14,487 research outputs found
Two-Pulse Ionization Injection into Quasi-Linear Laser Wakefields
We describe a scheme for controlling electron injection into the quasi-linear
wakefield driven by a guided drive pulse via ionization of a dopant species by
a collinear injection laser pulse with a short Rayleigh range. The scheme is
analyzed by particle in cell simulations which show controlled injection and
acceleration of electrons to an energy of 370 MeV, a relative energy spread of
2%, and a normalized transverse emittance of 3.0 {\mu}m.
This is an arXiv version of the original APS paper. It should be cited as N.
Bourgeois, J. Cowley, and S. M. Hooker, Phys. Rev. Lett. 111, 155004 (2013).
APS link here: http://link.aps.org/doi/10.1103/PhysRevLett.111.155004Comment: 5 pages, 4 figure
PACAP and migraine headache: immunomodulation of neural circuits in autonomic ganglia and brain parenchyma.
The discovery that intravenous (IV) infusions of the neuropeptide PACAP-38 (pituitary adenylyl cyclase activating peptide-38) induced delayed migraine-like headaches in a large majority of migraine patients has resulted in considerable excitement in headache research. In addition to suggesting potential therapeutic targets for migraine, the finding provides an opportunity to better understand the pathological events from early events (aura) to the headache itself. Although PACAP-38 and the closely related peptide VIP (vasoactive intestinal peptide) are well-known as vasoactive molecules, the dilation of cranial blood vessels per se is no longer felt to underlie migraine headaches. Thus, more recent research has focused on other possible PACAP-mediated mechanisms, and has raised some important questions. For example, (1) are endogenous sources of PACAP (or VIP) involved in the triggering and/or propagation of migraine headaches?; (2) which receptor subtypes are involved in migraine pathophysiology?; (3) can we identify specific anatomical circuit(s) where PACAP signaling is involved in the features of migraine? The purpose of this review is to discuss the possibility, and supportive evidence, that PACAP acts to induce migraine-like symptoms not only by directly modulating nociceptive neural circuits, but also by indirectly regulating the production of inflammatory mediators. We focus here primarily on postulated extra-dural sites because potential mechanisms of PACAP action in the dura are discussed in detail elsewhere (see X, this edition)
Liquidity effects of the events of September 11, 2001
Banks rely heavily on incoming payments from other banks to fund their own payments. The terrorist attacks of September 11, 2001, destroyed facilities in Lower Manhattan, leaving some banks unable to send payments through the Federal Reserve's Fedwire payments system. As a result, many banks received fewer payments than expected, causing unexpected shortfalls in banks' liquidity. These disruptions also made it harder for banks to redistribute balances across the banking system in a timely manner. In this article, the authors measure the payments responses of banks to the receipt of payments from other banks, both under normal circumstances and during the days following the attacks. Their analysis suggests that the significant injections of liquidity by the Federal Reserve, first through the discount window and later through open market operations, were important in allowing banks to reestablish their normal patterns of payments coordination.Fedwire ; Electronic funds transfers ; War - Economic aspects ; Bank liquidity ; Payment systems
Perceptions and correlates of peer-victimization and bullying
The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression,but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney & Smith, 1993). The present study aimed to examine the extent to which peer-victimization and bullying are empirically similar. The sample comprised 1,429 pupils (50.2% male) aged between 8 and 13 years attending mainstream Scottish schools. Self-report questionnaire assessing peer-victimization and bullying, copingstrategy use (WCCL: Hunter, 2000), situational appraisal and depressive symptomatology (Birleson, 1981). Almost one-third (30.7%) of pupils reported experiencing peer-victimization, and of these 38.1% (11.7% of whole sample) were categorized as victims of bullying. Victims of bullying perceived higher levels of threat and lower levels of perceived control. They also reported using more Wishful Thinking and Social Support coping strategies, but did not differ on Problem Focused coping. Bullied pupils also reported higher levels of depressive symptomatology. Peer-victimization and bullying appear to be qualitatively different experiences for children and adolescents, with bullying being the more serious phenomenon
Ontological theory for ontological engineering: Biomedical systems information integration
Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such navigation will become correspondingly difficult to maintain. While descriptive semantic representations are certainly a necessary component to any adequate ontology-based system, so long as ontology engineers rely solely on semantic information, without a sound ontological theory informing their modeling decisions, this goal will surely remain out of reach. In this paper we describe how Language and Computing nv (L&C), along with The Institute for Formal Ontology and Medical Information Sciences (IFOMIS), are working towards developing and implementing just such a theory, combining the open
software architecture of L&Câs LinkSuiteTM with the philosophical rigor of IFOMISâs Basic Formal Ontology. In this way we aim to move beyond the more or less simple controlled vocabularies that have dominated the industry to date
Tied factor analysis for face recognition across large pose differences
Face recognition algorithms perform very unreliably when the pose of the probe face is different from the gallery face: typical feature vectors vary more with pose than with identity. We propose a generative model that creates a one-to-many mapping from an idealized âidentityâ space to the observed data space. In identity space, the representation for each individual does not vary with pose. We model the measured feature vector as being generated by a pose-contingent linear transformation of the identity variable in the presence of Gaussian noise. We term this model âtiedâ factor analysis. The choice of linear transformation (factors) depends on the pose, but the loadings are constant (tied) for a given individual. We use the EM algorithm to estimate the linear transformations and the noise parameters from training data.
We propose a probabilistic distance metric that allows a full posterior over possible matches to be established. We introduce a novel feature extraction process and investigate recognition performance by using the FERET, XM2VTS, and PIE databases. Recognition performance compares favorably with contemporary approaches
Hierarchical strategies for efficient fault recovery on the reconfigurable PAnDA device
A novel hierarchical fault-tolerance methodology for reconfigurable devices is presented. A bespoke multi-reconfigurable FPGA architecture, the programmable analogue and digital array (PAnDA), is introduced allowing fine-grained reconfiguration beyond any other FPGA architecture currently in existence. Fault blind circuit repair strategies, which require no specific information of the nature or location of faults, are developed, exploiting architectural features of PAnDA. Two fault recovery techniques, stochastic and deterministic strategies, are proposed and results of each, as well as a comparison of the two, are presented. Both approaches are based on creating algorithms performing fine-grained hierarchical partial reconfiguration on faulty circuits in order to repair them. While the stochastic approach provides insights into feasibility of the method, the deterministic approach aims to generate optimal repair strategies for generic faults induced into a specific circuit. It is shown that both techniques successfully repair the benchmark circuits used after random faults are induced in random circuit locations, and the deterministic strategies are shown to operate efficiently and effectively after optimisation for a specific use case. The methods are shown to be generally applicable to any circuit on PAnDA, and to be straightforwardly customisable for any FPGA fabric providing some regularity and symmetry in its structure
An appreciation of, and tribute to, Will Johnson on the occasion of his retirement
This paper presents an overview of the scholarly work of Will Johnson on the occasion of his retirement from Cardiff University. It also includes new translations from two of his junior colleagues, Drs. Brodbeck and Hegarty, as tributes to his scholarly and collegial contribution
- âŚ