby
• Student Workbooks, and something to write with
Preparation
• Student Workbooks, and something to write with
Coordinate Planes (Time 15 minutes)
• Computers use numbers to represent a character’s position onscreen, using number lines as rulers to measure the distance from the bottom-left corner of the screen. For our videogame, we will place the numberline so that the screen runs from 0 (on the left) to 640 (on the right). We can take the image of the Dog, stick it anywhere on the line, and measure the distance back to the lefthand edge. Anyone else who knows about our number line will be able to duplicate the exact position of the Dog, knowing only the number. What is the coordinate of the Dog on the righthand side of the screen? The center? What coordinate would place the Dog beyond the lefthand edge of the screen?
The key point for students here is precision and objectivity. There are many possible correct answers, but students should understand why any solution should be accurate and unambiguous. This requires students to propose solutions that share a common "zero" (the starting point of their number line) and direction (literally, the direction from which a character’s position is measured). Have students discuss this. If time allows, have a student leave the room and let other students come up with ways to write down where the dog is on the board. Then remove the dog, call in the other student, and have the class direct them using only what they’ve written down.Try positioning the characters at different places on the line, and have students tell you what their coordinates are. Try giving them verbal descriptions (e.g. "The center of the screen", "Off the righthand side of the screen", etc.) and have them translate those into coordinates.
• By adding a second number line, we can locate a character anywhere on the screen in either dimension. The first line is called the x-axis, which runs from left to right. The second line, which runs up and down, is called the y-axis. A 2-dimensional coordinate consists of both the x- and y-locations on the axes. Suppose we wanted to locate NinjaCat’s position on the screen. We can find the x-coordinate by dropping a line down from NinjaCat and read the position on the number line. The y-coordinate is found by running a line to the y-axis.
A coordinate represents a single point, and an image is (by definition) many points. Some students will ask whether a character’s coordinate refers to the center of the image, or one of the corners. In this particular program, the center serves as the coordinate - but other programs may use another location. The important point in discussion with students is that there is flexibility here, as long as the convention is used consistently. (If time allows, invite volunteers up to the board to try placing NinjaCat and the Ruby at different locations. Have students identify the coordinates at the corners of the screen. For additional practice, have students bisect each side of the screen and label the midpoints.)
• When we write down these coordinates, we always put the x before the y (just like in the alphabet!). Most of the time, you’ll see coordinates written like this: (200, 50) meaning that the x-coordinate is 200 and the y-coordinate is 50.
• Depending on how a character moves, their position might change only along the x-axis, only along the y-axis, or both. Look back to the table you wrote in the workbook (Page 2). Can NinjaCat move up and down in the game? Can she move left and right? So what’s changing: her x-coordinate, her y-coordinate, or both? What about the clouds? Do they move up and down? Left and right? Both?
• Fill in the rest of the table, identifying what is changing for each of your characters.
• Turn to Page 3 in your game-planning workbook, and look at the project sheet that has a picture of the NinjaCat game. What are the coordinates at the bottom-left corner of the screen? Top-right? Center? For practice, label the coordinates at the midpoint of each side of the screen, then label the coordinates of each of the characters.
Brainstorming
Overview
Students select the theme and characters for their videogame
Learning Objectives
Evidence Statements
Product Outcomes
• Students complete the Videogame Design Worksheet to design their own game
Materials
Preparation
• Computer for each student (or pair), running WeScheme or DrRacket
• If using DrRacket, make sure the Ninja.rkt file is loaded
• Student Workbooks, and something to write with
Brainstorming (Time 15 minutes)
• On Page 4, you’ll find a planning template for you to make your own game. Just like we made a list of everything in the NinjaCat game, we’re going to start with a list of everything in your game.
Have students put their names at the top of this page.
• To start, your game will have with four things in it:
• A Background, such as a forest, a city, space, etc.
• A Player, who can move when the user hits a key.
• A Target, which flies from the right to the left, and gives the player points for hitting it.
• A Danger, which flies from the right to the left, which the player must avoid.
Have students walk through some sample themes, to make sure they understand the format of the game. For example: A football game might have a quarterback for the player, a rival player for the danger, and a football as the target. A jungle game might have a monkey as the player, a snake as the danger, and bananas as the target.
• Now it’s time to get creative! Fill out Page 4 in your workbook for your game, using your own player, target and danger.
Be sure to consult with every team. A lot of students will have trouble fitting their ideas into this format, or they’ll struggle with coordinates. Be clear about what can and cannot be done! (e.g. - no 3d games, joysticks, multiplayer games, etc. Hint: students who have a well-worded description of their images will be happier with any images you could find them. Try searching for "Person" versus "Jogger", for example.
Order of Operations
Overview
Students identify the order of operations for complicated arithmetic expressions through diagramming (circles) and evaluating (the numerical answer). This lesson introduces students to the Circle of Evaluation, which is a sentence diagramming tool for arithmetic expressions. This is a powerful way to understand Order of Operations, as it forces students to focus on the structure of expressions over their computed result.
Learning Objectives
• Understand the structure of arithmetic expressions
• Understand order of operations in an expression
• Write expressions as Circles of Evaluation
• Translate between Circle of Evaluation and arithmetic expressions
Evidence Statements
• Students will be able to explain why arithemetic expressions require structure
• Students will be able to identify the order of operations in an expression that includes adding, subtracting, multiplying and dividing
• Given a Circle of Evaluation, students will be able translate the expression into the arithmetic expression it represents
• Given an arithmetic expression, students will be able to complete a partially-finished Circle of Evaluation for the same expression
• Given a bank of Circles of Evaluation and arithmetic expressions, students will be able to match them
• Students will be able to translate the structure of an arithmetic expression into a Circle of Evaluation
Product Outcomes
• Students convert several arithmetic expressions between multiple representations
Materials
• Editing environment (WeScheme or DrRacket with the bootstrap-teachpack installed)
Preparation
• Computer for each student (or pair), running WeScheme or DrRacket
• If using DrRacket, make sure the Ninja.rkt file is loaded
• Student Workbooks, and something to write with
Order of Operations (Time 20 minutes)
• Math is a language, just like English, Spanish, or any other language. We use nouns, like "bread", "tomato", "mustard" and "cheese" to describe physical objects. Math has values, like the numbers $1$, $2$ or $3$, to describe quantities. Humans also use verbs like "toast", "slice", "spread" and "melt" to describe operations on these nouns. Mathematics has functions like addition and subtraction, which are operations performed on numbers. Just as you can "slice piece of bread", a person can also "add four and five".
Students should begin to look at math as a language. To help them with this, you can discuss syntax and grammar of math, and its potential for ambiguity in the absence of a fixed order of operations. Help students see that math is a way to communicate calculations among people.
• A mathematical expression is like a sentence: it’s an instruction for doing something. The expression $4+5$ tells us to add 4 and 5. To evaluate an expression, we follow the instructions in the expression. The expression $4+5$ evaluates to $9$.
What does $8*4$ evaluate to? What does $20-16$ evaluate to? What does $16-20$ evaluate to?
• Sometimes, we need multiple expressions to accomplish a task. If you were to write instructions for making a sandwich, it would matter very much which came first: melting the cheese, slicing the bread, spreading the mustard, etc. The order of functions matters in mathematics, too. If someone says "four plus two minus one", they could mean several things:
• Add four and two, then subtract one: $(4+2) - 1$
• Add four to the result of subtracting one from two: $4 + (2-1)$
Write an expression of your own that can mean several things.
• Depending on which way you read the expression, you might have very different results! This is a problem, because we often use math to share calculations between people. For example, you and your cell phone company should agree upfront on how much you will pay for sending text messages and making calls. Different results might mean that your bill looks wrong. We avoid problems by agreeing on the order in which to use the different operations in an expression. There are two ways to do this:
1. We can all agree on an order to use
2. We can add detail to expressions that indicate the order
Write down one reason why it is important to have rules about the order of operations.
• Mathematicians didn’t always agree on the order of operations, but now we have a common set of rules for how to evaluate expressions. The pyramid on the right summarizes the order. When evaluating an expression, we begin by applying the operations written at the top of the pyramid (multiplication and division). Only after we have completed all of those operations can we move down to the lower level. If both operations are present (as in $4+2-1$), we read the expression from left to right, applying the operations in the order in which they appear.
In what order should we apply the functions in the following example? $19 \div 2 * 11 - 7 + 8$
1. $+ \div * -$
2. $\div * - +$
3. $\div * + -$
4. $* \div + -$
This item covers PEMDAS (order of operations in ambiguous expressions). You can skip this item if you do not need to cover PEMDAS.
• One way to indicate the order of operations in an expression is to first draw the expression as a diagram. This diagram is called a Circle of Evaluation. Here you can see an example of a Circle of Evaluation, for the math expression $4-5$. Circles of Evaluation show the structure that’s going on inside an expression. All Circles of Evaluation have two rules:
Which rule does this Circle of Evaluation break?
[Video] This section benefits enormously from visual aids, diagrams, etc. Make sure you have plenty of board space to draw examples!
• Try drawing the Circle of Evaluation for each of the following expressions:
1. $6*4$
2. $7-10$
3. $5 + 8$
4. $\frac{351}{-1}$
Every Circle of Evaluation evaluates to the result of its corresponding expression. For example, the circle on the right evaluates to $-1$, because the circle says to use subtraction (the function at the top) on the numbers in order ($4-5$).
It’s important for students to view the Circles of Evaluation as "just another way of writing arithemetic". Have students discuss whether associativity and commutativity still matter here (they do).
• To use multiple functions in the same expression, we can combine Circles of Evaluation. Look at the Circle of Evaluation you’ve written for $351 / -1$. We already know that the Circle for $4 - 5$ will evaluate to $-1$, so we can replace the number with the expression. Does this change what the expression evaluates to?
Finish writing the Circle of Evaluation shown here, so that it represents $(23 + 7) * (13 - 5)$
From this point forward, the Circles of Evaluation are your assessment tool for Order of Operations. Quizzing students by asking them to correctly evaluate an expression is fraught with false negatives, as many student might get the order right but may still have problems with basic calculations. This method is also vulnerable to Commutativity, since a student will correctly evaluate $1*2+2$ even if they get the order of operations wrong! Circles of Evaluation have neither of these flaws, as they put the emphasis where it should be: exercising a student’s ability to see the structure inside the arithemetic.
• What does this Circle of Evaluation evaluate to? Let’s review how we evaluate a Circle:
• We know we are multiplying because that’s the function at the top of the Circle.
• The Number $6$ is the first number in the multiplication, because it’s on the left-hand side.
• The second number in the multiplication is on the right-hand side. The right-hand side has a separate circle, so we need to evaluate the number for that circle. The second number is therefore the result of adding 4 and 5.
• $4 + 5$ (the inner circle) evaluates to $9$, and $6 * 9$ (the outer circle) evaluates to $54$. This circle evaluates to $54$.
Convert this Circle of Evaluation into an arithmetic expression.
Work through several of these examples with students, asking them to come up with arithmetic expressions and then convert them into Circles, or giving them Circles and having them translate them back into arithmetic. When you talk about Circles, be sure to consistently use the term function for what’s on top, rather than similar terms like "operation", "symbol", "procedure", "name", etc. The Circles of Evaluation will help students see the similarity between arithmetic functions (like $+$) and algebraic functions (like $f$) if you use terminology carefully.
• Match the following Circles of Evaluation with the corresponding arithmetic expressions:
• $9 * (4 - 3)$
(/ (+ 24)(- 63))
• $(9 * 4) - 3$
(- (* 94)3)
• $(9 - 3) * 4$
(* -52)
• $(2 + 4) / (6 - 3)$
(* 9(- 43))
• $-5 * 2$
(* (- 93)4)
Intro to Programming
Overview
Students are introduced to the programming environment
Learning Objectives
• Convert Circles of Evaluation into code
• Enter and evaluate code expressions for arithmetic on the computer
• Understand the goal of error messages from the computer
Evidence Statements
• Students will be able to identify the Interactions and Definitions areas
• Students will be able to enter and evaluate simple arithmetic expressions in the Interactions area
• Students will be able to convert Circles of Evaluation into correctly-formed programs
• Students will be able to explain an ’unbounded identifier’ error message
• Students will be able to explain the purpose of error messages
• Given a Circle of Evaluation, students will be able to complete a partially-written program
• Given a bank of Circles of Evaluation and programs, students will be able to match them
Product Outcomes
Materials
• Editing environment (WeScheme or DrRacket with the bootstrap-teachpack installed)
Preparation
• Computer for each student (or pair), running WeScheme or DrRacket
• Student Workbooks, and something to write with
Intro to Programming (Time 15 minutes)
• Open the programming tool of your choice: If you’ve installed, DrRacket, double-click the application to launch it. If you are using the online-tool, click here to log in enter your username and password to log in, then click "Start a New Program".
Have the students look at the editor on their computers. Refer to overhead projector as necessary.
• This screen is called the editor, and it looks something like the diagram you see here. There are a few buttons at the top, but most of the screen is taken up by two large boxes: the Definitions area on the left and the Interactions area on the right.
The Definitions area is where programmers define values and functions in their program, while the Interactions area allows them to experiment with those values and functions. This is analogous to writing a series of function definitions on a blackboard, and having student evaluate expressions using those function on scrap paper. As students are not yet defining values of their own, it is not important that students understand this distinction right now. For now, we will work only with the Interactions area.
• A program is a legal expression that, when evaluated, produces a value. You’ve been writing programs using mathematical expressions since you first learned how to add! Just as in English, there are rules that determine whether a sentence makes sense. Programs have rules too! A program can be very complicated, but it doesn’t have to be: the simplest programs of all are just Numbers.
Draw students’ attention to the Language Table (see Lesson Overview for Unit 1), which currently sits empty. Add "Numbers" to the Types section of the language table.
• What do you think 4 will evaluate to? Click here to test it out.
• Enter 4 in the Interactions area and hit "Return". You will see the value 4 appear on the next line in the Interactions area.
• Type 10 in the Interactions area and hit "Return". Now the value 10 appears in the Interactions area.
• Try evaluating numbers, like 10345017, or negative numbers, like -2. Is there a limit to how big a number can be? What happens if you write a decimal? What happens when you click on a decimal, like 0.75? You get a new type of number, a fraction, like 3/4.
The editing environment evaluates all fractions and returns them as decimals by default. This can be surprising to students at first, so you may want to take a moment to explain what’s going on, and show them that these decimals can be converted back to fractions just by clicking on them. The environment uses standard annotations for repeating, non-terminating decimal expressions and properly handles expressions like $(\sqrt -1)$. If you want to work with those kinds of numbers in your class, enter them to get familiar with how they appear in the Interactions area.
• The computer obviously knows about Numbers, but what happens if you type in something that it doesn’t know about? Will it complain? Crash? Guess? Try asking the computer to evaluate dog in the Interactions area.
These error messages are really useful for programmers. Rather than saying "this program doesn’t work", the computer does the best it can to tell you what went wrong, and to give you as much information as possible to help you fix the problem. Make sure you always read these messages carefully!
The error message uses the term "variable". Don’t worry if your students don’t already know this term; we will teach it to them shortly. For now, students just need to get used to error messages and the kinds of problems that they catch in programs.
• The Circles of Evaluation are also easy to convert into computer programs. To translate a Circle of Evaluation into a program, begin with an open parenthesis (, and then the function written at the top of the circle. Then translate the inputs from left to right in the same way, adding a closing parenthesis ) when you’re done. This process gives us the second rule for expressions: Here is the code for this Circle of Evaluation: (- 4 5)
See what happens when this code is entered into the Interactions area. Press the Return key to evaluate the program. You should see $-1$ as an answer.
Have students practice converting simple Circles of Evaluation into code. If you want to help students understand when to use the parentheses, here are two explanations that we find useful. First, the parens look like the Circle, and the Circle encloses the function name and its inputs. Second, we use a more visual description of an ant eating its way through the expression. The ant eats into the Circle (an open paren), then goes to the function at the top, then to the arguments from left to right, then finally out of the Circle (a close paren). If the ant encounters another Circle while writing down the arguments, it needs another open paren, etc.
• When a Circle of Evaluation has other circles inside of it, the translation still follows the same rules: each Circle requires a new set of parentheses: (* 6 (+ 4 5))
• Try entering this code into the Interactions area. What should the program evaluate to when you hit Return?
• Practice converting other Circles of Evaluation you’ve drawn into code.
[Video on Roles in Pair Programming.] Scaffolding for Pair Programming: Talk to students about the roles of Driver and Navigator. The Driver is the student with their hands on the keyboard - they’re in charge of typing, using the mouse, etc. The Navigator should be telling the Driver what to type, and pointing out mistakes or suggesting things. It’s important to clarify what these roles are (perhaps reinforcing them with a visual), to ensure that both partners are active and talking to one another about the task at hand. The linked video does a great job discussing these roles.
• For practice, turn to Page 5 in your workbook. For each mathematical expression, draw the Circle of Evaluation, then convert that Circle into Racket code.
• When expressions don’t follow the code rules, the computer will tell you that it found a problem. The computer also gives you information to help you fix the problem. This information is called an error message. We’ll talk more about error messages later. For now, we just want you to see a couple of error messages so that you’ll know what they are if you run into one while programming.
Enter each of the following illegal expressions in the Interactions area and look at the error message or behavior that the computer gives you.
• (5 * 6) [puts the function in the middle, instead of at the front]
• (*5 6) [missing a space after the function]
• * 5 6) [forgets the open parenthesis]
• (* 5 6 [forgets the close parenthesis]
At this point, the goal is simply to have students see error messages. Students are not expected to be experts at reading error messages this early (you will drill this later). NOTE: When a close parenthesis is missing, hitting return will do nothing, because the computer is waiting for the parenthesis. When an open parenthesis is missing, WeScheme does nothing and waits for the programmer to add the parens. If students hit enter and "nothing happens", they should check their parentheses. Also note that if you do this sequence of exercises with + instead of *, the error appears differently, because +5 is a perfectly valid number (just like -5).
Closing
Overview
Learning Objectives
Evidence Statements
Product Outcomes
Materials
Preparation
Closing (Time 5 minutes)
• You’ve done a lot in this first unit!
• You took a game apart to see how the parts move
• You designed your own game, that you’ll make during this course
• You practiced using coordinates to put characters into a screen
• You learned about order of operations, Circles of Evaluation, how to turn Circles of Evaluation into programs, and how to run those programs to get answers.
In the next unit, we’ll begin writing programs for more interesting things than just arithmetic.
Make sure student names are on the Game Design page. Take this page, or take photos of it, to prep game images for a later Unit. | {"extraction_info": {"found_math": true, "script_math_tex": 44, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.5295218825340271, "perplexity": 1157.1265639583696}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146004.9/warc/CC-MAIN-20200225014941-20200225044941-00464.warc.gz"} |
http://www.gradesaver.com/textbooks/science/physics/conceptual-physics-12th-edition/chapter-17-think-and-explain-page-334-335/70 | ## Conceptual Physics (12th Edition)
Food is cooked by heat entering it from surrounding high-temperature water, not by the bubbling of the water. If the boiling point for water is below $100^{\circ}C$, heat will enter at a lower rate and the cooking will take longer, if it cooks at all. | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.7265421152114868, "perplexity": 1474.063518441151}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945037.60/warc/CC-MAIN-20180421051736-20180421071736-00101.warc.gz"} |
https://puzzling.stackexchange.com/questions/92686/number-puzzle-i-really-need-help-with | Number puzzle i really need help with
I found this puzzle in a VRChat world.
Its a 6 number puzzle, and I need to know the value of “? ? ? ? ? ?”.
I also need to know the number.
• odd numbers are changing but i still cant come up with right answer – user64869 Jan 12 at 15:14
• Welcome to Puzzling.SE! Where did you get this puzzle from? For puzzles you found elsewhere, we require you to link to the original source, otherwise it could be considered plagiarism. – F1Krazy Jan 12 at 15:23
• its from a vrchat world someone create to challenge people brains i dont know if i can provide a source off a game – user64869 Jan 12 at 15:25
• Hmm... fair point. In that case, I personally think an edit to the question saying "I found this puzzle in a VRChat world" would be enough. – F1Krazy Jan 12 at 15:27
I would argue that this is a poorly specified puzzle (as is common with these things). @MacGyver88's solution is completely valid. But you could equally say
The last row is double the second last row and get 242424.
In fact, if you assume that this is a column-by-column operation, you could set up a system of simultaneous equations to figure out what that operation was (assuming it was linear which is not necessarily valid but we would want to start with simple assumptions):
$$\begin{eqnarray} 3&a &+ &b &+& c &= 2\\ 2 &a &+ 2&b &+& c &= 4\\ &a &+ 3 &b &+ &c &= 6 \end{eqnarray}$$
This yields a family of solutions:
$$\begin{eqnarray} b &=& a+2\\ c &=& -4a \end{eqnarray}$$
The first solution is simply the $$a=0$$ case. But there are infinitely many others. Here's a spreadsheet enumerating some of them. Here's a screenshot if you don't want to fiddle with the formulae:
The two "best" ones are the $$a=0$$ already mentioned and the $$a=-1$$ which yields:
"Take the first number from the second and add 4" as the rule. This gives 442200 for the question marks
So, the solution might be
777333
Here's how I did it
Fold the first two lines down the middle
Enter the numbers in order from top to bottom on the last line
Here's what I did:
• Just a possible pattern I noticed. – MacGyver88 Jan 15 at 16:37
Alternative solution
242424
X1y1z1
X2y2z2
X3y3z3
X3=(x1+x2)-(x1-x2)
Y3=(y1+y2)-(y1-y2)
Z3=(z1+z2)-(z1-z2)
• $(x_1+x_2) - (x_1-x_2) = 2 x_2$ . It just says $2\times121212 = 242424$ – Florian F Jan 18 at 22:53 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 5, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.6340194344520569, "perplexity": 697.8671921423227}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146123.78/warc/CC-MAIN-20200225141345-20200225171345-00036.warc.gz"} |
http://dimacs.rutgers.edu/Events/2008/abstracts/chen.html | DIMACS Theoretical Computer Science Seminar
Title: Graph Homomorphisms with Complex Values: A Dichotomy Theorem
Speaker: Xi Chen, Rutgers University
Date: Wednesday, November 26, 2008 11:00-12:00pm
Location: CoRE Bldg, Room 431, Rutgers University, Busch Campus, Piscataway, NJ
Abstract:
The graph homomorphism problem has been studied intensively. Given an m by m symmetric matrix A, the graph homomorphism function is defined as Z_A(G) = \sum_{f:V \rightarrow [m]} \prod_{(u,v) \in E} A_{f(u),f(v)}, where G = (V,E) is any undirected graph. The function Z_A(G) can encode many interesting graph properties, including counting vertex covers and k-colorings. We study the computational complexity of Z_A(G) for arbitrary complex valued matrices A. Building on work by Dyer and Greenhill, Bulatov and Grohe, and especially the recent beautiful work by Goldberg, Grohe, Jerrum and Thurley, we prove a complete dichotomy theorem for this problem.
Joint work with Jin-Yi Cai and Pinyan Lu. | {"extraction_info": {"found_math": false, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9703375697135925, "perplexity": 3822.7476574227667}, "config": {"markdown_headings": false, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00283-ip-10-233-31-227.ec2.internal.warc.gz"} |
http://www.phy.ntnu.edu.tw/ntnujava/index.php?topic=1407.msg5291 | NTNUJAVA Virtual Physics LaboratoryEnjoy the fun of physics with simulations! Backup site http://enjoy.phy.ntnu.edu.tw/ntnujava/
March 25, 2018, 12:49:24 am
Welcome, Guest. Please login or register.Did you miss your activation email? 1 Hour 1 Day 1 Week 1 Month Forever Login with username, password and session length
Home Help Search Login Register
"Vision, mission and action." ...Wisdom
Pages: [1] Go Down
Author Topic: Question regarding waves. (Read 5188 times) 0 Members and 1 Guest are viewing this topic. Click to toggle author information(expand message area).
leeyiren
Jr. Member
Offline
Posts: 39
« Embed this message on: January 10, 2010, 05:13:23 am »
When water wave flows from shallow water into deep water, how do the frequency, wavelength and speed change?
Pls include explanation. Thanks.
Logged
Fu-Kwun Hwang
Administrator
Hero Member
Offline
Posts: 3079
« Embed this message Reply #1 on: January 11, 2010, 01:59:17 pm » posted from:Taipei,T\'ai-pei,Taiwan
The frequency of the same wave is always the same.
However, the speed of wave travel in different material is different.
The refraction index of light in a material is defined as speed of light $c$ divide by light speed in that material $v$, i.e. $n=\frac{c}{v}$
Logged
leeyiren
Jr. Member
Offline
Posts: 39
« Embed this message Reply #2 on: January 11, 2010, 06:12:44 pm »
how do they change? increase or decrease? pls be more clear. thx
Logged
Fu-Kwun Hwang
Administrator
Hero Member
Offline
Posts: 3079
« Embed this message Reply #3 on: January 11, 2010, 08:20:10 pm » posted from:Taipei,T\'ai-pei,Taiwan
Are you talking about wave move on the water surface or wave traveling under the water surface (in the depth water)?
Logged
Pages: [1] Go Up
"Vision, mission and action." ...Wisdom
Jump to:
Related Topics Subject Started by Replies Views Last post pressure....question Wave hank 1 17639 June 02, 2005, 12:16:59 am by karlmcilwaine Pulley Question Dynamics Bitupon 3 22165 August 24, 2011, 12:19:44 pm by melody pressure question kinematics m_noha 1 7714 July 20, 2015, 04:47:26 pm by RandallJasper Quick question related to grid spacing Question related to Physics or physics related simulation mickey2times 3 5164 October 29, 2010, 10:40:54 am by Fu-Kwun Hwang wave concept question Physics Questions leeyiren 5 5258 September 19, 2010, 10:17:57 pm by Fu-Kwun Hwang
Page created in 0.289 seconds with 23 queries.since 2011/06/15 | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 0, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 3, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.3294239044189453, "perplexity": 11738.104396806106}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": false}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257650764.71/warc/CC-MAIN-20180324171404-20180324191404-00635.warc.gz"} |
http://umj-old.imath.kiev.ua/article/?lang=en&article=4449 | 2019
Том 71
№ 11
# On a property of the entire dirichlet series with decreasing coefficients
Sheremeta M. M.
Abstract
The class $S_{Ψ}^{ *} (A)$ of the entire Dirichlet series $F(s) = \sum\nolimits_{n = 0}^\infty {a_n exp(s\lambda _n )}$ is studied, which is defined for a fixed sequence $A = (a_n ),\; 0 < a_n \downarrow 0,\sum\nolimits_{n = 0}^\infty {a_n< + \infty } ,$ by the conditions $0 ≤ λ_n ↗ +∞$ and $λ_n ≤ (1n^+(1/a_n ))$ imposed on the parameters $λ_n$, where $ψ$ is a positive continuous function on $(0, +∞)$ such that $ψ(x) ↑ +∞$ and $x/ψ(x) ↑ +∞$ as $x →+ ∞$. In this class, the necessary and sufficient conditions are given for the relation $ϕ(\ln M(σ, F)) ∼ ϕ(\ln μ(σ, F))$ to hold as $σ → +∞$, where $M(\sigma ,F) = sup\{ |F(\sigma + it)|:t \in \mathbb{R}\} ,\mu (\sigma ,F) = max\{ a_n exp(\sigma \lambda _n ):n \in \mathbb{Z}_ + \}$, and $ϕ$ is a positive continuous function increasing to $+∞$ on $(0, +∞)$, forwhich $\ln ϕ(x)$ is a concave function and $ϕ(\ln x)$ is a slowly increasing function.
English version (Springer): Ukrainian Mathematical Journal 45 (1993), no. 6, pp 929-942.
Citation Example: Sheremeta M. M. On a property of the entire dirichlet series with decreasing coefficients // Ukr. Mat. Zh. - 1993. - 45, № 6. - pp. 843–853.
Full text | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 0, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9798334240913391, "perplexity": 169.36934399922703}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.3, "absolute_threshold": 10, "end_threshold": 5, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400203096.42/warc/CC-MAIN-20200922031902-20200922061902-00524.warc.gz"} |
http://math.stackexchange.com/questions/284611/find-the-values-of-the-positive-constants-k-and-c-such-that-37-le-k3-sin | # Find the values of the positive constants $k$ and $c$ such that $-37\le k(3\sin\theta + 4\cos\theta) +c\le 43$ for all values of $\theta$
Hi how do i go about solving this?
Find the values of the positive constants $k$ and $c$ such that $$-37\le k(3\sin\theta + 4\cos\theta) +c\le 43$$for all values of $\theta$ $$\rightarrow-37\le k(5(\sin\theta + 53.1)) +c\le 43$$ Then what?
Cheers
-
Write $-37-c \le5k\sin(\phi)\le 43-c$. The range of the middle expression is $[-5k,5k]$. So if the inequality is "tight", you have $c=3$. Then solving for $k$ gives $k=8$. – David Mitra Jan 22 '13 at 23:55
Hint: $|\sin \alpha| \leq 1$.
Hence, this implies that $c = \frac {43+(-37)} {2}$.
-
Hi cheers for the help! Where did the hint come from? Can you show me a step after? – maxmitch Jan 22 '13 at 23:37
The hint is just stating the behavior of the $\sin$ function. The next step will be $-5k \leq k 5 \sin(\theta + 53.1) \leq 5k$. – Calvin Lin Jan 23 '13 at 0:34
By Cauchy Schwartz
$$(3\sin(x)+4\cos(x))^2 \leq 25 (\sin^2(x)+\cos^2(x))=25$$
and equality is possible.
Then
$$-5 \leq 3\sin(x)+4\cos(x) \leq 5$$
this shows that
$$-5k+c \leq - k(3\sin\theta + 4\cos\theta) +c\le 5k+c \,.$$
and the lower/upper bounds can be atatined. You can finish it easely.
- | {"extraction_info": {"found_math": true, "script_math_tex": 0, "script_math_asciimath": 0, "math_annotations": 0, "math_alttext": 0, "mathml": 0, "mathjax_tag": 0, "mathjax_inline_tex": 1, "mathjax_display_tex": 1, "mathjax_asciimath": 0, "img_math": 0, "codecogs_latex": 0, "wp_latex": 0, "mimetex.cgi": 0, "/images/math/codecogs": 0, "mathtex.cgi": 0, "katex": 0, "math-container": 0, "wp-katex-eq": 0, "align": 0, "equation": 0, "x-ck12": 0, "texerror": 0, "math_score": 0.9642244577407837, "perplexity": 373.2645466312606}, "config": {"markdown_headings": true, "markdown_code": true, "boilerplate_config": {"ratio_threshold": 0.18, "absolute_threshold": 10, "end_threshold": 15, "enable": true}, "remove_buttons": true, "remove_image_figures": true, "remove_link_clusters": true, "table_config": {"min_rows": 2, "min_cols": 3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119649133.8/warc/CC-MAIN-20141024030049-00140-ip-10-16-133-185.ec2.internal.warc.gz"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.