322 research outputs found
Mapping lightning in the sky with a mini array
Mini arrays are commonly used for infrasonic and seismic studies. Here we report for the first time the detection and mapping of distant lightning discharges in the sky with a mini array. The array has a baseline to wavelength ratio ∼4.2·10−2 to record very low frequency electromagnetic waves from 2 to 18 kHz. It is found that the mini array detects ∼69 lightning pulses per second from cloud-to-ground and in-cloud discharges, even though the parent thunderstorms are ∼900–1100 km away and a rigorous selection criterion based on the quality of the wavefront across the array is used. In particular, lightning pulses that exhibit a clockwise phase progression are found at larger elevation angles in the sky as the result of a birefringent subionospheric wave propagation attributed to ordinary and extraordinary waves. These results imply that long range lightning detection networks might benefit from an exploration of the wave propagation conditions with mini arrays.</p
Recommended from our members
First in‐situ observations of gaseous volcanic plume electrification
Volcanic plumes become electrically charged, often producing spectacular displays of lightning. Previous research has focused on understanding volcanic lightning, primarily the large electric fields produced by charging of ash particles. Here we report on the previously overlooked phenomenon of volcanic plume electrification in the absence of detectable ash. We present the first in situ vertical profile measurements of charge, thermodynamic, and microphysical properties inside predominantly gaseous plumes directly above an erupting volcano. Our measurements demonstrate that substantial charge (at least ±8,000 pC/m3) is present in gaseous volcanic clouds without detectable ash. We suggest that plume charging may be enhanced by the emission of radon gas from the volcano, which causes ionization. This presents a hitherto unrecognized, but likely to be common, mechanism for charge generation in volcanic plumes, which is expected to modulate plume characteristics and lifetime. This process is currently neglected in recognized mechanisms of volcanic plume electrification
Thermal fluctuations in viscous cosmology
In this paper we investigate the power spectrum of thermal fluctuations in
very early stage of viscous cosmology. When the state parameter as well as the
viscous coefficient of a barotropic fluid is properly chosen, a scale invariant
spectrum with large non-Gaussianity can be obtained. In contrast to the results
previously obtained in string gas cosmology and holographic cosmology, we find
the non-Gaussianity in this context can be k-independent such that it is not
suppressed at large scale, which is expected to be testified in future
observation.Comment: 13 pages, no figure, typos corrected, references adde
Lightning Sferics:Analysis of the Instantaneous Phase and Frequency Inferred From Complex Waveforms
Analysis of very low frequency lightning waveforms, or radio sferics, can contribute to research into lower ionosphere perturbations and the corresponding atmospheric chemistry. Lightning waveforms can also be characterized on the basis of their propagation distance from receivers in order to study radio wave propagation. A bank of average waveforms, that is, the waveform bank, <1,000 km with a spatial resolution of 10 km has been produced, based on the lightning waveforms recorded in Europe on 8 August 2014. These average lightning waveforms at different distances exhibit a sequence of consecutive maxima resulting from ionospheric reflections, named sky waves. The spectral waveform bank shows a sequence of consecutive modal maxima at different frequencies depending on distance. The Hilbert transform is applied to produce complex lightning waveforms, which provide additional information to the original real waveforms alone, that is, the instantaneous phase and frequency. The time differences calculated from the instantaneous phases of complex lightning waveforms give the minimum arrival time difference error when compared to other analyzed signal processing methods. The derivative of the instantaneous phase, that is, the instantaneous frequency, represents the amplitude-weighted average of frequency components at maximum amplitude according to theory and numerical simulation. In real experiments, the instantaneous frequency can be understood as the median value of the real frequency distribution calculated at maximum amplitude. It is found that the instantaneous frequencies at maximum amplitudes are distance dependent. This finding might enable the development of a novel method to determine lightning distances in the future.</p
Combined novice, near-peer, e-mentoring palliative medicine program: A mixed method study in Singapore
INTRODUCTION:An acute shortage of senior mentors saw the Palliative Medicine Initiative (PMI) combine its novice mentoring program with electronic and peer mentoring to overcome insufficient mentoring support of medical students and junior doctors by senior clinicians. A three-phased evaluation was carried out to evaluate mentees' experiences within the new CNEP mentoring program. METHODS:Phase 1 saw use of a Delphi process to create a content-valid questionnaire from data drawn from 9 systematic reviews of key aspects of novice mentoring. In Phase 2 Cognitive Interviews were used to evaluate the tool. The tool was then piloted amongst mentees in the CNEP program. Phase 3 compared mentee's experiences in the CNEP program with those from the PMI's novice mentoring program. RESULTS:Thematic analysis of open-ended responses revealed three themes-the CNEP mentoring process, its benefits and challenges that expound on the descriptive statistical analysis of specific close-ended and Likert scale responses of the survey. The results show mentee experiences in the PMI's novice mentoring program and the CNEP program to be similar and that the addition of near peer and e-mentoring processes enhance communications and support of mentees. CONCLUSION:CNEP mentoring is an evolved form of novice mentoring built on a consistent mentoring approach supported by an effective host organization. The host organization marshals assessment, support and oversight of the program and allows flexibility within the approach to meet the particular needs of mentees, mentors and senior mentors. Whilst near-peer mentors and e-mentoring can make up for the lack of senior mentor availability, their effectiveness hinges upon a common mentoring approach. To better support the CNEP program deeper understanding of the mentoring dynamics, policing and mentor and mentee training processes are required. The CNEP mentoring tool too needs to be validated
Privacy Risks of Securing Machine Learning Models against Adversarial Examples
The arms race between attacks and defenses for machine learning models has
come to a forefront in recent years, in both the security community and the
privacy community. However, one big limitation of previous research is that the
security domain and the privacy domain have typically been considered
separately. It is thus unclear whether the defense methods in one domain will
have any unexpected impact on the other domain.
In this paper, we take a step towards resolving this limitation by combining
the two domains. In particular, we measure the success of membership inference
attacks against six state-of-the-art defense methods that mitigate the risk of
adversarial examples (i.e., evasion attacks). Membership inference attacks
determine whether or not an individual data record has been part of a model's
training set. The accuracy of such attacks reflects the information leakage of
training algorithms about individual members of the training set. Adversarial
defense methods against adversarial examples influence the model's decision
boundaries such that model predictions remain unchanged for a small area around
each input. However, this objective is optimized on training data. Thus,
individual data records in the training set have a significant influence on
robust models. This makes the models more vulnerable to inference attacks.
To perform the membership inference attacks, we leverage the existing
inference methods that exploit model predictions. We also propose two new
inference methods that exploit structural properties of robust models on
adversarially perturbed data. Our experimental evaluation demonstrates that
compared with the natural training (undefended) approach, adversarial defense
methods can indeed increase the target model's risk against membership
inference attacks.Comment: ACM CCS 2019, code is available at
https://github.com/inspire-group/privacy-vs-robustnes
Recommended from our members
Challenges in coupling atmospheric electricity with biological systems
The atmosphere is host to a complex electric environment, ranging from a global electric circuit generating fluctuating atmospheric electric fields to local lightning strikes and ions. While research on interactions of organisms with their electrical environment is deeply rooted in the aquatic environment, it has hitherto been confined to interactions with local electrical phenomena and organismal perception of electric fields. However, there is emerging evidence of coupling between large- and small-scale atmospheric electrical phenomena and various biological processes in terrestrial environments that even appear to be tied to continental waters. Here, we synthesize our current understanding of this connectivity, discussing how atmospheric electricity can affect various levels of biological organization across multiple ecosystems. We identify opportunities for research, highlighting its complexity and interdisciplinary nature and draw attention to both conceptual and technical challenges lying ahead of our future understanding of the relationship between atmospheric electricity and the organization and functioning of biological systems
The Escherichia coli K-12 ORFeome: a resource for comparative molecular microbiology
<p>Abstract</p> <p>Background</p> <p>Systems biology and functional genomics require genome-wide datasets and resources. Complete sets of cloned open reading frames (ORFs) have been made for about a dozen bacterial species and allow researchers to express and study complete proteomes in a high-throughput fashion.</p> <p>Results</p> <p>We have constructed an open reading frame (ORFeome) collection of 3974 or 94% of the known <it>Escherichia coli </it>K-12 ORFs in Gateway<sup>® </sup>entry vector pENTR/Zeo. The collection has been used for protein expression and protein interaction studies. For example, we have compared interactions among YgjD, YjeE and YeaZ proteins in <it>E. coli</it>, <it>Streptococcus pneumoniae</it>, and <it>Staphylococcus aureus</it>. We also compare this ORFeome with other Gateway-compatible bacterial ORFeomes and show its utility for comparative functional genomics.</p> <p>Conclusions</p> <p>The <it>E. coli </it>ORFeome provides a useful resource for functional genomics and other areas of protein research in a highly flexible format. Our comparison with other ORFeomes makes comparative analyses straighforward and facilitates direct comparisons of many proteins across many genomes.</p
A Systematic Scoping Review of Ethical Issues in Mentoring in Surgery.
Background:Mentoring is crucial to the growth and development of mentors, mentees, and host organisations. Yet, the process of mentoring in surgery is poorly understood and increasingly mired in ethical concerns that compromise the quality of mentorship and prevent mentors, mentees, and host organisations from maximising its full potential. A systematic scoping review was undertaken to map the ethical issues in surgical mentoring to enhance understanding, assessment, and guidance on ethical conduct. Methods:Arksey and O'Malley's methodological framework was used to guide a systematic scoping review involving articles published between January 1, 2000 and December 31, 2018 in PubMed, Embase, Scopus, ERIC, ScienceDirect, Mednar, and OpenGrey databases. Braun and Clarke's thematic analysis approach was adopted to compare ethical issues in surgical mentoring across different settings, mentee and mentor populations, and host organisations. Results:A total of 3849 abstracts were identified, 464 full-text articles were retrieved, and 50 articles were included. The 3 themes concerned ethical lapses at the levels of mentor or mentee, mentoring relationships, and host organisation. Conclusions:Mentoring abuse in surgery involves lapses in conduct, understanding of roles and responsibilities, poor alignment of expectations, and a lack of clear standards of practice. It is only with better structuring of mentoring processes and effective support of host organisation tasked with providing timely, longitudinal, and holistic assessment and oversight will surgical mentoring overcome prevailing ethical concerns surrounding it
- …