Search results for "Databases"
showing 10 items of 937 documents
Theory of Neutrinos
2004
After a brief overview of the present knowledge of neutrino masses and mixing, we summarize what can be learned about physics beyond the standard model from the various proposed neutrino experiments. We also comment on the impact of the experiments on our understanding of the origin of the matter-antimatter asymmetry of the Universe as well as what can be learned from some experiments outside the domain of neutrinos.
Double copies of fermions as only gravitational interacting matter
2016
Inspired by the recent progress in the field of scattering amplitudes, we discuss hypothetical particles which can be characterised as the double copies of fermions -- in the same way gravitons can be viewed as double copies of gauge bosons. As the gravitons, these hypothetical particles interact only through gravitational interactions. We present two equivalent methods for the computation of the relevant scattering amplitudes. The hypothetical particles can be massive and non-relativistic.
Supersymmetry in non commutative superspaces
2003
Non commutative superspaces can be introduced as the Moyal-Weyl quantization of a Poisson bracket for classical superfields. Different deformations are studied corresponding to constant background fields in string theory. Supersymmetric and non supersymmetric deformations can be defined, depending on the differential operators used to define the Poisson bracket. Some examples of deformed, 4 dimensional lagrangians are given. For extended superspace (N>1), some new deformations can be defined, with no analogue in the N=1 case.
Decoherent neutrino mixing, dark energy, and matter-antimatter asymmetry
2004
A CPT violating decoherence scenario can easily account for all the experimental evidence in the neutrino sector including LSND. In this work it is argued that this framework can also accommodate the Dark Energy content of the Universe, as well as the observed matter-antimatter asymmetry.
Physical Activity and Exercise: Text Mining Analysis
2021
It is currently difficult to have a global state of the art vision of certain scientific topics. In the field of physical activity (PA) and exercise, this is due to information overload. The present study aims to provide a solution by analysing a large mass of scientific articles using text mining (TM). The purpose was to analyse what is being investigated in the PA health field on young people from primary, secondary and higher education. Titles and abstracts published in the Web of Science (WOS) database were analysed using TM on 24 November 2020, and after removing duplicates, 85,368 remained. The results show 9960 (unique) words and the most frequently used bi-grams and tri-grams. A co-…
Some topological properties of the Inverse Lens Mapping
2011
Away from critical curves, lens mapping can be seen as a linear invertible transformation of the plane even for regions (cells) of relatively large size. However, close to critical curves the departures from linearity can be very strong. We discuss the topological problems induced by the mapping of regions of the image plane that include critical curves (critical cells).
Actin binding LIM protein 3 (abLIM3).
2005
LIM domain proteins were demonstrated to play key roles in various biological processes such as embryonic development, cell lineage determination, and cancer differentiation. Actin binding LIM protein 1 (abLIM1) was reported to be localized in a genomic region often deleted in human cancers and suggested to be involved in axon guidance. Recently, existence of a second family member was reported, actin binding LIM protein 2. By means of computational biology and comparative genomics, we now characterized an additional, third member of the actin binding LIM protein subgroup, actin binding LIM protein 3 (abLIM3). The human mRNA sequence was previously annotated as differentially regulated in h…
Standard Vs Uniform Binary Search and Their Variants in Learned Static Indexing: The Case of the Searching on Sorted Data Benchmarking Software Platf…
2023
Learned Indexes are a novel approach to search in a sorted table. A model is used to predict an interval in which to search into and a Binary Search routine is used to finalize the search. They are quite effective. For the final stage, usually, the lower_bound routine of the Standard C++ library is used, although this is more of a natural choice rather than a requirement. However, recent studies, that do not use Machine Learning predictions, indicate that other implementations of Binary Search or variants, namely k-ary Search, are better suited to take advantage of the features offered by modern computer architectures. With the use of the Searching on Sorted Sets SOSD Learned Indexing bench…
Optimized distribution of internationalized DRM-protected multimedia content
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad In this project we have looked into different streaming technologies, transport methods and ways of securing the content. We have performed an analysis of the performance in different scenarios, and tested different ways of distributing the content. We have also looked into some of the newest player technologies, and found the reasons for using them, or to look for alternatives. We have found that the best way to deliver content is to use multiple streams and assembling them on the client. This will take more bandwidth, but with todays internet connections this will be acceptable. The solution th…
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…