1,108 research outputs found

    Exchange Interactions in a Dinuclear Manganese (II) Complex with Cyanopyridine-N-oxide Bridging Ligands

    Full text link
    The structure and magnetic properties of oligonuclear manganese complex [Mn(hfa)2cpo]2 (where hfa is hexafluoroacetylacetonate dehydrate and cpo is 4-cyanopyridine-N-oxide) are presented. In the unit cell, the dinuclear molecules are well isolated from each other. The non-monotonous dependence of magnetic susceptibility is explained in terms of the hierarchy of exchange parameters by using exact diagonalization. The thermodynamic behavior of pure cpo and [Mn(hfa)2(cpo)]2 is simulated numerically in a dimer approximation by an extrapolation to spin S = 5/2. The Mn-Mn exchange integral is evaluated.Comment: Final corrected version, pdf, 12 page

    Binge drinking among adolescents in Russia: prevalence, risk and protective factors.

    No full text
    Despite evidence that alcohol misuse has been having an increasingly detrimental effect on adolescent wellbeing in Russia in recent years this phenomenon has been little researched. Using data from 2112 children from the Arkhangelsk Social and Health Assessment (SAHA) 2003, this study examined which factors acted as 'risk' or 'protective' factors for adolescent binge drinking within three domains we termed the 'family environment', the 'alcohol environment' and 'deviant behaviour'. The results showed that in the presence of comparatively moderate levels of binge drinking among both boys and girls, being able to access alcohol easily, being unaware of the risks of binge drinking and having peers who consumed alcohol increased the risk of adolescent binge drinking - as did playing truant, smoking and marijuana use, while parental warmth was protective against binge drinking for girls. Our finding that risk and protective factors occur across domains suggests that any interventions targeted against adolescent binge drinking may need to simultaneously focus on risk behaviours in different domains, while at the same time, broader social policy should act to limit the availability of alcohol to adolescents in Russia more generally

    Linking working memory and long-term memory: A computational model of the learning of new words

    Get PDF
    The nonword repetition (NWR) test has been shown to be a good predictor of children’s vocabulary size. NWR performance has been explained using phonological working memory, which is seen as a critical component in the learning of new words. However, no detailed specification of the link between phonological working memory and long-term memory (LTM) has been proposed. In this paper, we present a computational model of children’s vocabulary acquisition (EPAM-VOC) that specifies how phonological working memory and LTM interact. The model learns phoneme sequences, which are stored in LTM and mediate how much information can be held in working memory. The model’s behaviour is compared with that of children in a new study of NWR, conducted in order to ensure the same nonword stimuli and methodology across ages. EPAM-VOC shows a pattern of results similar to that of children: performance is better for shorter nonwords and for wordlike nonwords, and performance improves with age. EPAM-VOC also simulates the superior performance for single consonant nonwords over clustered consonant nonwords found in previous NWR studies. EPAM-VOC provides a simple and elegant computational account of some of the key processes involved in the learning of new words: it specifies how phonological working memory and LTM interact; makes testable predictions; and suggests that developmental changes in NWR performance may reflect differences in the amount of information that has been encoded in LTM rather than developmental changes in working memory capacity. Keywords: EPAM, working memory, long-term memory, nonword repetition, vocabulary acquisition, developmental change

    Explaining semantic short-term memory deficits:evidence for the critical role of semantic control

    Get PDF
    Patients with apparently selective short-term memory (STM) deficits for semantic information have played an important role in developing multi-store theories of STM and challenge the idea that verbal STM is supported by maintaining activation in the language system. We propose that semantic STM deficits are not as selective as previously thought and can occur as a result of mild disruption to semantic control processes, i.e., mechanisms that bias semantic processing towards task-relevant aspects of knowledge and away from irrelevant information. We tested three semantic STM patients with tasks that tapped four aspects of semantic control: (i) resolving ambiguity between word meanings, (ii) sensitivity to cues, (iii) ignoring irrelevant information and (iv) detecting weak semantic associations. All were impaired in conditions requiring more semantic control, irrespective of the STM demands of the task, suggesting a mild, but task-general, deficit in regulating semantic knowledge. This mild deficit has a disproportionate effect on STM tasks because they have high intrinsic control demands: in STM tasks, control is required to keep information active when it is no longer available in the environment and to manage competition between items held in memory simultaneously. By re-interpreting the core deficit in semantic STM patients in this way, we are able to explain their apparently selective impairment without the need for a specialised STM store. Instead, we argue that semantic STM patients occupy the mildest end of spectrum of semantic control disorders

    Exposure to Community Violence, Psychopathology, and Personality Traits in Russian Youth

    Get PDF
    Previous research with the US inner-city youth demonstrated the hazardous effects of community violence exposure. It remains unclear, however, whether these findings are generalizable to other cultures and populations. Furthermore, the role of factors influencing the processing of traumatic events such as personality has not been investigated. Two groups of Russian adolescents (community youth (N = 546) and male delinquents (N = 352)) completed questionnaires assessing their exposure to community violence, conduct problems, internalizing psychopathology and personality. The study demonstrates that the relationships between exposure to violence and psychopathology are similar across different populations within the same culture (community youth and juvenile delinquents), suggesting similar mechanisms behind this phenomenon. The patterns of these relationships were also similar for boys and girls, suggesting similarities in the mechanisms across gender. Hence, the effects of community violence exposure are generalizable to other cultures outside the US. The associations between personality traits and specific types of behaviors also tend to be similar across different populations. Higher levels of novelty seeking were related to more severe problem behaviors and to higher levels of witnessing and victimization, whereas higher levels of harm avoidance were related to higher levels of depression and posttraumatic stress

    How Safe Am I Given What I See? Calibrated Prediction of Safety Chances for Image-Controlled Autonomy

    Full text link
    End-to-end learning has emerged as a major paradigm for developing autonomous systems. Unfortunately, with its performance and convenience comes an even greater challenge of safety assurance. A key factor of this challenge is the absence of the notion of a low-dimensional and interpretable dynamical state, around which traditional assurance methods revolve. Focusing on the online safety prediction problem, this paper proposes a configurable family of learning pipelines based on generative world models, which do not require low-dimensional states. To implement these pipelines, we overcome the challenges of learning safety-informed latent representations and missing safety labels under prediction-induced distribution shift. These pipelines come with statistical calibration guarantees on their safety chance predictions based on conformal prediction. We perform an extensive evaluation of the proposed learning pipelines on two case studies of image-controlled systems: a racing car and a cartpole.Comment: This is supplementary material to the paper: How Safe Am I Given What I See? Calibrated Prediction of Safety Chances for Image-Controlled Autonomy in 6th Annual Learning for Dynamics & Control Conference (L4DC 2024

    Conservative Safety Monitors of Stochastic Dynamical Systems

    Full text link
    Generating accurate runtime safety estimates for autonomous systems is vital to ensuring their continued proliferation. However, exhaustive reasoning about future behaviors is generally too complex to do at runtime. To provide scalable and formal safety estimates, we propose a method for leveraging design-time model checking results at runtime. Specifically, we model the system as a probabilistic automaton (PA) and compute bounded-time reachability probabilities over the states of the PA at design time. At runtime, we combine distributions of state estimates with the model checking results to produce a bounded time safety estimate. We argue that our approach produces well-calibrated safety probabilities, assuming the estimated state distributions are well-calibrated. We evaluate our approach on simulated water tanks

    Curating Naturally Adversarial Datasets for Trustworthy AI in Healthcare

    Full text link
    Deep learning models have shown promising predictive accuracy for time-series healthcare applications. However, ensuring the robustness of these models is vital for building trustworthy AI systems. Existing research predominantly focuses on robustness to synthetic adversarial examples, crafted by adding imperceptible perturbations to clean input data. However, these synthetic adversarial examples do not accurately reflect the most challenging real-world scenarios, especially in the context of healthcare data. Consequently, robustness to synthetic adversarial examples may not necessarily translate to robustness against naturally occurring adversarial examples, which is highly desirable for trustworthy AI. We propose a method to curate datasets comprised of natural adversarial examples to evaluate model robustness. The method relies on probabilistic labels obtained from automated weakly-supervised labeling that combines noisy and cheap-to-obtain labeling heuristics. Based on these labels, our method adversarially orders the input data and uses this ordering to construct a sequence of increasingly adversarial datasets. Our evaluation on six medical case studies and three non-medical case studies demonstrates the efficacy and statistical validity of our approach to generating naturally adversarial dataset
    corecore