48,106 research outputs found

    An Early Story of Kho Ping Hoo

    Get PDF
    Kho Ping Hoo (1926–1994) is the most well-known of all Indonesian writers of popular silat stories, largely set in China, which describe the adventures and romances of legendary heroes famed for their skill in martial arts. It is less well-known that he began his career writing critical stories about socio-economic conditions in the late 50s and early 60s. This paper discusses one of these stories. It places the story in the context of political developments of the time, in particular as they affected the Chinese Indonesian community. The paper argues that this story and one or two others like it come at the end of a tradition of Sino-Indonesian literature which had flourished from the end of the nineteenth century until the mid-1950s. After 1960, Chinese-Indonesian writers cease writing realist fiction of any kind and write either silat stories or romantic stories set in middle class urban environments

    Tunable fibre-coupled multiphoton microscopy with a negative curvature fibre

    Get PDF
    Negative curvature fibre (NCF) guides light in its core by inhibiting the coupling of core and cladding modes. In this work, an NCF was designed and fabricated to transmit ultrashort optical pulses for multiphoton microscopy with low group velocity dispersion (GVD) at 800 nm. Its attenuation was measured to be <0.3 dB m(-1) over the range 600-850 nm and the GVD was -180 ± 70 fs(2)  m(-1) at 800 nm. Using an average fibre output power of ∼20 mW and pulse repetition rate of 80 MHz, the NCF enabled pulses with a duration of <200 fs to be transmitted through a length of 1.5 m of fibre over a tuning range of 180 nm without the need for dispersion compensation. In a 4 m fibre, temporal and spectral pulse widths were maintained to within 10% of low power values up to the maximum fibre output power achievable with the laser system used of 278 mW at 700 nm, 808 mW at 800 nm and 420 mW at 860 nm. When coupled to a multiphoton microscope, it enabled imaging of ex vivo tissue using excitation wavelengths from 740 nm to 860 nm without any need for adjustments to the set-up

    Time and dose dependency of bone-sarcomas in patients injected with radium-224

    Get PDF
    The time course and dose dependency of the incidence of bone-sarcomas among 900 German patients treated with high doses of radium-224 is analysed in terms of a proportional hazards model with a log-normal dependency of time to tumor and a linear-quadratic dose relation. The deduced dose dependency agrees well with a previous analysis in terms of a non-parametric proportional hazards model, and confirms the temporal distribution which has been used in the Radioepidemiological Tables of NIH. However, the linear-quadratic dose-response model gives a risk estimate for low doses which is somewhat less than half that obtained under the assumption of linearity. Dedicated to Prof. W. Jacobi on the occasion of his 60th birthday Work performed under Euratom contracts BI6-D-083-D, BI6-F-111-D, U.S. Department of Energy contract DE-AC 02-76 EV-00119, the U.S. National Cancer Institut

    Non-global Structure of the O({\alpha}_s^2) Dijet Soft Function

    Full text link
    High energy scattering processes involving jets generically involve matrix elements of light- like Wilson lines, known as soft functions. These describe the structure of soft contributions to observables and encode color and kinematic correlations between jets. We compute the dijet soft function to O({\alpha}_s^2) as a function of the two jet invariant masses, focusing on terms not determined by its renormalization group evolution that have a non-separable dependence on these masses. Our results include non-global single and double logarithms, and analytic results for the full set of non-logarithmic contributions as well. Using a recent result for the thrust constant, we present the complete O({\alpha}_s^2) soft function for dijet production in both position and momentum space.Comment: 55 pages, 8 figures. v2: extended discussion of double logs in the hard regime. v3: minor typos corrected, version published in JHEP. v4: typos in Eq. (3.33), (3.39), (3.43) corrected; this does not affect the main result, numerical results, or conclusion

    Block CUR: Decomposing Matrices using Groups of Columns

    Full text link
    A common problem in large-scale data analysis is to approximate a matrix using a combination of specifically sampled rows and columns, known as CUR decomposition. Unfortunately, in many real-world environments, the ability to sample specific individual rows or columns of the matrix is limited by either system constraints or cost. In this paper, we consider matrix approximation by sampling predefined \emph{blocks} of columns (or rows) from the matrix. We present an algorithm for sampling useful column blocks and provide novel guarantees for the quality of the approximation. This algorithm has application in problems as diverse as biometric data analysis to distributed computing. We demonstrate the effectiveness of the proposed algorithms for computing the Block CUR decomposition of large matrices in a distributed setting with multiple nodes in a compute cluster, where such blocks correspond to columns (or rows) of the matrix stored on the same node, which can be retrieved with much less overhead than retrieving individual columns stored across different nodes. In the biometric setting, the rows correspond to different users and columns correspond to users' biometric reaction to external stimuli, {\em e.g.,}~watching video content, at a particular time instant. There is significant cost in acquiring each user's reaction to lengthy content so we sample a few important scenes to approximate the biometric response. An individual time sample in this use case cannot be queried in isolation due to the lack of context that caused that biometric reaction. Instead, collections of time segments ({\em i.e.,} blocks) must be presented to the user. The practical application of these algorithms is shown via experimental results using real-world user biometric data from a content testing environment.Comment: shorter version to appear in ECML-PKDD 201

    Direct photon production with effective field theory

    Get PDF
    The production of hard photons in hadronic collisions is studied using Soft-Collinear Effective Theory (SCET). This is the first application of SCET to a physical, observable cross section involving energetic partons in more than two directions. A factorization formula is derived which involves a non-trivial interplay of the angular dependence in the hard and soft functions, both quark and gluon jet functions, and multiple partonic channels. The relevant hard, jet and soft functions are computed to one loop and their anomalous dimensions are determined to three loops. The final resummed inclusive direct photon distribution is valid to next-to-next-to-leading logarithmic order (NNLL), one order beyond previous work. The result is improved by including non-logarithmic terms and photon isolation cuts through matching, and compared to Tevatron data and to fixed order results at the Tevatron and the LHC. The resummed cross section has a significantly smaller theoretical uncertainty than the next-to-leading fixed-order result, particularly at high transverse momentum.Comment: 42 pages, 9 figures; v2: references added, minor changes; v3: typos; v4: typos, corrections in (16), (47), (72

    Cyber Inference System for Substation Anomalies Against Alter-and-Hide Attacks

    Get PDF
    Alarms reported to energy control centers are an indication of abnormal events caused by either weather interruptions, system errors, or possibly intentional anomalies. Although these initiating events are random, e.g., faults on transmission lines struck by lightning, the existence of electronically altered measurements may implicate the process to identify root causes of abnormal events. This paper is concerned with alter-andhide (AaH) attacks by tampering the actual measurements to normal states with the background of disruptive switching actions that hide the true values of local events from operators at the control center. A cyber inference system (CyIS) framework is proposed to synthesize all sequential, missing, or altered alarms of related substations against AaH attacks. The stochastic nature of such attack events is modeled with probabilities as an integer programming problem with multiple scenarios. The proposed method is utilized to verify alarm scenarios for a conclusion of the potential AaH attacks on the substations.postprin

    Knowledge management system on flow and water quality modeling

    Get PDF
    Author name used in this publication: K. W. Chau2001-2002 > Academic research: refereed > Publication in refereed journalAccepted ManuscriptPublishe
    corecore