467 research outputs found
A Nonlocal Application of the Dispersive Optical Model to 208Pb
From the Washington University Senior Honors Thesis Abstracts (WUSHTA), Spring 2018. Published by the Office of Undergraduate Research. Joy Zalis Kiefer, Director of Undergraduate Research and Associate Dean in the College of Arts & Sciences; Lindsey Paunovich, Editor; Helen Human, Programs Manager and Assistant Dean in the College of Arts and Sciences Mentor: Willem Dickhof
The Large Magellanic Cloud Revealed in Gravitational Waves with LISA
The Laser Interferometer Space Antenna (LISA) will unveil the non-transient
gravitational wave sky full of inspiralling stellar-mass compact binaries
within the Local Universe. The Large Magellanic Cloud (LMC) is expected to be
prominent on the LISA sky due to its proximity and its large population of
double white dwarfs (DWD). Here we present the first dedicated study of the LMC
with gravitational wave sources. We assemble three LMC models based on: (1) the
density distribution and star formation history from optical wavelength
observations, (2) a detailed hydrodynamic simulation, and (3) combining the
two. Our models yield a hundred to several hundred detectable DWDs: indeed, the
LMC will be a resolved galaxy in the LISA sky. Importantly, amongst these we
forecast a few tens to a hundred double degenerate supernovae type Ia
progenitors, a class of binaries which have never been unambiguously observed.
The range in the number of detections is primarily due to differences in the
LMC total stellar mass and recent star formation in our models. Our results
suggest that the total number, periods, and chirp masses of LISA sources may
provide independent constraints on both LMC stellar mass and recent star
formation by comparing LISA observations with the models, although such
constraints will be highly model-dependent. Our publicly available model
populations may be used in future studies of the LMC, including its structure
and contribution to LISA confusion noise.Comment: Accepted to MNRAS. Adapted from M. A. Keim's MSc Thesis. Catalogues
available at https://doi.org/10.5281/zenodo.691808
Redaction of sensitive data in the publication of dual use research of concern
Editorial. The publication of scientific information that derives from dual use research of concern (DURC) poses major problems for journals because it brings into conflict the benefits of free access to data and the need to prevent misuse of that information by others. Recently, a group of authors and a major scientific journal addressed the issue of publishing information on a newly discovered, highly lethal toxin that can be delivered to large populations and for which there are no available countermeasures. The journal addressed this conflict by permitting the redaction of information that is normally considered essential for publication. This action establishes a precedent for redaction of sensitive data that also provides an example of responsible scientific publishing. However, this precedent leaves many questions unanswered and suggests a need for a discussion by all stakeholders of scientific information so as to derive normative standards for the publication of DURC
Effects of Autonomy on Worker Performance
Having autonomy can produce positive effects on an individual’s well-being as well as overall job-satisfaction. Research has shown that background music influences listener attention and is associated with the listeners fondness of the music (Huang & Shih, 2011). This study investigates the effects that autonomy may also have on performance levels in the workplace. Specifically, the effects of listening to music of preference and the effects it has on attention, concentration, and enjoyment of task. In this study worker autonomy is operationally defined as preferred genre of music. Performance will be measured by participants score on a recall task that mimics a medical scenario where a healthcare worker would have to recall specific patient information. We hypothesize that participants autonomy preferred background music will have a positive effect on worker performance. If the predicted results are found, this research could be beneficial to companies that are considering implementing new policies to encourage autonomy and in turn produce greater success in the workplace
Tumor-reactive immune cells protect against metastatic tumor and induce immunoediting of indolent but not quiescent tumor cells
Two major barriers to cancer immunotherapy include tumor-induced immune suppression mediated by myeloid-derived suppressor cells and poor immunogenicity of the tumor-expressing self-antigens. To overcome these barriers, we reprogrammed tumor-immune cell cross-talk by combined use of decitabine and adoptive immunotherapy, containing tumor-sensitized T cells and CD25+ NKT cells. Decitabine functioned to induce the expression of highly immunogenic cancer testis antigens in the tumor, while also reducing the frequency of myeloid-derived suppressor cells and the presence of CD25+ NKT cells rendered T cells, resistant to remaining myeloid-derived suppressor cells. This combinatorial therapy significantly prolonged survival of animals bearing metastatic tumor cells. Adoptive immunotherapy also induced tumor immunoediting, resulting in tumor escape and associated disease-related mortality. To identify a tumor target that is incapable of escape from the immune response, we used dormant tumor cells. We used Adriamycin chemotherapy or radiation therapy, which simultaneously induce tumor cell death and tumor dormancy. Resultant dormant cells became refractory to additional doses of Adriamycin or radiation therapy, but they remained sensitive to tumor-reactive immune cells. Importantly, we discovered that dormant tumor cells contained indolent cells that expressed low levels of Ki67 and quiescent cells that were Ki67 negative. Whereas the former were prone to tumor immunoediting and escape, the latter did not demonstrate immunoediting. Our results suggest that immunotherapy could be highly effective against quiescent dormant tumor cells. The challenge is to develop combinatorial therapies that could establish a quiescent type of tumor dormancy, which would be the best target for immunotherapy
The Ethical Frontier: Ethical Considerations for Frontier Counselors
Counselors working in frontier communities may encounter unique challenges and experiences not regularly found in larger contexts. This paper explores the aspects of counseling significant to rural and frontier settings. It discusses the traditional attitudes of rural and frontier populations, the counselor's place in these communities, boundaries of competence, and ethical concerns that are significant to these areas of counseling, such as confidentiality. It also offers potential ways to address related ethical issues. The cultural milieu in small communities, subcultural selfidentification, frontier attitudes and beliefs, and multiple relationships are explored
The Nuclearization of Biology Is a Threat to Health and Security
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/78142/1/bsp.2009.0047.pd
Biodefense Research: A Win-Win Challenge
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/63273/1/bsp.2008.1114.pd
Visual interaction with dimensionality reduction: a structured literature analysis
Dimensionality Reduction (DR) is a core building block in visualizing multidimensional data. For DR techniques to be useful in exploratory data analysis, they need to be adapted to human needs and domain-specific problems, ideally, interactively, and on-the-fly. Many visual analytics systems have already demonstrated the benefits of tightly integrating DR with interactive visualizations. Nevertheless, a general, structured understanding of this integration is missing. To address this, we systematically studied the visual analytics and visualization literature to investigate how analysts interact with automatic DR techniques. The results reveal seven common interaction scenarios that are amenable to interactive control such as specifying algorithmic constraints, selecting relevant features, or choosing among several DR algorithms. We investigate specific implementations of visual analysis systems integrating DR, and analyze ways that other machine learning methods have been combined with DR. Summarizing the results in a “human in the loop” process model provides a general lens for the evaluation of visual interactive DR systems. We apply the proposed model to study and classify several systems previously described in the literature, and to derive future research opportunities
Solving crosswords with PROVERB
Abstract We attacked the problem of solving crossword puzzles by computer: Given a set of clues and a crossword grid, try to maximize the number of words correctly filled in. PaOVEaB, the probabilistic cruciverbalist, separates the problem into two, more familiar subproblems: candidate generation and grid filling. In candidate generation, each clue is treated as a type of query to an information retrieval system, and relevant words of the correct length are returned along with confidence scores. In grid filling, the candidate words are fit into the puzzle grid to maximize an overall confidence score using a combination of ideas from belief network inference and constraint satisfaction. For our demonstration, we will have an interactive version of the candidate-generation process available via the web, and will also give people an opportunity to go head-tohead against PaOVERB in solving complete puzzles. Crossword puzzles have been an AI staple for many years, both as an example of the constraint satisfaction paradigm The architecture of the system consists primarily of a set of 30 "Expert Modules" responsible for suggesting solutions to the clues, and a "Solver" responsible for selecting candidate answers for each clue that fit together in the grid. To illustrate the candidate-generation process, we took the 70 clues from the crossword puzzle published in the New York Times, Thursday, October 10th, 1998. These clues were run through the expert modules and approximately 33 were solved with high confidence (in the top 10). After grid filling (combining crossing constraints with information from the clue), 62 clues were answered correctly. We examined the 33 well-solved clues to determine which expert modules contributed to the solution. These are described below. Modules come in several different types
- …