1,255 research outputs found

    On the Sources of CP-violation Contributing to the Electric Dipole Moments

    Get PDF
    In the framework of seesaw mechanism embedded in the constrained Minimal Supersymmetric Standard Model (cMSSM), phases of neutrino Yukawa coupling, μ\mu-term and AA-terms can all contribute to the Electric Dipole Moment (EDM) of the electron. We discuss and classify the situations for which by combined analysis of the upcoming results on ded_e, dHgd_{{\rm Hg}} and dDd_D discriminating between these sources will be possible.Comment: 6 pages, 4 figures, talk presented at IPM-LHP06, Tehran, Ira

    Heuristically improved Bayesian segmentation of brain MR images

    Get PDF
    One of the major tasks or even the most prevalent task in medical imageprocessing is image segmentation. Among them, brain MR images sufferfrom some difficulties such as intensity inhomogeneity of tissues, partialvolume effect, noise and some other imaging artifacts and so their segmentation is more challenging. Therefore, brain MRI segmentationbased on just gray values is prone to error. Hence involving problem specific heuristics and expert knowledge in designing segmentation algorithms seems to be useful. A two-phase segmentation algorithm basedon Bayesian method is proposed in this paper. The Bayesian part uses thegray value in segmenting images and the segmented image is used as theinput to the second phase to improve the misclassified pixels especially inborders between tissues. Similarity index is used to compare our algorithmwith the well known method of Ashburner which has been implemented inStatistical Parametric Mapping (SPM) package. Brainweb as a simulatedbrain MRI dataset is used in evaluating the proposed algorithm. Resultsshow that our algorithm performs well in comparison with the one implemented in SPM. It can be concluded that incorporating expert knowledge and problem specific heuristics improve segmentation result.The major advantage of proposed method is that one can update theknowledge base and incorporate new information into segmentationprocess by adding new rules.Keywords: Magnetic Resonance Imaging (MRI); Segmentation; Bayesianclassifier; Heuristic

    Programmable microwave transversal filter using acousto-optic tunable filtering

    Get PDF
    Electronically programmable, broadband analog Radio Frequency (RF) transversal filter architecture is proposed and implemented using an Acousto-Optic Tunable Filter and a Chirped Fiber Bragg Grating. Proof-of-concept filter two-tap notch filters are demonstrated with a tunable range of 2-8 GHz and notch depth of 35 dB

    Studi Pembinaan dan Pengawasan Program Bantuan Operasional Kesehatan (Bok) di Dinas Kesehatan Kabupaten Muna Tahun 2015

    Full text link
    Bantuan Operasional Kesehatan (BOK) merupakan bantuan dari pemerintah Pusat melalui KementerianKesehatan untuk membantu pemerintah Daerah melaksanakan pelayanan kesehatan sesuai StandarPelayanan Minimal (SPM) Bidang Kesehatan untuk mempercepat pencapaian Millenium DevelopmentGoals(MDGs) dengan meningkatkan kinerja puskesmas dan jaringannya serta Pos Kesehatan Desa (Poskesdes) danPos Pelayanan Terpadu (Posyandu) dalam menyelenggarakan pelayanan kesehatan.Tujuan penelitian iniuntuk memperoleh informasi mengenai Pembinaan dan Pengawasan Dana Bantuan Operasional Kesehatan(BOK) di wilayah kerja Dinas Kesehatan Kabupaten Muna Tahun 2015.Jenis penelitian yang digunakanadalah penelitian kualitatif dengan indepth interwiew dengan pendekatan fenomenologis.Penelitiandilaksanakan pada bulanApril –Mey 2016 di Dinas Kesehatan Kabupaten Muna.informan yang terbagi atasdua jenis, yaitu: informan kunci, Kepala Pengelola Program Bantuan Operasional Kesehatan sedangkanuntuk Informan biasa terdiri dari Bendahara BOK Dinas Kesehatan Kabupaten Muna dan salah satu KepalaPuskesmas yang ada di wilayah Dinas Kesehatan Kabupaten Muna. Hasil penelitian menunjukkan bahwaproses Pembinaan dan Pengawasan Proram Bantuan Operasioanal Kesehatan Kabupaten Muna belumterlalu efektif artinya pengawasan yang di lakukan oleh di Dinas kesehatan dalam proses pembinaan program Bantuan Operasional Kesehatan masih kurang. Sehingga dapat di simpulkan bahwa program BOKdi Dinas Kesehatan Kab.Muna tidak sesuai prosedut atau Juknis BOK

    Progressor: Social navigation support through open social student modeling

    Get PDF
    The increased volumes of online learning content have produced two problems: how to help students to find the most appropriate resources and how to engage them in using these resources. Personalized and social learning have been suggested as potential ways to address these problems. Our work presented in this paper combines the ideas of personalized and social learning in the context of educational hypermedia. We introduce Progressor, an innovative Web-based tool based on the concepts of social navigation and open student modeling that helps students to find the most relevant resources in a large collection of parameterized self-assessment questions on Java programming. We have evaluated Progressor in a semester-long classroom study, the results of which are presented in this paper. The study confirmed the impact of personalized social navigation support provided by the system in the target context. The interface encouraged students to explore more topics attempting more questions and achieving higher success rates in answering them. A deeper analysis of the social navigation support mechanism revealed that the top students successfully led the way to discovering most relevant resources by creating clear pathways for weaker students. © 2013 Taylor and Francis Group, LLC

    Gambaran Kinerja Pegawai Puskesmas Wangi-wangi Kabupaten Wakatobi Tahun 2016

    Full text link
    Rendahnya kinerja akan membangun citra bentuk pada puskesmas, dimana pasien yang merasa tidakpuas akan menceritakan kepada rekan-rekannya. Begitu juga sebaliknya semakin tinggi kinerja pelayanan yangdiberikan akan menjadi nilai plus bagi puskesmas, dalam ini pasien akan merasa puas terhadap pelayanan yangdiberikan oleh puskesmas. Tujuan penelitian ini adalah untuk mengetahui gambaran kemampuan, gambaransikap, gambaran penampilan, gambaran perhatian, gambaran tindakan dan gambaran tanggung jawab dalamKinerja Pegawai Puskesmas Wangi-Wangi Kabupaten Wakatobi. Metode penelitian ini adalah penelitian kualitatifdengan pendekatan fenomenologis melalui wawancara mendalam dengan informan. Informan dalam penelitianini terdiri dari 1 orang informan kunci dan 3 orang informan biasa yang terlibat langsung pada kinerja pegawaiPuskesmas Wangi-Wangi. Hasil penelitian menunjukkan bahwa kemampuan pegawai puskesmas wangi -wangisesuai dengan profesi masing-masing. Sikap pegawai puskesmas wangi-wangi mulai sopan dalam hal menyapapasien dan belum sopan dalam hal merawat pasien. Penampilan pegawai puskesmas wangi -wangi belum seragamdalam berpakaian di sebabkan karena kurangnya penegakan aturan mengenai penampilan yang rapih. Perhatianpegawai puskesmas cukup mendengarkan keluhan pasien/pengunjung. Tindakan pegawai puskesmas wangiwangi,tidak semua pegawai puskesmas menanggapi keluhan pasien/pengunjung. Tanggung Jawab pegawaipuskesmas wangi-wangi, cukup bertanngung jawab dengan tugas yang diberikan dan menjaga Citra Pus kesmaswangi-wangi. Saran penelitian ini adalah Pihak puskesmas harus lebih meningkatkan pelayanan dan kualitaspegawai yang harus direalisasikan dalam berbagai berntuk pelatihan atau kegiatan sejenis, terutama menanggapipasien/pengunjung, Sebaiknya ada ketentuan dalam SPO (Standar Prosedur Operasional) tentang pelayanan yangbaik terhadap pasien/pengunjung dalam berkomunikasi, bertutur kata, bersikap, ekspresi wajah serta intonasisuara yang diberikan pada saat melayani pasien/pengunjung, Perlu penambahan tenaga kesehatan terutamaperawat sehingga dapat memberikan pelayanan kesehatan secara maksimal di puskesmas wangi -wangi

    Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

    Get PDF
    Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge

    Leptonic CP violation: zero, maximal or between the two extremes

    Get PDF
    Discovery of the CP-violation in the lepton sector is one of the challenges of the particle physics. We search for possible principles, symmetries and phenomenological relations that can lead to particular values of the CP-violating Dirac phase, δ\delta. In this connection we discuss two extreme cases: the zero phase, δ=0\delta = 0, and the maximal CP-violation, δ=±π/2\delta = \pm \pi/2, and relate them to the peculiar pattern of the neutrino mixing. The maximal CP-violation can be related to the νμντ\nu_\mu - \nu_\tau reflection symmetry. We study various aspects of this symmetry and introduce a generalized reflection symmetry that can lead to an arbitrary phase that depends on the parameter of the symmetry transformation. The generalized reflection symmetry predicts a simple relation between the Dirac and Majorana phases. We also consider the possibility of certain relations between the CP-violating phases in the quark and lepton sectors.Comment: 34 pages, no figures; v3: version appeared in JHE
    corecore