322 research outputs found

    Terrestrial radio remote sensing of the upper atmosphere

    Get PDF

    Mapping lightning in the sky with a mini array

    Get PDF
    Mini arrays are commonly used for infrasonic and seismic studies. Here we report for the first time the detection and mapping of distant lightning discharges in the sky with a mini array. The array has a baseline to wavelength ratio ∼4.2·10−2 to record very low frequency electromagnetic waves from 2 to 18 kHz. It is found that the mini array detects ∼69 lightning pulses per second from cloud-to-ground and in-cloud discharges, even though the parent thunderstorms are ∼900–1100 km away and a rigorous selection criterion based on the quality of the wavefront across the array is used. In particular, lightning pulses that exhibit a clockwise phase progression are found at larger elevation angles in the sky as the result of a birefringent subionospheric wave propagation attributed to ordinary and extraordinary waves. These results imply that long range lightning detection networks might benefit from an exploration of the wave propagation conditions with mini arrays.</p

    Thermal fluctuations in viscous cosmology

    Get PDF
    In this paper we investigate the power spectrum of thermal fluctuations in very early stage of viscous cosmology. When the state parameter as well as the viscous coefficient of a barotropic fluid is properly chosen, a scale invariant spectrum with large non-Gaussianity can be obtained. In contrast to the results previously obtained in string gas cosmology and holographic cosmology, we find the non-Gaussianity in this context can be k-independent such that it is not suppressed at large scale, which is expected to be testified in future observation.Comment: 13 pages, no figure, typos corrected, references adde

    Lightning Sferics:Analysis of the Instantaneous Phase and Frequency Inferred From Complex Waveforms

    Get PDF
    Analysis of very low frequency lightning waveforms, or radio sferics, can contribute to research into lower ionosphere perturbations and the corresponding atmospheric chemistry. Lightning waveforms can also be characterized on the basis of their propagation distance from receivers in order to study radio wave propagation. A bank of average waveforms, that is, the waveform bank, &lt;1,000 km with a spatial resolution of 10 km has been produced, based on the lightning waveforms recorded in Europe on 8 August 2014. These average lightning waveforms at different distances exhibit a sequence of consecutive maxima resulting from ionospheric reflections, named sky waves. The spectral waveform bank shows a sequence of consecutive modal maxima at different frequencies depending on distance. The Hilbert transform is applied to produce complex lightning waveforms, which provide additional information to the original real waveforms alone, that is, the instantaneous phase and frequency. The time differences calculated from the instantaneous phases of complex lightning waveforms give the minimum arrival time difference error when compared to other analyzed signal processing methods. The derivative of the instantaneous phase, that is, the instantaneous frequency, represents the amplitude-weighted average of frequency components at maximum amplitude according to theory and numerical simulation. In real experiments, the instantaneous frequency can be understood as the median value of the real frequency distribution calculated at maximum amplitude. It is found that the instantaneous frequencies at maximum amplitudes are distance dependent. This finding might enable the development of a novel method to determine lightning distances in the future.</p

    Combined novice, near-peer, e-mentoring palliative medicine program: A mixed method study in Singapore

    Get PDF
    INTRODUCTION:An acute shortage of senior mentors saw the Palliative Medicine Initiative (PMI) combine its novice mentoring program with electronic and peer mentoring to overcome insufficient mentoring support of medical students and junior doctors by senior clinicians. A three-phased evaluation was carried out to evaluate mentees' experiences within the new CNEP mentoring program. METHODS:Phase 1 saw use of a Delphi process to create a content-valid questionnaire from data drawn from 9 systematic reviews of key aspects of novice mentoring. In Phase 2 Cognitive Interviews were used to evaluate the tool. The tool was then piloted amongst mentees in the CNEP program. Phase 3 compared mentee's experiences in the CNEP program with those from the PMI's novice mentoring program. RESULTS:Thematic analysis of open-ended responses revealed three themes-the CNEP mentoring process, its benefits and challenges that expound on the descriptive statistical analysis of specific close-ended and Likert scale responses of the survey. The results show mentee experiences in the PMI's novice mentoring program and the CNEP program to be similar and that the addition of near peer and e-mentoring processes enhance communications and support of mentees. CONCLUSION:CNEP mentoring is an evolved form of novice mentoring built on a consistent mentoring approach supported by an effective host organization. The host organization marshals assessment, support and oversight of the program and allows flexibility within the approach to meet the particular needs of mentees, mentors and senior mentors. Whilst near-peer mentors and e-mentoring can make up for the lack of senior mentor availability, their effectiveness hinges upon a common mentoring approach. To better support the CNEP program deeper understanding of the mentoring dynamics, policing and mentor and mentee training processes are required. The CNEP mentoring tool too needs to be validated

    Privacy Risks of Securing Machine Learning Models against Adversarial Examples

    Full text link
    The arms race between attacks and defenses for machine learning models has come to a forefront in recent years, in both the security community and the privacy community. However, one big limitation of previous research is that the security domain and the privacy domain have typically been considered separately. It is thus unclear whether the defense methods in one domain will have any unexpected impact on the other domain. In this paper, we take a step towards resolving this limitation by combining the two domains. In particular, we measure the success of membership inference attacks against six state-of-the-art defense methods that mitigate the risk of adversarial examples (i.e., evasion attacks). Membership inference attacks determine whether or not an individual data record has been part of a model's training set. The accuracy of such attacks reflects the information leakage of training algorithms about individual members of the training set. Adversarial defense methods against adversarial examples influence the model's decision boundaries such that model predictions remain unchanged for a small area around each input. However, this objective is optimized on training data. Thus, individual data records in the training set have a significant influence on robust models. This makes the models more vulnerable to inference attacks. To perform the membership inference attacks, we leverage the existing inference methods that exploit model predictions. We also propose two new inference methods that exploit structural properties of robust models on adversarially perturbed data. Our experimental evaluation demonstrates that compared with the natural training (undefended) approach, adversarial defense methods can indeed increase the target model's risk against membership inference attacks.Comment: ACM CCS 2019, code is available at https://github.com/inspire-group/privacy-vs-robustnes

    The Escherichia coli K-12 ORFeome: a resource for comparative molecular microbiology

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Systems biology and functional genomics require genome-wide datasets and resources. Complete sets of cloned open reading frames (ORFs) have been made for about a dozen bacterial species and allow researchers to express and study complete proteomes in a high-throughput fashion.</p> <p>Results</p> <p>We have constructed an open reading frame (ORFeome) collection of 3974 or 94% of the known <it>Escherichia coli </it>K-12 ORFs in Gateway<sup>® </sup>entry vector pENTR/Zeo. The collection has been used for protein expression and protein interaction studies. For example, we have compared interactions among YgjD, YjeE and YeaZ proteins in <it>E. coli</it>, <it>Streptococcus pneumoniae</it>, and <it>Staphylococcus aureus</it>. We also compare this ORFeome with other Gateway-compatible bacterial ORFeomes and show its utility for comparative functional genomics.</p> <p>Conclusions</p> <p>The <it>E. coli </it>ORFeome provides a useful resource for functional genomics and other areas of protein research in a highly flexible format. Our comparison with other ORFeomes makes comparative analyses straighforward and facilitates direct comparisons of many proteins across many genomes.</p

    A Systematic Scoping Review of Ethical Issues in Mentoring in Surgery.

    Get PDF
    Background:Mentoring is crucial to the growth and development of mentors, mentees, and host organisations. Yet, the process of mentoring in surgery is poorly understood and increasingly mired in ethical concerns that compromise the quality of mentorship and prevent mentors, mentees, and host organisations from maximising its full potential. A systematic scoping review was undertaken to map the ethical issues in surgical mentoring to enhance understanding, assessment, and guidance on ethical conduct. Methods:Arksey and O'Malley's methodological framework was used to guide a systematic scoping review involving articles published between January 1, 2000 and December 31, 2018 in PubMed, Embase, Scopus, ERIC, ScienceDirect, Mednar, and OpenGrey databases. Braun and Clarke's thematic analysis approach was adopted to compare ethical issues in surgical mentoring across different settings, mentee and mentor populations, and host organisations. Results:A total of 3849 abstracts were identified, 464 full-text articles were retrieved, and 50 articles were included. The 3 themes concerned ethical lapses at the levels of mentor or mentee, mentoring relationships, and host organisation. Conclusions:Mentoring abuse in surgery involves lapses in conduct, understanding of roles and responsibilities, poor alignment of expectations, and a lack of clear standards of practice. It is only with better structuring of mentoring processes and effective support of host organisation tasked with providing timely, longitudinal, and holistic assessment and oversight will surgical mentoring overcome prevailing ethical concerns surrounding it
    corecore