6,616 research outputs found
b-jet Identification in PbPb Collisions with CMS
The flavor dependence of jet quenching is a powerful handle to discriminate
between models of parton energy loss in heavy-ion collisions. We demonstrate
the capacity of CMS to identify jets initiated by bottom quarks using displaced
vertices reconstructed in the silicon tracking system. The b-jet to inclusive
jet ratio is measured in PbPb collisions and compared to pp collisions and
simulations at the same center-of-mass energy
Jet Fragmentation in Medium and Vacuum with the PHENIX Detector
One of the most active areas of investigation in relativistic heavy-ion
collisions is the study of the jet quenching phenomenon whereby hard partons
lose their energy as they traverse the hot, dense matter created in such
collisions. Strong parton energy loss has been observed in central
nucleus-nucleus collisions as evidenced by the a large suppression of the yield
of high pT hadrons as compared to the expected yield based on measurements in
p+p collisions. Moreover, measurements of back-to-back correlations of charged
hadrons suggest that jet shapes are strongly modified modified by the medium.
The quantitative interpretation of single and di-hadron measurements is,
however, complicated by the fact that the initial parton energy is unknown. A
more informative measurement would be one in which the initial parton energy is
known, allowing the determination of the fragmentation function, which may be
effectively modified from its vacuum form by the presence of the medium. Two
measurements in which the initial parton energy may be estimated are discussed
in these proceedings: jet reconstruction and two- particle correlations using
direct photons. Jet reconstruction in nuclear collisions is challenging due to
the large background of soft particles, fluctuations of which give rise to fake
jets. Direct photons can be used to estimate the initial parton energy of the
recoil jet without recourse to jet reconstruction algorithms. However, such
studies suffer from a smaller rate and the direct photon signal must be
disentangled from a large background of decay photons. We present jet
reconstruction results which use an algorithm suitable for a high multiplicity
environment. We also present results of two-particle correlations using direct
photons. These results are discussed in the context of medium modification to
the fragmentation function.Comment: Talk presented at DIS 2010, Florence, Ital
Intellectual Property and Antitrust Limits on Contract: Comment
In their chapter in Dynamic Competition and Public Policy (2001, Cambridge University Press), Burtis and Kobayashi never defined their model\u27s discount rate, making replicating their simulation results difficult. Through our own simulations, we were able to verify their results when using a discount rate of 0.10. We also identified two new types of equilibria that the authors overlooked, doubling the number of distinct equilibria in the model
Cultural appropriation and the intimacy of groups
What could ground normative restrictions concerning cultural appropriation which are not grounded by independent considerations such as property rights or harm? We propose that such restrictions can be grounded by considerations of intimacy. Consider the familiar phenomenon of interpersonal intimacy. Certain aspects of personal life and interpersonal relationships are afforded various protections in virtue of being intimate. We argue that an analogous phenomenon exists at the level of large groups. In many cases, members of a group engage in shared practices that contribute to a sense of common identity, such as wearing certain hair or clothing styles or performing a certain style of music. Participation in such practices can generate relations of group intimacy, which can ground certain prerogatives in much the same way that interpersonal intimacy can. One such prerogative is making what we call an appropriation claim. An appropriation claim is a request from a group member that non-members refrain from appropriating a given element of the group’s culture. Ignoring appropriation claims can constitute a breach of intimacy. But, we argue, just as for the prerogatives of interpersonal intimacy, in many cases there is no prior fact of the matter about whether the appropriation of a given cultural practice constitutes a breach of intimacy. It depends on what the group decides together
Hidden Markov Model Identifiability via Tensors
The prevalence of hidden Markov models (HMMs) in various applications of
statistical signal processing and communications is a testament to the power
and flexibility of the model. In this paper, we link the identifiability
problem with tensor decomposition, in particular, the Canonical Polyadic
decomposition. Using recent results in deriving uniqueness conditions for
tensor decomposition, we are able to provide a necessary and sufficient
condition for the identification of the parameters of discrete time finite
alphabet HMMs. This result resolves a long standing open problem regarding the
derivation of a necessary and sufficient condition for uniquely identifying an
HMM. We then further extend recent preliminary work on the identification of
HMMs with multiple observers by deriving necessary and sufficient conditions
for identifiability in this setting.Comment: Accepted to ISIT 2013. 5 pages, no figure
Protection of Patient Privacy on Mobile Device Machine Learning
An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured
- …