48,106 research outputs found
An Early Story of Kho Ping Hoo
Kho Ping Hoo (1926–1994) is the most well-known of all Indonesian writers of popular silat stories, largely set in China, which describe the adventures and romances of legendary heroes famed for their skill in martial arts. It is less well-known that he began his career writing critical stories about socio-economic conditions in the late 50s and early 60s. This paper discusses one of these stories. It places the story in the context of political developments of the time, in particular as they affected the Chinese Indonesian community. The paper argues that this story and one or two others like it come at the end of a tradition of Sino-Indonesian literature which had flourished from the end of the nineteenth century until the mid-1950s. After 1960, Chinese-Indonesian writers cease writing realist fiction of any kind and write either silat stories or romantic stories set in middle class urban environments
On Glauber modes in Soft-Collinear Effective Theory
Gluon interactions involving spectator partons in collisions at hadronic
machines are investigated. We find a class of examples in which a mode, called
Glauber gluons, must be introduced to the effective theory for consistency.Comment: 19 pages, three figures. Uses JHEP3.cl
Tunable fibre-coupled multiphoton microscopy with a negative curvature fibre
Negative curvature fibre (NCF) guides light in its core by inhibiting the coupling of core and cladding modes. In this work, an NCF was designed and fabricated to transmit ultrashort optical pulses for multiphoton microscopy with low group velocity dispersion (GVD) at 800 nm. Its attenuation was measured to be <0.3 dB m(-1) over the range 600-850 nm and the GVD was -180 ± 70 fs(2) m(-1) at 800 nm. Using an average fibre output power of ∼20 mW and pulse repetition rate of 80 MHz, the NCF enabled pulses with a duration of <200 fs to be transmitted through a length of 1.5 m of fibre over a tuning range of 180 nm without the need for dispersion compensation. In a 4 m fibre, temporal and spectral pulse widths were maintained to within 10% of low power values up to the maximum fibre output power achievable with the laser system used of 278 mW at 700 nm, 808 mW at 800 nm and 420 mW at 860 nm. When coupled to a multiphoton microscope, it enabled imaging of ex vivo tissue using excitation wavelengths from 740 nm to 860 nm without any need for adjustments to the set-up
Time and dose dependency of bone-sarcomas in patients injected with radium-224
The time course and dose dependency of the incidence of bone-sarcomas among 900 German patients treated with high doses of radium-224 is analysed in terms of a proportional hazards model with a log-normal dependency of time to tumor and a linear-quadratic dose relation. The deduced dose dependency agrees well with a previous analysis in terms of a non-parametric proportional hazards model, and confirms the temporal distribution which has been used in the Radioepidemiological Tables of NIH. However, the linear-quadratic dose-response model gives a risk estimate for low doses which is somewhat less than half that obtained under the assumption of linearity.
Dedicated to Prof. W. Jacobi on the occasion of his 60th birthday
Work performed under Euratom contracts BI6-D-083-D, BI6-F-111-D, U.S. Department of Energy contract DE-AC 02-76 EV-00119, the U.S. National Cancer Institut
Non-global Structure of the O({\alpha}_s^2) Dijet Soft Function
High energy scattering processes involving jets generically involve matrix
elements of light- like Wilson lines, known as soft functions. These describe
the structure of soft contributions to observables and encode color and
kinematic correlations between jets. We compute the dijet soft function to
O({\alpha}_s^2) as a function of the two jet invariant masses, focusing on
terms not determined by its renormalization group evolution that have a
non-separable dependence on these masses. Our results include non-global single
and double logarithms, and analytic results for the full set of non-logarithmic
contributions as well. Using a recent result for the thrust constant, we
present the complete O({\alpha}_s^2) soft function for dijet production in both
position and momentum space.Comment: 55 pages, 8 figures. v2: extended discussion of double logs in the
hard regime. v3: minor typos corrected, version published in JHEP. v4: typos
in Eq. (3.33), (3.39), (3.43) corrected; this does not affect the main
result, numerical results, or conclusion
Block CUR: Decomposing Matrices using Groups of Columns
A common problem in large-scale data analysis is to approximate a matrix
using a combination of specifically sampled rows and columns, known as CUR
decomposition. Unfortunately, in many real-world environments, the ability to
sample specific individual rows or columns of the matrix is limited by either
system constraints or cost. In this paper, we consider matrix approximation by
sampling predefined \emph{blocks} of columns (or rows) from the matrix. We
present an algorithm for sampling useful column blocks and provide novel
guarantees for the quality of the approximation. This algorithm has application
in problems as diverse as biometric data analysis to distributed computing. We
demonstrate the effectiveness of the proposed algorithms for computing the
Block CUR decomposition of large matrices in a distributed setting with
multiple nodes in a compute cluster, where such blocks correspond to columns
(or rows) of the matrix stored on the same node, which can be retrieved with
much less overhead than retrieving individual columns stored across different
nodes. In the biometric setting, the rows correspond to different users and
columns correspond to users' biometric reaction to external stimuli, {\em
e.g.,}~watching video content, at a particular time instant. There is
significant cost in acquiring each user's reaction to lengthy content so we
sample a few important scenes to approximate the biometric response. An
individual time sample in this use case cannot be queried in isolation due to
the lack of context that caused that biometric reaction. Instead, collections
of time segments ({\em i.e.,} blocks) must be presented to the user. The
practical application of these algorithms is shown via experimental results
using real-world user biometric data from a content testing environment.Comment: shorter version to appear in ECML-PKDD 201
Direct photon production with effective field theory
The production of hard photons in hadronic collisions is studied using
Soft-Collinear Effective Theory (SCET). This is the first application of SCET
to a physical, observable cross section involving energetic partons in more
than two directions. A factorization formula is derived which involves a
non-trivial interplay of the angular dependence in the hard and soft functions,
both quark and gluon jet functions, and multiple partonic channels. The
relevant hard, jet and soft functions are computed to one loop and their
anomalous dimensions are determined to three loops. The final resummed
inclusive direct photon distribution is valid to next-to-next-to-leading
logarithmic order (NNLL), one order beyond previous work. The result is
improved by including non-logarithmic terms and photon isolation cuts through
matching, and compared to Tevatron data and to fixed order results at the
Tevatron and the LHC. The resummed cross section has a significantly smaller
theoretical uncertainty than the next-to-leading fixed-order result,
particularly at high transverse momentum.Comment: 42 pages, 9 figures; v2: references added, minor changes; v3: typos;
v4: typos, corrections in (16), (47), (72
Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks
Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies. Although these initiating events are random, e.g., faults on transmission lines struck by lightning, the existence of electronically altered measurements may implicate the process to identify root causes of abnormal events. This paper is concerned with alter-andhide (AaH) attacks by tampering the actual measurements to normal states with the background of disruptive switching actions that hide the true values of local events from operators at the control center. A cyber inference system (CyIS) framework is proposed to synthesize all sequential, missing, or altered alarms of related substations against AaH attacks. The stochastic nature of such attack events is modeled with probabilities as an integer programming problem with multiple scenarios. The proposed method is utilized to verify alarm scenarios for a conclusion of the potential AaH attacks on the substations.postprin
Knowledge management system on flow and water quality modeling
Author name used in this publication: K. W. Chau2001-2002 > Academic research: refereed > Publication in refereed journalAccepted ManuscriptPublishe
- …
