22 research outputs found
Studying Paths of Participation in Viral Diffusion Process
Authors propose a conceptual model of participation in viral diffusion
process composed of four stages: awareness, infection, engagement and action.
To verify the model it has been applied and studied in the virtual social chat
environment settings. The study investigates the behavioral paths of actions
that reflect the stages of participation in the diffusion and presents
shortcuts, that lead to the final action, i.e. the attendance in a virtual
event. The results show that the participation in each stage of the process
increases the probability of reaching the final action. Nevertheless, the
majority of users involved in the virtual event did not go through each stage
of the process but followed the shortcuts. That suggests that the viral
diffusion process is not necessarily a linear sequence of human actions but
rather a dynamic system.Comment: In proceedings of the 4th International Conference on Social
Informatics, SocInfo 201
Measurement of and charged current inclusive cross sections and their ratio with the T2K off-axis near detector
We report a measurement of cross section and the first measurements of the cross section
and their ratio
at (anti-)neutrino energies below 1.5
GeV. We determine the single momentum bin cross section measurements, averaged
over the T2K -flux, for the detector target material (mainly
Carbon, Oxygen, Hydrogen and Copper) with phase space restricted laboratory
frame kinematics of 500 MeV/c. The
results are and $\sigma(\nu)=\left( 2.41\
\pm0.022{\rm{(stat.)}}\pm0.231{\rm (syst.)}\ \right)\times10^{-39}^{2}R\left(\frac{\sigma(\bar{\nu})}{\sigma(\nu)}\right)=
0.373\pm0.012{\rm (stat.)}\pm0.015{\rm (syst.)}$.Comment: 18 pages, 8 figure
Search for Lorentz and CPT violation using sidereal time dependence of neutrino flavor transitions over a short baseline
A class of extensions of the Standard Model allows Lorentz and CPT violations, which can be identified
by the observation of sidereal modulations in the neutrino interaction rate. A search for such modulations
was performed using the T2K on-axis near detector. Two complementary methods were used in this study,
both of which resulted in no evidence of a signal. Limits on associated Lorentz and CPT-violating terms
from the Standard Model extension have been derived by taking into account their correlations in this
model for the first time. These results imply such symmetry violations are suppressed by a factor of more
than 10 20 at the GeV scale
Philosophical conceptions of information
“The original publication is available at www.springerlink.com” Copyright Springer'I love information upon all subjects that come in my way, and especially upon those that are most important.' Thus boldly declares Euphranor, one of the defenders of Christian faith in Berkley’s Alciphron (Berkeley, (1732), Dialogue 1, Section 5, Paragraph 6/10). Evidently, information has been an object of philosophical desire for some time, well before the computer revolution, Internet or the dot.com pandemonium (see for example Dunn (2001) and Adams (2003)). Yet what does Euphranor love, exactly? What is information? The question has received many answers in different fields. Unsurprisingly, several surveys do not even converge on a single, unified definition of information (see for example Braman 1989, Losee (1997), Machlup and Mansfield (1983), Debons and Cameron (1975), Larson and Debons (1983)).Peer reviewe
Yet Another Method for Combining Classifiers Outputs: A Maximum Entropy Approach
In this paper, we present a maximum entropy (maxent) approach to the fusion of experts opinions, or classifiers outputs, problem. The maxent approach is quite versatile and allows us to express in a clear, rigorous, way the a priori knowledge that is available on the problem. For instance, our knowledge about the reliability of the experts and the correlations between these experts can be easily integrated: Each piece of knowledge is expressed in the form of a linear constraint. An iterative scaling algorithm is used in order to compute the maxent solution of the problem. The maximum entropy method seeks the joint probability density of a set of random variables that has maximum entropy while satisfying the constraints. It is therefore the "most honest" characterization of our knowledge given the available facts (constraints). In the case of conflicting constraints, we propose to minimise the "lack of constraints satisfaction" or to relax some constraints and recompute the maximum entropy solution. The maxent fusion rule is illustrated by some simulations
Does o-substitution preserve recognizability?
Substitution operations on tree series are at the basis of systems of equations (over tree series) and tree series transducers. Tree series transducers seem to be an interesting transformation device in syntactic pattern matching. In this contribution, it is shown that o-substitution preserves recognizable tree series provided that the target tree series is linear and the semiring is idempotent, commutative, and continuous. This result is applied to prove that the range of the o-t-ts transformation computed by a linear recognizable tree series transducer is pointwise recognizable
The T2K experiment
The T2K experiment is a long baseline neutrino oscillation experiment. Its main goal is to measure the last unknown lepton sector mixing angle θ13 by observing νe appearance in a νμ beam. It also aims to make a precision measurement of the known oscillation parameters, and sin22θ23, via νμ disappearance studies. Other goals of the experiment include various neutrino cross-section measurements and sterile neutrino searches. The experiment uses an intense proton beam generated by the J-PARC accelerator in Tokai, Japan, and is composed of a neutrino beamline, a near detector complex (ND280), and a far detector (Super-Kamiokande) located 295 km away from J-PARC. This paper provides a comprehensive review of the instrumentation aspect of the T2K experiment and a summary of the vital information for each subsystem