14,487 research outputs found

    Two-Pulse Ionization Injection into Quasi-Linear Laser Wakefields

    Full text link
    We describe a scheme for controlling electron injection into the quasi-linear wakefield driven by a guided drive pulse via ionization of a dopant species by a collinear injection laser pulse with a short Rayleigh range. The scheme is analyzed by particle in cell simulations which show controlled injection and acceleration of electrons to an energy of 370 MeV, a relative energy spread of 2%, and a normalized transverse emittance of 3.0 {\mu}m. This is an arXiv version of the original APS paper. It should be cited as N. Bourgeois, J. Cowley, and S. M. Hooker, Phys. Rev. Lett. 111, 155004 (2013). APS link here: http://link.aps.org/doi/10.1103/PhysRevLett.111.155004Comment: 5 pages, 4 figure

    PACAP and migraine headache: immunomodulation of neural circuits in autonomic ganglia and brain parenchyma.

    Get PDF
    The discovery that intravenous (IV) infusions of the neuropeptide PACAP-38 (pituitary adenylyl cyclase activating peptide-38) induced delayed migraine-like headaches in a large majority of migraine patients has resulted in considerable excitement in headache research. In addition to suggesting potential therapeutic targets for migraine, the finding provides an opportunity to better understand the pathological events from early events (aura) to the headache itself. Although PACAP-38 and the closely related peptide VIP (vasoactive intestinal peptide) are well-known as vasoactive molecules, the dilation of cranial blood vessels per se is no longer felt to underlie migraine headaches. Thus, more recent research has focused on other possible PACAP-mediated mechanisms, and has raised some important questions. For example, (1) are endogenous sources of PACAP (or VIP) involved in the triggering and/or propagation of migraine headaches?; (2) which receptor subtypes are involved in migraine pathophysiology?; (3) can we identify specific anatomical circuit(s) where PACAP signaling is involved in the features of migraine? The purpose of this review is to discuss the possibility, and supportive evidence, that PACAP acts to induce migraine-like symptoms not only by directly modulating nociceptive neural circuits, but also by indirectly regulating the production of inflammatory mediators. We focus here primarily on postulated extra-dural sites because potential mechanisms of PACAP action in the dura are discussed in detail elsewhere (see X, this edition)

    Liquidity effects of the events of September 11, 2001

    Get PDF
    Banks rely heavily on incoming payments from other banks to fund their own payments. The terrorist attacks of September 11, 2001, destroyed facilities in Lower Manhattan, leaving some banks unable to send payments through the Federal Reserve's Fedwire payments system. As a result, many banks received fewer payments than expected, causing unexpected shortfalls in banks' liquidity. These disruptions also made it harder for banks to redistribute balances across the banking system in a timely manner. In this article, the authors measure the payments responses of banks to the receipt of payments from other banks, both under normal circumstances and during the days following the attacks. Their analysis suggests that the significant injections of liquidity by the Federal Reserve, first through the discount window and later through open market operations, were important in allowing banks to reestablish their normal patterns of payments coordination.Fedwire ; Electronic funds transfers ; War - Economic aspects ; Bank liquidity ; Payment systems

    Perceptions and correlates of peer-victimization and bullying

    Get PDF
    The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression,but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney & Smith, 1993). The present study aimed to examine the extent to which peer-victimization and bullying are empirically similar. The sample comprised 1,429 pupils (50.2% male) aged between 8 and 13 years attending mainstream Scottish schools. Self-report questionnaire assessing peer-victimization and bullying, copingstrategy use (WCCL: Hunter, 2000), situational appraisal and depressive symptomatology (Birleson, 1981). Almost one-third (30.7%) of pupils reported experiencing peer-victimization, and of these 38.1% (11.7% of whole sample) were categorized as victims of bullying. Victims of bullying perceived higher levels of threat and lower levels of perceived control. They also reported using more Wishful Thinking and Social Support coping strategies, but did not differ on Problem Focused coping. Bullied pupils also reported higher levels of depressive symptomatology. Peer-victimization and bullying appear to be qualitatively different experiences for children and adolescents, with bullying being the more serious phenomenon

    Ontological theory for ontological engineering: Biomedical systems information integration

    Get PDF
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such navigation will become correspondingly difficult to maintain. While descriptive semantic representations are certainly a necessary component to any adequate ontology-based system, so long as ontology engineers rely solely on semantic information, without a sound ontological theory informing their modeling decisions, this goal will surely remain out of reach. In this paper we describe how Language and Computing nv (L&C), along with The Institute for Formal Ontology and Medical Information Sciences (IFOMIS), are working towards developing and implementing just such a theory, combining the open software architecture of L&C’s LinkSuiteTM with the philosophical rigor of IFOMIS’s Basic Formal Ontology. In this way we aim to move beyond the more or less simple controlled vocabularies that have dominated the industry to date

    Tied factor analysis for face recognition across large pose differences

    Get PDF
    Face recognition algorithms perform very unreliably when the pose of the probe face is different from the gallery face: typical feature vectors vary more with pose than with identity. We propose a generative model that creates a one-to-many mapping from an idealized “identity” space to the observed data space. In identity space, the representation for each individual does not vary with pose. We model the measured feature vector as being generated by a pose-contingent linear transformation of the identity variable in the presence of Gaussian noise. We term this model “tied” factor analysis. The choice of linear transformation (factors) depends on the pose, but the loadings are constant (tied) for a given individual. We use the EM algorithm to estimate the linear transformations and the noise parameters from training data. We propose a probabilistic distance metric that allows a full posterior over possible matches to be established. We introduce a novel feature extraction process and investigate recognition performance by using the FERET, XM2VTS, and PIE databases. Recognition performance compares favorably with contemporary approaches

    Hierarchical strategies for efficient fault recovery on the reconfigurable PAnDA device

    Get PDF
    A novel hierarchical fault-tolerance methodology for reconfigurable devices is presented. A bespoke multi-reconfigurable FPGA architecture, the programmable analogue and digital array (PAnDA), is introduced allowing fine-grained reconfiguration beyond any other FPGA architecture currently in existence. Fault blind circuit repair strategies, which require no specific information of the nature or location of faults, are developed, exploiting architectural features of PAnDA. Two fault recovery techniques, stochastic and deterministic strategies, are proposed and results of each, as well as a comparison of the two, are presented. Both approaches are based on creating algorithms performing fine-grained hierarchical partial reconfiguration on faulty circuits in order to repair them. While the stochastic approach provides insights into feasibility of the method, the deterministic approach aims to generate optimal repair strategies for generic faults induced into a specific circuit. It is shown that both techniques successfully repair the benchmark circuits used after random faults are induced in random circuit locations, and the deterministic strategies are shown to operate efficiently and effectively after optimisation for a specific use case. The methods are shown to be generally applicable to any circuit on PAnDA, and to be straightforwardly customisable for any FPGA fabric providing some regularity and symmetry in its structure

    An appreciation of, and tribute to, Will Johnson on the occasion of his retirement

    Get PDF
    This paper presents an overview of the scholarly work of Will Johnson on the occasion of his retirement from Cardiff University. It also includes new translations from two of his junior colleagues, Drs. Brodbeck and Hegarty, as tributes to his scholarly and collegial contribution
    • …
    corecore