126,673 research outputs found

    The Possession of Thomas Darling: Adumbrations of a Jungian Psychohistory

    Get PDF
    Applying Jungian psychology to this microhistorical instance, I try to understand the potential, psychological significance of Darling?s possession experience. Using the frontispiece ? ?The Witch of Endor? ? to Glanvill?s 1682 text as a springboard, I attempt to locate the contribution of a Jungian approach by critically comparing it with historical perspectives on possession. I argue that Darling?s possession may be understood as a compensation to his devout Puritan upbringing and that recurring themes of symbolic rebirth ? evidenced by the constellation of the dual mother archetype ? suggest that the ordeal was a manifestation of a process of psychological maturation Jung called individuation. I argue that a Jungian interpretation of the individual, possession experience does not contradict certain historical assertions but, inn many ways, supports them. The witch symbol ? one representing transition and liminality ? elucidates the Puritan position during Elizabethan England, where possession was used as a political statement to assert religious identity in the face of persecution

    The neutron charge form factor in helium-3

    Get PDF
    In order to measure the charge form factor of the neutron, GEn(Q2)G^n_E(Q^2), one needs to use a neutron bound in a nuclear target. We calculate the change in the form factor for a neutron bound in 3He^3He, with respect to the free case, using several versions of the quark meson coupling model. It is found that the form factor may be suppressed by as much as 12% at Q2=0.5GeV2Q^2 = 0.5{GeV}^2 with respect to that of the free neutron.Comment: 13 pages including 2 ps figure

    A dubiety-determining based model for database cumulated anomaly intrusion

    Get PDF
    The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately hides his/her intentions to change data beyond constraints in different operations and different transactions. It happens when some appearing to be authorized and normal transactions lead to certain accumulated results out of given thresholds. The existing intrusion techniques are unable to deal with CAs. This paper proposes a detection model, Dubiety-Determining Model (DDM), for Cumulated Anomaly. This model is mainly based on statistical theories and fuzzy set theories. It measures the dubiety degree, which is presented by a real number between 0 and 1, for each database transaction, to show the likelihood of a transaction to be intrusive. The algorithms used in the DDM are introduced. A DDM-based software architecture has been designed and implemented for monitoring database transactions. The experimental results show that the DDM method is feasible and effective

    Local linear spatial quantile regression

    Get PDF
    Copyright @ 2009 International Statistical Institute / Bernoulli Society for Mathematical Statistics and Probability.Let {(Yi,Xi), i ∈ ZN} be a stationary real-valued (d + 1)-dimensional spatial processes. Denote by x → qp(x), p ∈ (0, 1), x ∈ Rd , the spatial quantile regression function of order p, characterized by P{Yi ≤ qp(x)|Xi = x} = p. Assume that the process has been observed over an N-dimensional rectangular domain of the form In := {i = (i1, . . . , iN) ∈ ZN|1 ≤ ik ≤ nk, k = 1, . . . , N}, with n = (n1, . . . , nN) ∈ ZN. We propose a local linear estimator of qp. That estimator extends to random fields with unspecified and possibly highly complex spatial dependence structure, the quantile regression methods considered in the context of independent samples or time series. Under mild regularity assumptions, we obtain a Bahadur representation for the estimators of qp and its first-order derivatives, from which we establish consistency and asymptotic normality. The spatial process is assumed to satisfy general mixing conditions, generalizing classical time series mixing concepts. The size of the rectangular domain In is allowed to tend to infinity at different rates depending on the direction in ZN (non-isotropic asymptotics). The method provides muchAustralian Research Counci

    Statistical and fuzzy approach for database security

    Get PDF
    A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM can measure the dubiety degree of each database transaction quantitatively. Software system architecture to support the DDM for monitoring database transactions is designed. We also implemented the system and tested it. Our experimental results show that the DDM method is feasible and effective
    corecore