1,215 research outputs found
Optimal stopping times for estimating Bernoulli parameters with applications to active imaging
We address the problem of estimating the parameter of a Bernoulli process. This arises in many applications, including photon-efficient active imaging where each illumination period is regarded as a single Bernoulli trial. We introduce a framework within which to minimize the mean-squared error (MSE) subject to an upper bound on the mean number of trials. This optimization has several simple and intuitive properties when the Bernoulli parameter has a beta prior. In addition, by exploiting typical spatial correlation using total variation regularization, we extend the developed framework to a rectangular array of Bernoulli processes representing the pixels in a natural scene. In simulations inspired by realistic active imaging scenarios, we demonstrate a 4.26 dB reduction in MSE due to the adaptive acquisition, as an average over many independent experiments and invariant to a factor of 3.4 variation in trial budget.Accepted manuscrip
“Where Are We Now?” The Image Construction of Arabs and Muslims in Bodyguard
Over the past decade Arab and Muslim representations in the media have been either negative or overly simplified as a way to avoid criticism from watchdog groups. Arab and Muslim culture is viewed by the mainstream Western perspective as different, and inferior. According to Edward Said this divide and hierarchy between Eastern and Western comes through the process of Othering and is at the heart of Orientalism. This thesis investigates how Arabs and Muslims are Othered through a case study of the successful BBC television series Bodyguard.
Bodyguard presents the British government and police force attempting to stop various terrorist attacks in London by Arab Muslims. I analyze the representation of the four Muslim males and one female on the show in juxtaposition with the lead character of Sargent David Budd. Here, Budd is presented as the white savior in that he is trying to save the subservient, obedient Muslim wife of the terrorist (Nadia). I also heavily focus on the analysis of Nadia\u27s character and highlight how she is Othered in different stages of her character development. Her Othering starts by representing her as passive, obedient, wears the hijab, and mostly silent, and ends with her being diabolical and evil. This representation, which I identify as the Duplicitous Arab or Muslim, may implicitly or explicitly present the idea that even when Arabs and Muslims seem trustworthy they are not
Beyond Binomial and Negative Binomial: Adaptation in Bernoulli Parameter Estimation
Estimating the parameter of a Bernoulli process arises in many applications,
including photon-efficient active imaging where each illumination period is
regarded as a single Bernoulli trial. Motivated by acquisition efficiency when
multiple Bernoulli processes are of interest, we formulate the allocation of
trials under a constraint on the mean as an optimal resource allocation
problem. An oracle-aided trial allocation demonstrates that there can be a
significant advantage from varying the allocation for different processes and
inspires a simple trial allocation gain quantity. Motivated by realizing this
gain without an oracle, we present a trellis-based framework for representing
and optimizing stopping rules. Considering the convenient case of Beta priors,
three implementable stopping rules with similar performances are explored, and
the simplest of these is shown to asymptotically achieve the oracle-aided trial
allocation. These approaches are further extended to estimating functions of a
Bernoulli parameter. In simulations inspired by realistic active imaging
scenarios, we demonstrate significant mean-squared error improvements: up to
4.36 dB for the estimation of p and up to 1.80 dB for the estimation of log p.Comment: 13 pages, 16 figure
Exploration for New, Facile Synthetic Approaches to Bisphosphine Monoxides
Current synthetic routes of bisphosphine monooxides (BPMOs) are limited. Standard oxidizers produce a mixture of dioxide and monoxide products with remaining bisphosphine reagent. Current methods used include selective, Pd-catalyzed oxidation and mono-reduction of bisphosphine dioxides using several moisture-sensitive materials. The primary goal of this project has been the discovery of simpler methods to selectively produce BPMOs in high purity. Explored methods, described herein, include using mild, organic oxidizers and using the well-established Wittig reaction to selectively oxidize one phosphorus center. 31P{1H} NMR and MS were used to characterize the products and determine product distributions for all attempts.https://openriver.winona.edu/urc2018/1026/thumbnail.jp
Data Analytics and Techniques: A Review
Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide improvements for many applications. In addition, critical challenges and research issues were provided based on published paper limitations to help researchers distinguish between various analytics techniques to develop highly consistent, logical, and information-rich analyses based on valuable features. Furthermore, the findings of this paper may be used to identify the best methods in each sector used in these publications, assist future researchers in their studies for more systematic and comprehensive analysis and identify areas for developing a unique or hybrid technique for data analysis
The relation between active smoking and colposcopical and cytological findings in the cervix uteri
Background: All types of smoking have been associated with cervical neoplasia, and the long-term of use tobacco products and intensity of smoking could influence cervical carcinogenesis. The aim of this study is to identify the association between smoking and the presence of colposcopical and cytological abnormalities in cervix uteri.Methods: An observational case-control study was applied on 100 patients to investigate this relationship. The patients were divided into two groups, smokers’ group (70) cases and nonsmokers’ group (30) cases. All of the patients have been submitted to colposcopy and Papanicolaou smear. Comparison of colposcopic and cellular findings between both groups was done.Results: Authors found that there was a significance difference in the rate of abnormal colposcopical findings between two groups. This rate in smokers’ sample was 45.7% and in the second was 26.7% with p-value=0.04. Additionally, there was no significance difference in the rate of abnormal cytological findings. This rate in smokers’ group was 32.9% whereas in the second was 23.4% with p-value=0.6.Conclusions: This study data suggests that smoking increases abnormalities in papanicolaou smear and colposcopy
Maintaining Contour Trees of Dynamic Terrains
We study the problem of maintaining the contour tree T of a terrain Sigma, represented as a triangulated xy-monotone surface, as the heights of its vertices vary continuously with time. We characterize the combinatorial changes in T and how they relate to topological changes in Sigma. We present a kinetic data structure (KDS) for maintaining T efficiently. It maintains certificates that fail, i.e., an event occurs, only when the heights of two adjacent vertices become equal or two saddle vertices appear on the same contour. Assuming that the heights of two vertices of Sigma become equal only O(1) times and these instances can be computed in O(1) time, the KDS processes O(kappa + n) events, where n is the number of vertices in Sigma and kappa is the number of events at which the combinatorial structure of T changes, and processes each event in O(log n) time. The KDS can be extended to maintain an augmented contour tree and a join/split tree
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
- …