15,010 research outputs found

    Quiver Structure of Heterotic Moduli

    Get PDF
    We analyse the vector bundle moduli arising from generic heterotic compactifications from the point of view of quiver representations. Phenomena such as stability walls, crossing between chambers of supersymmetry, splitting of non-Abelian bundles and dynamic generation of D-terms are succinctly encoded into finite quivers. By studying the Poincar\'e polynomial of the quiver moduli space using the Reineke formula, we can learn about such useful concepts as Donaldson-Thomas invariants, instanton transitions and supersymmetry breaking.Comment: 38 pages, 5 figures, 1 tabl

    Numerical Hermitian Yang-Mills Connections and Kahler Cone Substructure

    Get PDF
    We further develop the numerical algorithm for computing the gauge connection of slope-stable holomorphic vector bundles on Calabi-Yau manifolds. In particular, recent work on the generalized Donaldson algorithm is extended to bundles with Kahler cone substructure on manifolds with h^{1,1}>1. Since the computation depends only on a one-dimensional ray in the Kahler moduli space, it can probe slope-stability regardless of the size of h^{1,1}. Suitably normalized error measures are introduced to quantitatively compare results for different directions in Kahler moduli space. A significantly improved numerical integration procedure based on adaptive refinements is described and implemented. Finally, an efficient numerical check is proposed for determining whether or not a vector bundle is slope-stable without computing its full connection.Comment: 38 pages, 10 figure

    Reprogramming of lysosomal gene expression by interleukin-4 and Stat6.

    Get PDF
    BACKGROUND: Lysosomes play important roles in multiple aspects of physiology, but the problem of how the transcription of lysosomal genes is coordinated remains incompletely understood. The goal of this study was to illuminate the physiological contexts in which lysosomal genes are coordinately regulated and to identify transcription factors involved in this control. RESULTS: As transcription factors and their target genes are often co-regulated, we performed meta-analyses of array-based expression data to identify regulators whose mRNA profiles are highly correlated with those of a core set of lysosomal genes. Among the ~50 transcription factors that rank highest by this measure, 65% are involved in differentiation or development, and 22% have been implicated in interferon signaling. The most strongly correlated candidate was Stat6, a factor commonly activated by interleukin-4 (IL-4) or IL-13. Publicly available chromatin immunoprecipitation (ChIP) data from alternatively activated mouse macrophages show that lysosomal genes are overrepresented among Stat6-bound targets. Quantification of RNA from wild-type and Stat6-deficient cells indicates that Stat6 promotes the expression of over 100 lysosomal genes, including hydrolases, subunits of the vacuolar H⁺ ATPase and trafficking factors. While IL-4 inhibits and activates different sets of lysosomal genes, Stat6 mediates only the activating effects of IL-4, by promoting increased expression and by neutralizing undefined inhibitory signals induced by IL-4. CONCLUSIONS: The current data establish Stat6 as a broadly acting regulator of lysosomal gene expression in mouse macrophages. Other regulators whose expression correlates with lysosomal genes suggest that lysosome function is frequently re-programmed during differentiation, development and interferon signaling

    Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme

    Get PDF
    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.Laszlo B. Kish, Derek Abbott, Claes G. Granqvis

    Prediction of stroke using deep learning model

    Full text link
    © Springer International Publishing AG 2017. Many predictive techniques have been widely applied in clinical decision making such as predicting occurrence of a disease or diagnosis, evaluating prognosis or outcome of diseases and assisting clinicians to recommend treatment of diseases. However, the conventional predictive models or techniques are still not effective enough in capturing the underlying knowledge because it is incapable of simulating the complexity on feature representation of the medical problem domains. This research reports predictive analytical techniques for stroke using deep learning model applied on heart disease dataset. The atrial fibrillation symptoms in heart patients are a major risk factor of stroke and share common variables to predict stroke. The outcomes of this research are more accurate than medical scoring systems currently in use for warning heart patients if they are likely to develop stroke

    Automatic estimation of harmonic tension by distributed representation of chords

    Full text link
    The buildup and release of a sense of tension is one of the most essential aspects of the process of listening to music. A veridical computational model of perceived musical tension would be an important ingredient for many music informatics applications. The present paper presents a new approach to modelling harmonic tension based on a distributed representation of chords. The starting hypothesis is that harmonic tension as perceived by human listeners is related, among other things, to the expectedness of harmonic units (chords) in their local harmonic context. We train a word2vec-type neural network to learn a vector space that captures contextual similarity and expectedness, and define a quantitative measure of harmonic tension on top of this. To assess the veridicality of the model, we compare its outputs on a number of well-defined chord classes and cadential contexts to results from pertinent empirical studies in music psychology. Statistical analysis shows that the model's predictions conform very well with empirical evidence obtained from human listeners.Comment: 12 pages, 4 figures. To appear in Proceedings of the 13th International Symposium on Computer Music Multidisciplinary Research (CMMR), Porto, Portuga

    Heterotic domain wall solutions and SU(3) structure manifolds

    Full text link
    We examine compactifications of heterotic string theory on manifolds with SU(3) structure. In particular, we study N = 1/2 domain wall solutions which correspond to the perturbative vacua of the 4D, N =1 supersymmetric theories associated to these compactifications. We extend work which has appeared previously in the literature in two important regards. Firstly, we include two additional fluxes which have been, heretofore, omitted in the general analysis of this situation. This allows for solutions with more general torsion classes than have previously been found. Secondly, we provide explicit solutions for the fluxes as a function of the torsion classes. These solutions are particularly useful in deciding whether equations such as the Bianchi identities can be solved, in addition to the Killing spinor equations themselves. Our work can be used to straightforwardly decide whether any given SU(3) structure on a six-dimensional manifold is associated with a solution to heterotic string theory. To illustrate how to use these results, we discuss a number of examples taken from the literature.Comment: 34 pages, minor corrections in second versio

    Numerical Hermitian Yang-Mills Connections and Vector Bundle Stability in Heterotic Theories

    Get PDF
    A numerical algorithm is presented for explicitly computing the gauge connection on slope-stable holomorphic vector bundles on Calabi-Yau manifolds. To illustrate this algorithm, we calculate the connections on stable monad bundles defined on the K3 twofold and Quintic threefold. An error measure is introduced to determine how closely our algorithmic connection approximates a solution to the Hermitian Yang-Mills equations. We then extend our results by investigating the behavior of non slope-stable bundles. In a variety of examples, it is shown that the failure of these bundles to satisfy the Hermitian Yang-Mills equations, including field-strength singularities, can be accurately reproduced numerically. These results make it possible to numerically determine whether or not a vector bundle is slope-stable, thus providing an important new tool in the exploration of heterotic vacua.Comment: 52 pages, 15 figures. LaTex formatting of figures corrected in version 2

    Inter-rater agreement and reliability of the COSMIN (COnsensus-based Standards for the selection of health status Measurement Instruments) Checklist

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The COSMIN checklist is a tool for evaluating the methodological quality of studies on measurement properties of health-related patient-reported outcomes. The aim of this study is to determine the inter-rater agreement and reliability of each item score of the COSMIN checklist (n = 114).</p> <p>Methods</p> <p>75 articles evaluating measurement properties were randomly selected from the bibliographic database compiled by the Patient-Reported Outcome Measurement Group, Oxford, UK. Raters were asked to assess the methodological quality of three articles, using the COSMIN checklist. In a one-way design, percentage agreement and intraclass kappa coefficients or quadratic-weighted kappa coefficients were calculated for each item.</p> <p>Results</p> <p>88 raters participated. Of the 75 selected articles, 26 articles were rated by four to six participants, and 49 by two or three participants. Overall, percentage agreement was appropriate (68% was above 80% agreement), and the kappa coefficients for the COSMIN items were low (61% was below 0.40, 6% was above 0.75). Reasons for low inter-rater agreement were need for subjective judgement, and accustom to different standards, terminology and definitions.</p> <p>Conclusions</p> <p>Results indicated that raters often choose the same response option, but that it is difficult on item level to distinguish between articles. When using the COSMIN checklist in a systematic review, we recommend getting some training and experience, completing it by two independent raters, and reaching consensus on one final rating. Instructions for using the checklist are improved.</p
    corecore