5,519 research outputs found

    Exploring soft constraints on effective actions

    Get PDF
    We study effective actions for simultaneous breaking of space-time and internal symmetries. Novel features arise due to the mixing of Goldstone modes under the broken symmetries which, in contrast to the usual Adler's zero, leads to non-vanishing soft limits. Such scenarios are common for spontaneously broken SCFT's. We explicitly test these soft theorems for N=4\mathcal{N}=4 sYM in the Coulomb branch both perturbatively and non-perturbatively. We explore the soft constraints systematically utilizing recursion relations. In the pure dilaton sector of a general CFT, we show that all amplitudes up to order sn2ns^{n} \sim \partial^{2n} are completely determined in terms of the kk-point amplitudes at order sks^k with knk \leq n. Terms with at most one derivative acting on each dilaton insertion are completely fixed and coincide with those appearing in the conformal DBI, i.e. DBI in AdS. With maximal supersymmetry, the effective actions are further constrained, leading to new non-renormalization theorems. In particular, the effective action is fixed up to eight derivatives in terms of just one unknown four-point coefficient and one more coefficient for ten-derivative terms. Finally, we also study the interplay between scale and conformal invariance in this context.Comment: 20+4 pages, 1 figure; v2: references added, typos corrected; v3: typos corrected, JHEP versio

    Research on the Motivation and Attitude of College students' Physical Education in Taiwan

    Get PDF
    College students' physical education plays an important role in physical activity and cultivates the concept of independent health management. At present, what kind of learning attitude do Taiwan college students face in physical education? What motivation does the student influence the attitude of the physical education? What is the relevance? All of the above are the purpose of this study. The research method adopts the questionnaire survey method, and the survey data adopts descriptive statistical analysis, independent sample t test, single factor variance analysis, LSD post hoc comparison method, and typical correlation analysis. Research results: 1. The different background variables of Taiwanese college students are that the main motivation factor of physical education is to obtain good health fitness for "physical health". 2. Taiwanese college students have different background variables. They all think that the "cognitive learning" of physical education is the main factor of attitude, that is, the knowledge about health care and sports skills. 3. There is a positive correlation between learning motivation and learning attitude (ρ=.90). Learning motivation is one of the important factors affecting learning attitude. Research conclusions: 1. The factors of Taiwanese male and female college students' motivation for learning in physical education are mainly based on "physical health". 2. Freshmen have higher motivations and learning attitudes in physical education than second-grade to fourth-grade. 3. Taiwan female college students average 1 or 2 times per week, male college students have the most athletes 2 to 3 times per week, more than 90% of college students like sports. 4. There is a positive correlation between learning motivation and learning attitude, indicating that the stronger the attribute of learning motivation "physical health", the higher the student's learning attitude. 5. Satisfying students' motivation for learning helps students to learn positively. 6. Another important task of the college physical education class is to prepare students for future lifelong sports

    STGP: Spatio-temporal Gaussian process models for longitudinal neuroimaging data

    Get PDF
    Longitudinal neuroimaging data plays an important role in mapping the neural developmental profile of major neuropsychiatric and neurodegenerative disorders and normal brain. The development of such developmental maps is critical for the prevention, diagnosis, and treatment of many brain-related diseases. The aim of this paper is to develop a spatio-temporal Gaussian process (STGP) framework to accurately delineate the developmental trajectories of brain structure and function, while achieving better prediction by explicitly incorporating the spatial and temporal features of longitudinal neuroimaging data. Our STGP integrates a functional principal component model (FPCA) and a partition parametric space-time covariance model to capture the medium-to-large and small-to-medium spatio-temporal dependence structures, respectively. We develop a three-stage efficient estimation procedure as well as a predictive method based on a kriging technique. Two key novelties of STGP are that it can efficiently use a small number of parameters to capture complex non-stationary and non-separable spatio-temporal dependence structures and that it can accurately predict spatio-temporal changes. We illustrate STGP using simulated data sets and two real data analyses including longitudinal positron emission tomography data from the Alzheimers Disease Neuroimaging Initiative (ADNI) and longitudinal lateral ventricle surface data from a longitudinal study of early brain development

    Overweight worsens apoptosis, neuroinflammation and blood-brain barrier damage after hypoxic ischemia in neonatal brain through JNK hyperactivation

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Apoptosis, neuroinflammation and blood-brain barrier (BBB) damage affect the susceptibility of the developing brain to hypoxic-ischemic (HI) insults. c-Jun N-terminal kinase (JNK) is an important mediator of insulin resistance in obesity. We hypothesized that neonatal overweight aggravates HI brain damage through JNK hyperactivation-mediated upregulation of neuronal apoptosis, neuroinflammation and BBB leakage in rat pups.</p> <p>Methods</p> <p>Overweight (OF) pups were established by reducing the litter size to 6, and control (NF) pups by keeping the litter size at 12 from postnatal (P) day 1 before HI on P7. Immunohistochemistry and immunoblotting were used to determine the TUNEL-(+) cells and BBB damage, cleaved caspase-3 and poly (ADP-ribose) polymerase (PARP), and phospho-JNK and phospho-Bim<sub>EL </sub>levels. Immunofluorescence was performed to determine the cellular distribution of phospho-JNK.</p> <p>Results</p> <p>Compared with NF pups, OF pups had a significantly heavier body-weight and greater fat deposition on P7. Compared with the NF-HI group, the OF-HI group showed significant increases of TUNEL-(+) cells, cleaved levels of caspase-3 and PARP, and ED1-(+) activated microglia and BBB damage in the cortex 24 hours post-HI. Immunofluorescence of the OF-HI pups showed that activated-caspase 3 expression was found mainly in NeuN-(+) neurons and RECA1-(+) vascular endothelial cells 24 hours post-HI. The OF-HI group also had prolonged escape latency in the Morris water maze test and greater brain-volume loss compared with the NF-HI group when assessed at adulthood. Phospho-JNK and phospho-Bim<sub>EL </sub>levels were higher in OF-HI pups than in NF-HI pups immediately post-HI. JNK activation in OF-HI pups was mainly expressed in neurons, microglia and vascular endothelial cells. Inhibiting JNK activity by AS601245 caused more attenuation of cleaved caspase-3 and PARP, a greater reduction of microglial activation and BBB damage post-HI, and significantly reduced brain damage in OF-HI than in NF-HI pups.</p> <p>Conclusions</p> <p>Neonatal overweight increased HI-induced neuronal apoptosis, microglial activation and BBB damage, and aggravated HI brain damage in rat pups through JNK hyperactivation.</p

    Square Key Matrix Management Scheme in Wireless Sensor Networks

    Get PDF
    In this paper we propose a symmetric cryptographic approach named Square Key Matrix Management Scheme (SKMaS) in which a sensor node named Key Distribution Server (KDS) is responsible for the security of key management. When the system starts up, the KDS sends its individual key and two sets of keys to sensor nodes. With the IDs, any two valid sensor nodes, e.g. i and j, can individually identify the corresponding communication keys (CKs) to derive a dynamic shared key (DSK) for encrypting/decrypting messages transmitted between them. When i leaves the underlying network, the CKs and the individually keys currently utilized by i can be reused by a newly joining sensor, e.g. h. However, when h joins the network, if no such previously-used IDs are available, h will be given a new ID, CKs and the individually key by the KDS. The KDS encrypts the CKs, with which an existing node q can communicate with h, with individual key so that only q rather than h can correctly decrypt the CKs. The lemmas and security analyses provided in this paper prove that the proposed system can protect at least three common attacks
    corecore