126,673 research outputs found
The Possession of Thomas Darling: Adumbrations of a Jungian Psychohistory
Applying Jungian psychology to this microhistorical instance, I try to understand the potential, psychological significance of Darling?s possession experience. Using the frontispiece ? ?The Witch of Endor? ? to Glanvill?s 1682 text as a springboard, I attempt to locate the contribution of a Jungian approach by critically comparing it with historical perspectives on possession. I argue that Darling?s possession may be understood as a compensation to his devout Puritan upbringing and that recurring themes of symbolic rebirth ? evidenced by the constellation of the dual mother archetype ? suggest that the ordeal was a manifestation of a process of psychological maturation Jung called individuation. I argue that a Jungian interpretation of the individual, possession experience does not contradict certain historical assertions but, inn many ways, supports them. The witch symbol ? one representing transition and liminality ? elucidates the Puritan position during Elizabethan England, where possession was used as a political statement to assert religious identity in the face of persecution
The neutron charge form factor in helium-3
In order to measure the charge form factor of the neutron, , one
needs to use a neutron bound in a nuclear target. We calculate the change in
the form factor for a neutron bound in , with respect to the free case,
using several versions of the quark meson coupling model. It is found that the
form factor may be suppressed by as much as 12% at with
respect to that of the free neutron.Comment: 13 pages including 2 ps figure
A dubiety-determining based model for database cumulated anomaly intrusion
The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A
typical CA intrusion is that when a user who is authorized to modify data records under certain constraints deliberately
hides his/her intentions to change data beyond constraints in different operations and different transactions. It happens
when some appearing to be authorized and normal transactions lead to certain accumulated results out of given thresholds.
The existing intrusion techniques are unable to deal with CAs. This paper proposes a detection model,
Dubiety-Determining Model (DDM), for Cumulated Anomaly. This model is mainly based on statistical theories and fuzzy
set theories. It measures the dubiety degree, which is presented by a real number between 0 and 1, for each database
transaction, to show the likelihood of a transaction to be intrusive. The algorithms used in the DDM are introduced. A
DDM-based software architecture has been designed and implemented for monitoring database transactions. The
experimental results show that the DDM method is feasible and effective
Local linear spatial quantile regression
Copyright @ 2009 International Statistical Institute / Bernoulli Society for Mathematical Statistics and Probability.Let {(Yi,Xi), i ∈ ZN} be a stationary real-valued (d + 1)-dimensional spatial processes. Denote by x →
qp(x), p ∈ (0, 1), x ∈ Rd , the spatial quantile regression function of order p, characterized by P{Yi ≤
qp(x)|Xi = x} = p. Assume that the process has been observed over an N-dimensional rectangular domain
of the form In := {i = (i1, . . . , iN) ∈ ZN|1 ≤ ik
≤ nk, k = 1, . . . , N}, with n = (n1, . . . , nN) ∈ ZN. We
propose a local linear estimator of qp. That estimator extends to random fields with unspecified and possibly
highly complex spatial dependence structure, the quantile regression methods considered in the context of
independent samples or time series. Under mild regularity assumptions, we obtain a Bahadur representation
for the estimators of qp and its first-order derivatives, from which we establish consistency and asymptotic
normality. The spatial process is assumed to satisfy general mixing conditions, generalizing classical time
series mixing concepts. The size of the rectangular domain In is allowed to tend to infinity at different
rates depending on the direction in ZN (non-isotropic asymptotics). The method provides muchAustralian Research Counci
Statistical and fuzzy approach for database security
A new type of database anomaly is described by
addressing the concept of Cumulated Anomaly in this
paper. Dubiety-Determining Model (DDM), which is a
detection model basing on statistical and fuzzy set
theories for Cumulated Anomaly, is proposed. DDM
can measure the dubiety degree of each database
transaction quantitatively. Software system
architecture to support the DDM for monitoring
database transactions is designed. We also
implemented the system and tested it. Our
experimental results show that the DDM method is
feasible and effective
- …