2,815 research outputs found

    Limiting efficiencies of solar energy conversion and photo-detection via internal emission of hot electrons and hot holes in gold

    Get PDF
    We evaluate the limiting efficiency of full and partial solar spectrum harvesting via the process of internal photoemission in Au-semiconductor Schottky junctions. Our results based on the ab initio calculations of the electron density of states (e-DOS) reveal that the limiting efficiency of the full-spectrum Au converter based on hot electron injection is below 4%. This value is even lower than previously established limit based on the parabolic approximation of the Au electron energy bands. However, we predict limiting efficiency exceeding 10% for the hot holes collection through the Schottky junction between Au and p-type semiconductor. Furthermore, we demonstrate that such converters have more potential if used as a part of the hybrid system for harvesting high- and low-energy photons of the solar spectrum.Comment: Proc. SPIE 9608, Infrared Remote Sensing and Instrumentation XXIII, 960816 (September 1, 2015) 7 pages, 4 figure

    A Behavioural and Cognitive Neuroscience Investigation of Deceptive Communication

    Get PDF
    There is a rich literature on how people tell lies and detect them in others, but the underlying mechanisms are still poorly understood. The first aim of this thesis was to elucidate key cognitive and neural processes underlying cued (i.e., instructed) and uncued lies. The second aim, based on recent research suggesting a link between dishonesty and creativity, was to determine whether creative cognition contributes to deceptive communication. In a first behavioural study, performance on generating and detecting lies was measured in a socially interactive setting involving cued and uncued lies. Results of a multiple regression analysis showed that creativity predicted lying generation ability: more creative individuals were better liars than less creative people. In contrast, the ability to detect lies showed no association with creativity measures, suggesting that generating and detecting lies are distinct abilities. A second event-related potential (ERP) study investigated the neural mechanisms underlying the generation of uncued lies using a novel bluffing paradigm where participants lied at will. Results showed no stimulus-locked differences between uncued lies and truths, suggesting that decision processes leading to both required comparable cognitive resources. Once the uncued decision has been made, it requires strategic monitoring to keep track of the responses in order to maximize the gains regardless of whether the outcome is a lie or the truth as indexed by no response-locked differences between uncued lies and truths. Finally, parallel functional magnetic resonance imaging (fMRI) and ERP studies were conducted to determine the role of creativity in countermeasure use in a concealed information paradigm requiring cued lying. Results showed that countermeasures degraded the neural signatures of deception and more so for more creative individuals. This work advances understanding of the cognitive and neural mechanisms underlying deception as well as their dependence on individual differences in creative cognition

    Intelligent Second-Order Sliding-Mode Control for Chaotic Tracking Problem

    Get PDF
    [[conferencetype]]國際[[conferencedate]]20140909~20140912[[booktype]]紙本[[booktype]]電子版[[iscallforpapers]]Y[[conferencelocation]]Sapporo, Japa

    Adhesive L1CAM-Robo Signaling Aligns Growth Cone F-Actin Dynamics to Promote Axon-Dendrite Fasciculation in C. elegans

    Get PDF
    Neurite fasciculation through contact-dependent signaling is important for the wiring and function of the neuronal circuits. Here, we describe a type of axon-dendrite fasciculation in C. elegans, where proximal dendrites of the nociceptor PVD adhere to the axon of the ALA interneuron. This axon-dendrite fasciculation is mediated by a previously uncharacterized adhesive signaling by the ALA membrane signal SAX-7/L1CAM and the PVD receptor SAX-3/Robo but independent of Slit. L1CAM physically interacts with Robo and instructs dendrite adhesion in a Robo-dependent manner. Fasciculation mediated by L1CAM-Robo signaling aligns F-actin dynamics in the dendrite growth cone and facilitates dynamic growth cone behaviors for efficient dendrite guidance. Disruption of PVD dendrite fasciculation impairs nociceptive mechanosensation and rhythmicity in body curvature, suggesting that dendrite fasciculation governs the functions of mechanosensory circuits. Our work elucidates the molecular mechanisms by which adhesive axon-dendrite signaling shapes the construction and function of sensory neuronal circuits

    Finding Related Publications: Extending the Set of Terms Used to Assess Article Similarity.

    Get PDF
    Recommendation of related articles is an important feature of the PubMed. The PubMed Related Citations (PRC) algorithm is the engine that enables this feature, and it leverages information on 22 million citations. We analyzed the performance of the PRC algorithm on 4584 annotated articles from the 2005 Text REtrieval Conference (TREC) Genomics Track data. Our analysis indicated that the PRC highest weighted term was not always consistent with the critical term that was most directly related to the topic of the article. We implemented term expansion and found that it was a promising and easy-to-implement approach to improve the performance of the PRC algorithm for the TREC 2005 Genomics data and for the TREC 2014 Clinical Decision Support Track data. For term expansion, we trained a Skip-gram model using the Word2Vec package. This extended PRC algorithm resulted in higher average precision for a large subset of articles. A combination of both algorithms may lead to improved performance in related article recommendations

    Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining

    Get PDF
    Data mining is traditionally adopted to retrieve and analyze knowledge from large amounts of data. Private or confidential data may be sanitized or suppressed before it is shared or published in public. Privacy preserving data mining (PPDM) has thus become an important issue in recent years. The most general way of PPDM is to sanitize the database to hide the sensitive information. In this paper, a novel hiding-missing-artificial utility (HMAU) algorithm is proposed to hide sensitive itemsets through transaction deletion. The transaction with the maximal ratio of sensitive to nonsensitive one is thus selected to be entirely deleted. Three side effects of hiding failures, missing itemsets, and artificial itemsets are considered to evaluate whether the transactions are required to be deleted for hiding sensitive itemsets. Three weights are also assigned as the importance to three factors, which can be set according to the requirement of users. Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects
    corecore