To see the other types of publications on this topic, follow the link: Hidden transformations.

Journal articles on the topic 'Hidden transformations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hidden transformations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dupuy, Alexander D., I.-Ting Chiu, Padraic Shafer, Elke Arenholz, Yayoi Takamura, and Julie M. Schoenung. "Hidden transformations in entropy-stabilized oxides." Journal of the European Ceramic Society 41, no. 13 (October 2021): 6660–69. http://dx.doi.org/10.1016/j.jeurceramsoc.2021.06.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Memisevic, Roland, and Geoffrey E. Hinton. "Learning to Represent Spatial Transformations with Factored Higher-Order Boltzmann Machines." Neural Computation 22, no. 6 (June 2010): 1473–92. http://dx.doi.org/10.1162/neco.2010.01-09-953.

Full text
Abstract:
To allow the hidden units of a restricted Boltzmann machine to model the transformation between two successive images, Memisevic and Hinton ( 2007 ) introduced three-way multiplicative interactions that use the intensity of a pixel in the first image as a multiplicative gain on a learned, symmetric weight between a pixel in the second image and a hidden unit. This creates cubically many parameters, which form a three-dimensional interaction tensor. We describe a low-rank approximation to this interaction tensor that uses a sum of factors, each of which is a three-way outer product. This approximation allows efficient learning of transformations between larger image patches. Since each factor can be viewed as an image filter, the model as a whole learns optimal filter pairs for efficiently representing transformations. We demonstrate the learning of optimal filter pairs from various synthetic and real image sequences. We also show how learning about image transformations allows the model to perform a simple visual analogy task, and we show how a completely unsupervised network trained on transformations perceives multiple motions of transparent dot patterns in the same way as humans.
APA, Harvard, Vancouver, ISO, and other styles
3

Oh, Sang-Hoon. "Effect of Nonlinear Transformations on Entropy of Hidden Nodes." International Journal of Contents 10, no. 1 (March 28, 2014): 18–22. http://dx.doi.org/10.5392/ijoc.2014.10.1.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

RODRIGUES, W. A., R. DA ROCHA, and J. VAZ. "HIDDEN CONSEQUENCE OF ACTIVE LOCAL LORENTZ INVARIANCE." International Journal of Geometric Methods in Modern Physics 02, no. 02 (April 2005): 305–57. http://dx.doi.org/10.1142/s0219887805000600.

Full text
Abstract:
In this paper we investigate a hidden consequence of the hypothesis that Lagrangians and field equations must be invariant under active local Lorentz transformations. We show that this hypothesis implies in an equivalence between spacetime structures with several curvature and torsion possibilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Grossman, Robert W. "Discovering Hidden Transformations: Making Science and Other Courses More Learnable." College Teaching 53, no. 1 (January 2005): 33–40. http://dx.doi.org/10.3200/ctch.53.1.33-40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gemello, Roberto, Franco Mana, Stefano Scanzio, Pietro Laface, and Renato De Mori. "Linear hidden transformations for adaptation of hybrid ANN/HMM models." Speech Communication 49, no. 10-11 (October 2007): 827–35. http://dx.doi.org/10.1016/j.specom.2006.11.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

COQUEREAUX, R., R. HÄUßLING, N. A. PAPADOPOULOS, and F. SCHECK. "GENERALIZED GAUGE TRANSFORMATIONS AND HIDDEN SYMMETRY IN THE STANDARD MODEL." International Journal of Modern Physics A 07, no. 12 (May 10, 1992): 2809–24. http://dx.doi.org/10.1142/s0217751x92001265.

Full text
Abstract:
A recently proposed, new construction of the Standard Model based on the graded Lie algebra SU (2|1) is analyzed in some depth. The essential ingredient is an algebraic superconnection which incorporates both the gauge fields and the Higgs fields and whose curvature automatically leads to a spontaneously broken realization of the theory. The mechanism of hiding the original algebraic structure is unorthodox and is due to the specific, "noncommutative" realization of SU (2|1). The model is characterized by a constant background supercurvature which is invariant under arbitrary, constant SU (2|1) gauge transformations. This background field whose effect is analogous to the action of a constant magnetic field on a spherical atom, is traced back to the differential in the space of (super)matrices by means of which the supercurvature is constructed. The same background field is responsible for the fact that the ground state has no more than the U (1) e.m. symmetry of electromagnetism, the SU (2)L × U (1) symmetry of the Standard Model being recovered only after "backshifting" the Higgs fields. Thus, the Higgs mechanism receives a new and geometrical interpretation.
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Fandong, and Jinchao Zhang. "DTMT: A Novel Deep Transition Architecture for Neural Machine Translation." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 224–31. http://dx.doi.org/10.1609/aaai.v33i01.3301224.

Full text
Abstract:
Past years have witnessed rapid developments in Neural Machine Translation (NMT). Most recently, with advanced modeling and training techniques, the RNN-based NMT (RNMT) has shown its potential strength, even compared with the well-known Transformer (self-attentional) model. Although the RNMT model can possess very deep architectures through stacking layers, the transition depth between consecutive hidden states along the sequential axis is still shallow. In this paper, we further enhance the RNN-based NMT through increasing the transition depth between consecutive hidden states and build a novel Deep Transition RNN-based Architecture for Neural Machine Translation, named DTMT. This model enhances the hidden-to-hidden transition with multiple non-linear transformations, as well as maintains a linear transformation path throughout this deep transition by the well-designed linear transformation mechanism to alleviate the gradient vanishing problem. Experiments show that with the specially designed deep transition modules, our DTMT can achieve remarkable improvements on translation quality. Experimental results on Chinese⇒English translation task show that DTMT can outperform the Transformer model by +2.09 BLEU points and achieve the best results ever reported in the same dataset. On WMT14 English⇒German and English⇒French translation tasks, DTMT shows superior quality to the state-of-the-art NMT systems, including the Transformer and the RNMT+.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Michael A., and J. Douglas Crawford. "Distributed Population Mechanism for the 3-D Oculomotor Reference Frame Transformation." Journal of Neurophysiology 93, no. 3 (March 2005): 1742–61. http://dx.doi.org/10.1152/jn.00306.2004.

Full text
Abstract:
Human saccades require a nonlinear, eye orientation–dependent reference frame transformation to transform visual codes to the motor commands for eye muscles. Primate neurophysiology suggests that this transformation is performed between the superior colliculus and brain stem burst neurons, but provides little clues as to how this is done. To understand how the brain might accomplish this, we trained a 3-layer neural net to generate accurate commands for kinematically correct 3-D saccades. The inputs to the network were a 2-D, eye-centered, topographic map of Gaussian visual receptive fields and an efference copy of eye position in 6-dimensional, push–pull “neural integrator” coordinates. The output was an eye orientation displacement command in similar coordinates appropriate to drive brain stem burst neurons. The network learned to generate accurate, kinematically correct saccades, including the eye orientation–dependent tilts in saccade motor error commands required to match saccade trajectories to their visual input. Our analysis showed that the hidden units developed complex, eye-centered visual receptive fields, widely distributed fixed-vector motor commands, and “gain field”–like eye position sensitivities. The latter evoked subtle adjustments in the relative motor contributions of each hidden unit, thereby rotating the population motor vector into the correct correspondence with the visual target input for each eye orientation: a distributed population mechanism for the visuomotor reference frame transformation. These findings were robust; there was little variation across networks with between 9 and 49 hidden units. Because essentially the same observations have been reported in the visuomotor transformations of the real oculomotor system, as well as other visuomotor systems (although interpreted elsewhere in terms of other models) we suggest that the mechanism for visuomotor reference frame transformations identified here is the same solution used in the real brain.
APA, Harvard, Vancouver, ISO, and other styles
10

Lockery, Shawn R., Yan Fang, and Terrence J. Sejnowski. "A Dynamic Neural Network Model of Sensorimotor Transformations in the Leech." Neural Computation 2, no. 3 (September 1990): 274–82. http://dx.doi.org/10.1162/neco.1990.2.3.274.

Full text
Abstract:
Interneurons in leech ganglia receive multiple sensory inputs and make synaptic contacts with many motor neurons. These “hidden” units coordinate several different behaviors. We used physiological and anatomical constraints to construct a model of the local bending reflex. Dynamic networks were trained on experimentally derived input-output patterns using recurrent backpropagation. Units in the model were modified to include electrical synapses and multiple synaptic time constants. The properties of the hidden units that emerged in the simulations matched those in the leech. The model and data support distributed rather than localist representations in the local bending reflex. These results also explain counterintuitive aspects of the local bending circuitry.
APA, Harvard, Vancouver, ISO, and other styles
11

Banawan, Salma, and Ibrahim Kamel. "Hiding Information in Reversible English Transforms for a Blind Receiver." Applied Computational Intelligence and Soft Computing 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/387985.

Full text
Abstract:
This paper proposes a new technique for hiding secret messages in ordinary English text. The proposed technique exploits the redundancies existing in some English language constructs. Redundancies result from the flexibility in maneuvering certain statement constituents without altering the statement meaning or correctness. For example, one can say “she went to sleep, because she was tired” or “Because she was tired, she went to sleep.” The paper provides a number of such transformations that can be applied concurrently, while keeping the overall meaning and grammar intact. The proposed data hiding technique is blind since the receiver does not keep a copy of the original uncoded text (cover). Moreover, it can hide more than three bits per statement, which is higher than that achieved in the prior work. A secret key that is a function of the various transformations used is proposed to protect the confidentiality of the hidden message. Our security analysis shows that even if the attacker knows how the transforms are employed, the secret key provides enough security to protect the confidentiality of the hidden message. Moreover, we show that the proposed transformations do not affect the inconspicuousness of the transformed statements, and thus unlikely to draw suspicion.
APA, Harvard, Vancouver, ISO, and other styles
12

Hsiao, Kuo-Hung. "Structural analysis of traditional Chinese hidden-keyhole padlocks." Mechanical Sciences 9, no. 1 (April 24, 2018): 189–99. http://dx.doi.org/10.5194/ms-9-189-2018.

Full text
Abstract:
Abstract. Hidden-keyhole padlocks use a plate or some other means to cover the keyhole and are a category of traditional Chinese padlocks. The topological structures of traditional hidden-keyhole padlocks have distinct arrangements in the operation. Therefore, they are reconfigurable mechanisms. This paper presents the structures of traditional Chinese hidden-keyhole padlocks, which were popular and had abundant types. The structural characteristics of hidden-keyhole padlocks are described first. Then, the representation for kinematic pairs appeared in operating steps is introduced. The variable chains of hidden-keyhole padlocks are presented by using the representation of kinematic pairs, from which all topology variabilities of hidden-keyhole padlocks in the operation are derived. Four main types of hidden-keyhole padlocks are provided as examples to illustrate the configuration transformations. This work presents a useful procedure to indicate and analyze the topology variabilities of hidden-keyhole padlocks.
APA, Harvard, Vancouver, ISO, and other styles
13

Xing, Jing, and Richard A. Andersen. "Models of the Posterior Parietal Cortex Which Perform Multimodal Integration and Represent Space in Several Coordinate Frames." Journal of Cognitive Neuroscience 12, no. 4 (July 2000): 601–14. http://dx.doi.org/10.1162/089892900562363.

Full text
Abstract:
Many neurons in the posterior-parietal cortex (PPC) have saccadic responses to visual and auditory targets. The responses are modulated by eye position and head position. These findings suggest that PPC integrates multisensory inputs and may provide information about saccadic targets represented in different coordinate frames. In addition to an eye-centered output representation, PPC may also project to brain areas which contain head-centered and body-centered representations of the space. In this report, possible coordinate transformations in PPC were examined by comparing several sets of models of PPC, each having different representations in the output layer: (i) an eye-centered map only; (ii) a head-centered map only; (iii) an eye-centered map and a head-centered map; and (iv) an eye-centered map, a head-centered map, and a body-centered map. These output maps correctly encoded saccades to visual and auditory targets through training. The units in the hidden layers of the models exhibited the following properties: (1) The units had gain fields (GFs) for eye position, and also for head position if the model had a body-centered output representation; (2) As the result of the GF and the nonlinear activation function of the units, the hidden layers often employed “intermediate” coding, e.g., the hidden units coded targets partially in eye-centered coordinates and, partially, in head-centered coordinates; (3) Different types of coordinate transformations in these models were carried out by different relationships between the receptive fields (RFs) and the GFs of the hidden units; and (4) The properties of PPC neurons are in better accordance with the hidden units of the models that had multiple-output representations than the models that had only one single-output representation. In conclusion, the results show that the GF is an effective mechanism for performing coordinate transformations. The models also suggest that neurons with intermediate coding are to be expected in the process of coordinate transformations.
APA, Harvard, Vancouver, ISO, and other styles
14

Zaikov, R. P. "Group structure of hidden symmetry transformations for supersymmetric nonlinear sigma models." Theoretical and Mathematical Physics 62, no. 3 (March 1985): 269–74. http://dx.doi.org/10.1007/bf01018268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

POLYAKOV, DIMITRI. "GHOST COHOMOLOGIES AND HIDDEN SPACE–TIME SYMMETRIES." International Journal of Modern Physics A 22, no. 13 (May 20, 2007): 2441–59. http://dx.doi.org/10.1142/s0217751x07036269.

Full text
Abstract:
We observe and study new nonlinear global space–time symmetries of the full ghost + matter action of RNS superstring theory. We show that these surprising new symmetries are generated by the special worldsheet currents (physical vertex operators) of RNS superstring theory, violating the equivalence of superconformal ghost pictures. We review the questions of BRST-invariance and nontriviality of picture-dependent vertex operators and show their relation to hidden space–time symmetries and hidden space–time dimensions. In particular, we relate the space–time transformations, induced by picture-dependent currents, to the symmetries observed in the 2T physics approach.
APA, Harvard, Vancouver, ISO, and other styles
16

Maldonado-Chan, Mauricio, Andres Mendez-Vazquez, and Ramon Osvaldo Guardado-Medina. "Multimodal Tucker Decomposition for Gated RBM Inference." Applied Sciences 11, no. 16 (August 11, 2021): 7397. http://dx.doi.org/10.3390/app11167397.

Full text
Abstract:
Gated networks are networks that contain gating connections in which the output of at least two neurons are multiplied. The basic idea of a gated restricted Boltzmann machine (RBM) model is to use the binary hidden units to learn the conditional distribution of one image (the output) given another image (the input). This allows the hidden units of a gated RBM to model the transformations between two successive images. Inference in the model consists in extracting the transformations given a pair of images. However, a fully connected multiplicative network creates cubically many parameters, forming a three-dimensional interaction tensor that requires a lot of memory and computations for inference and training. In this paper, we parameterize the bilinear interactions in the gated RBM through a multimodal tensor-based Tucker decomposition. Tucker decomposition decomposes a tensor into a set of matrices and one (usually smaller) core tensor. The parameterization through Tucker decomposition helps reduce the number of model parameters, reduces the computational costs of the learning process and effectively strengthens the structured feature learning. When trained on affine transformations of still images, we show how a completely unsupervised network learns explicit encodings of image transformations.
APA, Harvard, Vancouver, ISO, and other styles
17

GOYKHMAN, MIKHAIL, and EVGENY IVANOV. "HIDDEN SUPERSYMMETRY IN POHLMEYER-REDUCED FORM OF AdSn × Sn SUPERSTRINGS." International Journal of Modern Physics: Conference Series 13 (January 2012): 98–107. http://dx.doi.org/10.1142/s2010194512006769.

Full text
Abstract:
We review how the AdS2 × S2, AdS3 × S3 and AdS5 × S5 superstring theories in the Pohlmeyer-reduced form exhibit hidden [Formula: see text], [Formula: see text] and [Formula: see text] worldsheet supersymmetries, with emphasis on the last two cases. Their characteristic feature is the presence of non-local terms in the supersymmetry transformations.
APA, Harvard, Vancouver, ISO, and other styles
18

Sayed, Wafaa S., and Ahmed G. Radwan. "Self-Reproducing Hidden Attractors in Fractional-Order Chaotic Systems Using Affine Transformations." IEEE Open Journal of Circuits and Systems 1 (2020): 243–54. http://dx.doi.org/10.1109/ojcas.2020.3030756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Nikitin, A. G., and V. V. Tretynyk. "Parasupersymmetries and Non-Lie Constants of Motion for Two-Particle Equations." International Journal of Modern Physics A 12, no. 24 (September 30, 1997): 4369–86. http://dx.doi.org/10.1142/s0217751x97002371.

Full text
Abstract:
We search for hidden symmetries of two-particle equations with oscillator-equivalent potential, proposed by Moshinsky with collaborators. We proved that these equations admit hidden symmetries and parasupersymmetries which enable one to easily find the Hamiltonian spectra using algebraic methods and to construct exact Foldy–Wouthuysen transformations. Moreover, we demonstrate that these equations are reducible and generate Hamiltonians for pararelativistic or Kemmer oscillators. We also establish equivalence relations between different approaches to Kemmer oscillator and propose new one- and two-particle equations with oscillator-equivalent potentials.
APA, Harvard, Vancouver, ISO, and other styles
20

POLYAKOV, DIMITRI. "NEW SUPERSTRING ISOMETRIES AND HIDDEN DIMENSIONS." International Journal of Modern Physics A 22, no. 29 (November 20, 2007): 5301–23. http://dx.doi.org/10.1142/s0217751x07037299.

Full text
Abstract:
We study the hierarchy of hidden space–time symmetries of noncritical strings in RNS formalism, realized nonlinearly. Under these symmetry transformations the variation of the matter part of the RNS action is canceled by that of the ghost part. These symmetries, referred to as the α-symmetries, are induced by special space–time generators, violating the equivalence of ghost pictures. We classify the α-symmetry generators in terms of superconformal ghost cohomologies Hn ~ H-n-2(n≥0) and associate these generators with a chain of hidden space–time dimensions, with each ghost cohomology Hn ~ H-n-2 "contributing" an extra dimension. Namely, we show that each ghost cohomology Hn ~ H-n-2 of noncritical superstring theory in d-dimensions contains d+n+1 α-symmetry generators and the generators from Hk ~ H-k-2, 1≤k ≤n, combined together, extend the space–time isometry group from the naive SO (d, 2) to SO (d+n, 2). In the simplest case of n = 1 the α-generators are identified with the extra symmetries of the 2T-physics formalism, also known to originate from a hidden space–time dimension.
APA, Harvard, Vancouver, ISO, and other styles
21

Sirota, A. A., M. A. Dryuchenko, and E. Yu Mitrofanova. "Digital watermarking method based on heteroassociative image compression and its realization with artificial neural networks." Computer Optics 42, no. 3 (July 25, 2018): 483–94. http://dx.doi.org/10.18287/2412-6179-2018-42-3-483-494.

Full text
Abstract:
In this paper, we present a digital watermarking method and associated algorithms that use a heteroassociative compressive transformation to embed a digital watermark bit sequence into blocks (fragments) of container images. A principal feature of the proposed method is the use of the heteroassociative compressing transformation – a mutual mapping with the compression of two neighboring image regions of an arbitrary shape. We also present the results of our experiments, namely the dependencies of quality indicators of thus created digital watermarks, which show the container distortion level, and the probability of digital watermark extraction error. In the final section, we analyze the performance of the proposed digital watermarking algorithms under various distortions and transformations aimed at destroying the hidden data, and compare these algorithms with the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
22

Soria-Lorente, A., and S. Berres. "A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/5397082.

Full text
Abstract:
This contribution proposes a novel steganographic method based on the compression standard according to the Joint Photographic Expert Group and an Entropy Thresholding technique. The steganographic algorithm uses one public key and one private key to generate a binary sequence of pseudorandom numbers that indicate where the elements of the binary sequence of a secret message will be inserted. The insertion takes eventually place at the first seven AC coefficients in the transformed DCT domain. Before the insertion of the message the image undergoes several transformations. After the insertion the inverse transformations are applied in reverse order to the original transformations. The insertion itself takes only place if an entropy threshold of the corresponding block is satisfied and if the pseudorandom number indicates to do so. The experimental work on the validation of the algorithm consists of the calculation of the peak signal-to-noise ratio (PSNR), the difference and correlation distortion metrics, the histogram analysis, and the relative entropy, comparing the same characteristics for the cover and stego image. The proposed algorithm improves the level of imperceptibility analyzed through the PSNR values. A steganalysis experiment shows that the proposed algorithm is highly resistant against the Chi-square attack.
APA, Harvard, Vancouver, ISO, and other styles
23

Ligas, Marcin, and Marek Kulczycki. "Kriging approach for local height transformations." Geodesy and Cartography 63, no. 1 (June 1, 2014): 25–37. http://dx.doi.org/10.2478/geocart-2014-0002.

Full text
Abstract:
Abstract In the paper a transformation between two height datums (Kronstadt’60 and Kronstadt’86, the latter being a part of the present National Spatial Reference System in Poland) with the use of geostatistical method - kriging is presented. As the height differences between the two datums reveal visible trend a natural decision is to use the kind of kriging method that takes into account nonstationarity in the average behavior of the spatial process (height differences between the two datums). Hence, two methods were applied: hybrid technique (a method combining Trend Surface Analysis with ordinary kriging on least squares residuals) and universal kriging. The background of the two methods has been presented. The two methods were compared with respect to the prediction capabilities in a process of crossvalidation and additionally they were compared to the results obtained by applying a polynomial regression transformation model. The results obtained within this study prove that the structure hidden in the residual part of the model and used in kriging methods may improve prediction capabilities of the transformation model.
APA, Harvard, Vancouver, ISO, and other styles
24

Agazzi, Oscar E., and Shyh-shiaw Kuo. "Hidden markov model based optical character recognition in the presence of deterministic transformations." Pattern Recognition 26, no. 12 (December 1993): 1813–26. http://dx.doi.org/10.1016/0031-3203(93)90178-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kyuldjiev, A. V., and R. P. Zaikov. "On a generalization of the hidden symmetry transformations for the principal chiral model." Letters in Mathematical Physics 10, no. 4 (November 1985): 269–78. http://dx.doi.org/10.1007/bf00420566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nitta, Tsuneo. "Speech recognition using continuous density hidden Markov models and the orthogonalizing Karhunen–Loeve transformations." Journal of the Acoustical Society of America 101, no. 1 (January 1997): 25. http://dx.doi.org/10.1121/1.418441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Szlachetko, Jakub, Adam Kubas, Anna Maria Cieślak, Kamil Sokołowski, Łukasz Mąkolski, Joanna Czapla-Masztafiak, Jacinto Sá, and Janusz Lewiński. "Hidden gapless states during thermal transformations of preorganized zinc alkoxides to zinc oxide nanocrystals." Materials Horizons 5, no. 5 (2018): 905–11. http://dx.doi.org/10.1039/c8mh00106e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lewis, Justin. "Divine gender transformations in Rebbe Nahman of Bratslav." Nordisk Judaistik/Scandinavian Jewish Studies 26, no. 1-2 (September 1, 2008): 29–48. http://dx.doi.org/10.30752/nj.69616.

Full text
Abstract:
In several passages in the tales and teachings of Rebbe Nahman of Bratslav, the divine undergoes a process of gender transformation. “The holy one blessed be he”, becomes female, and the Shekhinah temporarily takes on a male persona. Characterizations of Hasidic thought as androcentric generally apply to R’ Nahman. There is an accepted hierarchy and polarization of gender which informs much of his oeuvre. This article argues, however, that in these particular passages R’ Nahman disrupts this hierarchy. Whereas Kabbalah and Hasidism normally view the feminine as an outer “garment” for the divine masculine, in these passages the devotee discovers the hidden inwardness of God, which turns out to be feminine. This radical imagery is nourishing for followers of R’ Nahman’s controversial brand of Hasidism. In particular, it provides a theological justification for their unexpectedly intimate encounters with the divine, as they engage in the meditative practice of personal, solitary prayer according to R’ Nahman’s directives.
APA, Harvard, Vancouver, ISO, and other styles
29

GAO, YA-JUN. "EXTENDED DOUBLE LINEAR SYSTEMS AND NEW INFINITE-DIMENSIONAL DOUBLE HIDDEN SYMMETRIES FOR STRING EFFECTIVE ACTION." Modern Physics Letters A 24, no. 04 (February 10, 2009): 311–20. http://dx.doi.org/10.1142/s0217732309026796.

Full text
Abstract:
Symmetries of the string effective action describing the coupled gravity, dilaton and Kalb–Ramond fields (called EDKR theory for brevity) are studied. A previously proposed extended double-complex method is used and some double structures of the dimensionally reduced (from (2+d)-dim to 2-dim) EDKR theory are found. A 2d × 2d matrix double-complex H-potential is constructed and the field equations are extended to a double-complex formulation. Moreover, a pair of extended double-complex Hauser–Ernst-type linear systems are established, and based on these linear systems, explicit formulations of new hidden double symmetry transformations for the EDKR theory are given. These symmetry transformations constitute double infinite-dimensional Lie algebras, each of which is a semidirect product of the Kac–Moody [Formula: see text] and Virasoro algebras (without center charges). These results demonstrate that the EDKR theory under consideration possesses richer symmetry structures than previously expected.
APA, Harvard, Vancouver, ISO, and other styles
30

Shipovalova, Lada V. "Scientific-technical revolution — important lessons of unimportant concept." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 36, no. 2 (2020): 313–25. http://dx.doi.org/10.21638/spbu17.2020.209.

Full text
Abstract:
This paper focuses on the concept of the scientific-technical revolution. This concept is relevant today most of all in the context of historiographic studies of the Soviet period or the reflection of contemporary technological transformation from the Marxist position. The article demonstrates its relevance in the context of important contemporary issues. For a conceptual framework, the author uses the works on the social history of science by J. D. Bernal, the contemporary studies of science, technology and society, and the critical theory of technology, which seeks to integrate the philosophy of science and technology into topical socio-political discussions. The author reveals the concept of the scientific-technical revolution as describing the radical transformations taking place since the beginning of the 20 th century in science, society, and technology. These transformations manifest the essential social and technological character of science and its previously hidden contradiction. The social character of science involves an increasing number of participants of these transformations, but the technological character leaves them passive objects of the efficiency requirements. However, the scientific-technical revolution offers a lesson in overcoming this contradiction, creating conditions for the activity of various participants — scientists, nature, lay experts, and technologies themselves. The emphasis on the radical revolutionary changes that have occurred with science allows us to keep in the spotlight the foundations of modern problems and how to solve them.
APA, Harvard, Vancouver, ISO, and other styles
31

Kuznetsov, A. A., and G. V. Kononchenko. "Steganographic methods in vector graphics." Radiotekhnika, no. 205 (July 2, 2021): 32–41. http://dx.doi.org/10.30837/rt.2021.2.205.03.

Full text
Abstract:
Various steganographic techniques are used to hide information. Usually, information is hidden in images, audio and video files, text documents, and the like. The article deals with vector images consisting of various mathematical objects (points, lines, curves of the first and second order, Bezier curves, nodes, tangents, base points, etc.). Information hiding techniques alter these mathematical objects, for example, by encoding the coordinates of the base points. The most successful for carrying out steganographic transformations is the SVG vector graphics format, which, due to its structure, makes it easy to manipulate the objects of which it consists. Its broad support across platforms also allows for increased secrecy when transferring sensitive data by sending seemingly ordinary media files. The article discusses two methods (bitwise and the method of patterns) of hiding information in vector images, studied their features, advantages and disadvantages. Various affine transformations that can be used to disrupt the operation of the steganosystem were also investigated. The most common types of affine transformations are the operations of transfer, rotation, shift and scaling with possible variations (offsets along the abscissa and ordinate axes, proportional and non-proportional scaling, with compression and expansion). Most of the methods for embedding information into vector images provide a one-time resistance to affine transformations, while the repeated imposition of operations for changing the position of objects may destroy the message altogether. The methods investigated in the work (bitwise and the method of patterns) implement a higher level of resistance to various kinds of transformations when they are repeated many times, and the conducted experiments clearly demonstrate this. The results obtained show that vector images can indeed be used to hide information, but the resistance against certain affine attacks is not always high.
APA, Harvard, Vancouver, ISO, and other styles
32

Wu, Samuel S., Shigang Chen, Deborah L. Burr, and Long Zhang. "A New Data Collection Technique for Preserving Privacy." Journal of Privacy and Confidentiality 7, no. 3 (February 2, 2018): 99–129. http://dx.doi.org/10.29012/jpc.v7i3.408.

Full text
Abstract:
A major obstacle that hinders medical and social research is the lack of reliable data due to people's reluctance to reveal private information to strangers. Fortunately, statistical inference always targets a well-defined population rather than a particular individual subject and, in many current applications, data can be collected using a web-based system or other mobile devices. These two characteristics enable us to develop a data collection method, called triple matrix-masking (TM$^2$), which offers strong privacy protection with an immediate matrix transformation so that even the researchers cannot see the data, and then further uses matrix transformations to guarantee that the data will still be analyzable by standard statistical methods. The entities involved in the proposed process are a masking service provider who receives the initially masked data and then applies another mask, and the data collectors who partially decrypt the now doubly masked data and then apply a third mask before releasing the data to the public. A critical feature of the method is that the keys to generate the matrices are held separately. This ensures that nobody sees the actual data, but because of the specially designed transformations, statistical inference on parameters of interest can be conducted with the same results as if the original data were used. Hence the TM$^2$ method hides sensitive data with no efficiency loss for statistical inference of binary and normal data, which improves over Warner's randomized response technique. In addition, we add several features to the proposed procedure: an error checking mechanism is built into the data collection process in order to make sure that the masked data used for analysis are an appropriate transformation of the original data; and a partial masking technique is introduced to grant data users access to non-sensitive personal information while sensitive information remains hidden.
APA, Harvard, Vancouver, ISO, and other styles
33

Singh, Satvir. "Efficient Steganography Algorithm Based On DCT And Entropy Thresholding Technique." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (February 3, 2018): 45. http://dx.doi.org/10.23956/ijarcsse.v8i1.483.

Full text
Abstract:
Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency AC coefficients of the block. Before we insert the secret message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure.
APA, Harvard, Vancouver, ISO, and other styles
34

Pardede, Hilman F., Asri R. Yuliani, and Rika Sustika. "Convolutional Neural Network and Feature Transformation for Distant Speech Recognition." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5381. http://dx.doi.org/10.11591/ijece.v8i6.pp5381-5388.

Full text
Abstract:
In many applications, speech recognition must operate in conditions where there are some distances between speakers and the microphones. This is called distant speech recognition (DSR). In this condition, speech recognition must deal with reverberation. Nowadays, deep learning technologies are becoming the the main technologies for speech recognition. Deep Neural Network (DNN) in hybrid with Hidden Markov Model (HMM) is the commonly used architecture. However, this system is still not robust against reverberation. Previous studies use Convolutional Neural Networks (CNN), which is a variation of neural network, to improve the robustness of speech recognition against noise. CNN has the properties of pooling which is used to find local correlation between neighboring dimensions in the features. With this property, CNN could be used as feature learning emphasizing the information on neighboring frames. In this study we use CNN to deal with reverberation. We also propose to use feature transformation techniques: linear discriminat analysis (LDA) and maximum likelihood linear transformation (MLLT), on mel frequency cepstral coefficient (MFCC) before feeding them to CNN. We argue that transforming features could produce more discriminative features for CNN, and hence improve the robustness of speech recognition against reverberation. Our evaluations on Meeting Recorder Digits (MRD) subset of Aurora-5 database confirm that the use of LDA and MLLT transformations improve the robustness of speech recognition. It is better by 20% relative error reduction on compared to a standard DNN based speech recognition using the same number of hidden layers.
APA, Harvard, Vancouver, ISO, and other styles
35

Zheng, Rong Shu, Xin Min Dong, Wang Sheng Hao, Yan Li, and Rui Xin Wang. "Application of Hidden Markov Models in Ball Mill Gearbox for Fault Diagnosis." Advanced Materials Research 842 (November 2013): 401–4. http://dx.doi.org/10.4028/www.scientific.net/amr.842.401.

Full text
Abstract:
In this paper, a ball mill gear reducer was regarded as the research object. Based on the HMM pattern recognition theory, DHMM methods that were used in fault diagnosis had been researched. The vibration signal was required a series transformations which are feature extraction, normalization, scalarization and quantization to get the sequence collections. Then the quantified sequence collections were trained to get the DHMM parameter, or the Viterbi Algorithm which was used for the quantified sequence collections to calculate the maximum probability, thereby the DHMM fault models library was established or the type of fault was recognized. Experiments of five kinds of fault model diagnosis were carried out in this article.
APA, Harvard, Vancouver, ISO, and other styles
36

Goyena, Alberto. "Architecture inside out: urban transformations through the perception of demolition engineers." Vibrant: Virtual Brazilian Anthropology 8, no. 2 (December 2011): 580–608. http://dx.doi.org/10.1590/s1809-43412011000200028.

Full text
Abstract:
The present article is an ethnographic journey into the universe of techniques and rituals undertaken by companies geared to the demolition of architectural constructions. Viewed by many, more often than not, as merely brutal and even outrageous, the task of destroying is herein discussed in its material and symbolic complexity. Just as the act of building assumes a way of understanding and qualifying space in accordance with a set of social norms, the act of demolishing is, in and of itself, ruled by beliefs and cosmologies that vary a great deal from one context to the other. It will be suggested that the destroyer of walls and his sledgehammer may just as well unveil “history” and “heritage”, hidden in the midst of bricks, that even the most seasoned preservationist would not have even dreamt possible.
APA, Harvard, Vancouver, ISO, and other styles
37

MAHJOUB, MOHAMED ALI, and MALEK ABBASSI. "3D MESH OBJECT RETRIEVAL BY DISCRETE AND CONTINUOUS HIDDEN MARKOV MODELS." International Journal of Image and Graphics 12, no. 04 (October 2012): 1250022. http://dx.doi.org/10.1142/s0219467812500222.

Full text
Abstract:
Research in databases of three-dimensional (3D) objects is a special area of research in our community. This paper is in this context and more generally in information retrieval by content. In this context, the authors are particularly interested in the indexing of 3D objects, which aims to characterize the shape of objects, to allow comparison between models. The 3D shape descriptor is presented and, based on the distribution of cords. To make the descriptor invariant to geometric transformations of space, a normalization step is applied to the object, as a preprocessing step. The work is, therefore, to develop a system for indexing and searching databases of 3D objects. The hidden Markov models are well suited to for this indexing system. Using these tools, a system for learning and recognizing of 3D objects is built.
APA, Harvard, Vancouver, ISO, and other styles
38

Shishlova, E. E. "Updating the Content of Higher Education in the Context of Modern Sociocultural Trends." Vysshee Obrazovanie v Rossii = Higher Education in Russia 30, no. 6 (July 8, 2021): 70–79. http://dx.doi.org/10.31992/0869-3617-2021-30-6-70-79.

Full text
Abstract:
In the article, on the basis of the culturological concept of the content of education as an adapted social experience, as well as the practice of its implementation in vocational training as purposeful and declared, the essence of its explicit, hidden and implicit components is differentiated for the first time. The leading role of the hidden content of education in the transmission of sociocultural values is revealed, which ensures the formation of the value-worldview characteristics of the personality of a competent graduate, capable of effective professional activity in the conditions of sociocultural transformations of the postindustrial era. The dynamic structure of the hidden education content is revealed, which includes communicative and subject components and which made it possible to determine the directions of its update by the sociocultural aspect. The update of the education content in the context of the growing role of the cultural factor in social development is realized through the sociocultural reflection of the transmitted social experience, for the development of which the diagnostic-forming methodology “My sociocultural values” has been developed. As a result of the update of the hidden education content by the sociocultural aspect, it is transformed into an implicit (updated hidden), which, while not being declared, but being adapted and purposeful in reflecting and translating sociocultural experience, improves the training of specialists in various directions and profiles, implements the leading principle of higher education.
APA, Harvard, Vancouver, ISO, and other styles
39

GAO, YA-JUN. "EXTENDED DOUBLE-COMPLEX LINEAR SYSTEMS AND NEW DOUBLE INFINITE-DIMENSIONAL HIDDEN SYMMETRIES FOR THE EINSTEIN–KALB–RAMOND THEORY." International Journal of Modern Physics A 23, no. 03n04 (February 10, 2008): 491–507. http://dx.doi.org/10.1142/s0217751x08038147.

Full text
Abstract:
By using a so-called extended double (ED)-complex method, the previously found doubleness symmetry of the dimensionally reduced Einstein–Kalb–Ramond (EKR) theory is further exploited. A 2d × 2d matrix double-complex H-potential is constructed and the field equations are written in a double-complex formulation. A pair of ED-complex Hauser–Ernst-type linear systems are established. Based on these linear systems, explicit formulations of new double hidden symmetry transformations for the EKR theory are given. These symmetry transformations are verified to constitute double infinite-dimensional Lie algebras, each of which is a semidirect product of the Kac–Moody [Formula: see text] and Virasoro algebras (without center charges). These results demonstrate that the EKR theory under consideration possesses richer symmetry structures than previously expected, and the ED-complex method is necessary and more effective.
APA, Harvard, Vancouver, ISO, and other styles
40

NITTA, TOHRU. "THE UNIQUENESS THEOREM FOR COMPLEX-VALUED NEURAL NETWORKS WITH THRESHOLD PARAMETERS AND THE REDUNDANCY OF THE PARAMETERS." International Journal of Neural Systems 18, no. 02 (April 2008): 123–34. http://dx.doi.org/10.1142/s0129065708001439.

Full text
Abstract:
This paper will prove the uniqueness theorem for 3-layered complex-valued neural networks where the threshold parameters of the hidden neurons can take non-zeros. That is, if a 3-layered complex-valued neural network is irreducible, the 3-layered complex-valued neural network that approximates a given complex-valued function is uniquely determined up to a finite group on the transformations of the learnable parameters of the complex-valued neural network.
APA, Harvard, Vancouver, ISO, and other styles
41

Lamprecht, Mariusz. "Hidden properties of city plans: A case study of Łódź." European Spatial Research and Policy 27, no. 2 (December 30, 2020): 199–220. http://dx.doi.org/10.18778/1231-1952.27.2.12.

Full text
Abstract:
The article analyses the transformations and the internal diversity of the oldest urban structures of central Łódź, one of the biggest Polish cities. 19th-century Łódź was one of the greatest centres of the textile industry in Europe. Currently, the city faces major challenges, including a dramatic population decrease, population ageing as well as a vast revitalisation of urban structures aimed at reinforcing the new idea of the city’s inward development. The research on the layout of Łódź is based on the modern image of the city as well as four images preserved in historical plans. The subsequent, chronological models are analysed in terms of topological features with the use of space syntax methods. The conducted research made it possible to identify the internal, configurational diversity of the historic urban core of Łódź. A seemingly monotonous, orthogonal urban layout is, from a topological perspective, highly diversified. Due to the actions undertaken in Łódź and aimed at restoring urban structures in the broad sense, the study not only has a cognitive goal, but it also carries a practical context.
APA, Harvard, Vancouver, ISO, and other styles
42

Gardner, Brian, Ioana Sporea, and André Grüning. "Learning Spatiotemporally Encoded Pattern Transformations in Structured Spiking Neural Networks." Neural Computation 27, no. 12 (December 2015): 2548–86. http://dx.doi.org/10.1162/neco_a_00790.

Full text
Abstract:
Information encoding in the nervous system is supported through the precise spike timings of neurons; however, an understanding of the underlying processes by which such representations are formed in the first place remains an open question. Here we examine how multilayered networks of spiking neurons can learn to encode for input patterns using a fully temporal coding scheme. To this end, we introduce a new supervised learning rule, MultilayerSpiker, that can train spiking networks containing hidden layer neurons to perform transformations between spatiotemporal input and output spike patterns. The performance of the proposed learning rule is demonstrated in terms of the number of pattern mappings it can learn, the complexity of network structures it can be used on, and its classification accuracy when using multispike-based encodings. In particular, the learning rule displays robustness against input noise and can generalize well on an example data set. Our approach contributes to both a systematic understanding of how computations might take place in the nervous system and a learning rule that displays strong technical capability.
APA, Harvard, Vancouver, ISO, and other styles
43

Stolorow, Robert D. "Review of Magai & Haviland-Jones (2002): The hidden genius of emotion: Lifespan transformations of personality." Consciousness & Emotion 4, no. 1 (November 4, 2003): 148–50. http://dx.doi.org/10.1075/ce.4.1.14sto.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

KOGAN, IAN I. "AREA-PRESERVING DIFFEOMORPHISMS, W∞ AND ${\mathcal U}_q [{\rm sl}(2)]$ IN CHERN–SIMONS THEORY AND THE QUANTUM HALL SYSTEM." International Journal of Modern Physics A 09, no. 21 (August 20, 1994): 3887–911. http://dx.doi.org/10.1142/s0217751x94001564.

Full text
Abstract:
We discuss a quantum [Formula: see text] symmetry in the Landau problem, which naturally arises due to the relation between [Formula: see text] and the group of magnetic translations. The latter is connected with W∞ and area-preserving (symplectic) diffeomorphisms which are the canonical transformations in the two-dimensional phase space. We shall discuss the hidden quantum symmetry in a 2 + 1 gauge theory with the Chern–Simons term and in a quantum Hall system, which are both connected with the Landau problem.
APA, Harvard, Vancouver, ISO, and other styles
45

Schaefer, Sagi. "Hidden Behind the Wall: West German State Building and the Emergence of the Iron Curtain." Central European History 44, no. 3 (September 2011): 506–35. http://dx.doi.org/10.1017/s0008938911000410.

Full text
Abstract:
It is widely accepted that the inter-German border was constructed by East German authorities to halt the emigration to the west, which had damaged the East German economy and undermined the East German state agencies' power. This article argues that this is an inaccurate understanding, which mistakenly treats perceptions and insights gained from studying the Berlin Wall as representative of the mostly rural border between East and West Germany. It emphasizes crucial transformations of frontier society during the 1950s, highlighting the important role of western as well as eastern policy in shaping them.
APA, Harvard, Vancouver, ISO, and other styles
46

LECHTENFELD, OLAF, and ALEXANDER D. POPOV. "CLOSED N=2 STRINGS: PICTURE-CHANGING, HIDDEN SYMMETRIES AND SDG HIERARCHY." International Journal of Modern Physics A 15, no. 26 (October 20, 2000): 4191–236. http://dx.doi.org/10.1142/s0217751x00001865.

Full text
Abstract:
We study the action of picture-changing and spectral flow operators on a ground ring of ghost number zero operators in the chiral BRST cohomology of the closed N=2 string and describe an infinite set of symmetry charges acting on physical states. The transformations of physical string states are compared with symmetries of self-dual gravity which is the effective field theory of the closed N=2 string. We derive all infinitesimal symmetries of the self-dual gravity equations in (2+2)-dimensional space–time and introduce an infinite hierarchy of commuting flows on the moduli space of self-dual metrics. The dependence on moduli parameters can be recovered by solving the equations of the SDG hierarchy associated with an infinite set of Abelian symmetries generated recursively from translations. These nonlocal Abelian symmetries are shown to coincide with the hidden Abelian string symmetries responsible for the vanishing of most scattering amplitudes. Therefore, N=2 string theory "predicts" not only self-dual gravity but also the SDG hierarchy.
APA, Harvard, Vancouver, ISO, and other styles
47

Brizhak, Olga V., and Alexandr A. Ermolenko. "The Idea of Noosphere in the Сontext of Modern Transformations." Economics of Contemporary Russia, no. 1 (April 6, 2020): 22–32. http://dx.doi.org/10.33293/1609-1442-2020-1(88)-22-32.

Full text
Abstract:
The idea of a noosphere for the first time formulated in V. Vernadsky's works in the 1940s in the recent years attracts attention of participants of the different trends of scientific search as it has the considerable hidden potential in a research of modern transformations. The creator of a noosphere – the Humanity, presented as the powerful geological force allocated with consciousness, getting to know and transforming the Nature itself is involved in deep transformations many results of which are unexpected for him and bring him problems and additional obligations. Effective implementation of informative opportunities of the idea of a noosphere assumes expansion of space of scientific search and overcoming cross-disciplinary borders. At the focus of research of authors: representation of a noosphere as the system endowed with the energy which generate other types of energy and involved in the difficult process of transformation of energy proceeding in space; structure of a noosphere and its basic components; a problem of responsibility of the Humanity in all its subject forms by results of activity, including, responsibility in its noosphere scale, creation of adequate mechanisms of implementation of such responsibility in the conditions of forming of the global market. The chimeric entities and the anti-systems accompanying them arise in the movement of a noosphere. Through the optics of the idea of a noosphere authors consider key problem nodes and contradictions of modern conversions, estimate the effects arising at the different levels of these processes, offer applied means for a solution of the tasks rising here. Article provides recommendations on upgrading the state policy in social and economic transformations. The authors’ results belong to one of the new and perspective directions of cross-disciplinary scientific search that causes essential novelty and the debatable nature of the provisions presented in article, conclusions and recommendations. During the research heuristic resources of a number of modern scientific theories were used: biospheres, passionarity, cognitive economy, social and economic transformations, human capital, ecology, etc.
APA, Harvard, Vancouver, ISO, and other styles
48

STROBL, THOMAS. "ALL SYMMETRIES OF NONEINSTEINIAN GRAVITY IN d=2." International Journal of Modern Physics A 08, no. 08 (March 30, 1993): 1383–97. http://dx.doi.org/10.1142/s0217751x93000576.

Full text
Abstract:
The covariant form of the field equations for two-dimensional R2-gravity with torsion as well as its Hamiltonian formulation are shown to suggest the choice of the light-cone gauge. Further a one-to-one correspondence between the Hamiltonian gauge symmetries and the diffeomorphisms and local Lorentz transformations is established, thus proving that there are no hidden local symmetries responsible for the complete integrability of the model. Finally the constraint algebra is shown to have no quantum anomalies so that Dirac’s quantization should be applicable.
APA, Harvard, Vancouver, ISO, and other styles
49

Fitzgerald, Des. "What was sociology?" History of the Human Sciences 32, no. 1 (February 2019): 121–37. http://dx.doi.org/10.1177/0952695118808935.

Full text
Abstract:
This article is about the future of sociology, as transformations in the digital and biological sciences lay claim to the discipline’s jurisdictional hold over ‘the social’. Rather than analyse the specifics of these transformations, however, the focus of the article is on how a narrative of methodological crisis is sustained in sociology, and on how such a narrative conjures very particular disciplinary futures. Through a close reading of key texts, the article makes two claims: (1) that a surprisingly conventional urge towards disciplinary reproduction often animates accounts of sociology’s crisis; (2) that, even more surprisingly, these same accounts are often haunted by a hidden metaphorical architecture centred on biology, vitality, vigour and life. The central gambit of the article is that, perhaps in spite of itself, this subterranean image of life actually hints at less reproductively conventional ways of understanding – and intervening in – sociology’s methodological ‘crisis’. Drawing, empirically, on the author’s recent work on urban stress and, theoretically, on Stefan Helmreich’s (2011, 2016) account of ‘limit biologies’, the articles ends with a call for a ‘limit sociology’ – a form of attention that could, similarly, expand rather than contract the present moment of transformation. At the heart of the article is a hope that thinking with such a limit may help sociologists to imagine a less deadening future than that on offer from a canonised discipline cathected by endless crisis-talk.
APA, Harvard, Vancouver, ISO, and other styles
50

Alabugin, Igor, Edgar Gonzalez-Rodriguez, Rahul Kawade, Aleksandr Stepanov, and Sergei Vasilevsky. "Alkynes as Synthetic Equivalents of Ketones and Aldehydes: A Hidden Entry into Carbonyl Chemistry." Molecules 24, no. 6 (March 15, 2019): 1036. http://dx.doi.org/10.3390/molecules24061036.

Full text
Abstract:
The high energy packed in alkyne functional group makes alkyne reactions highly thermodynamically favorable and generally irreversible. Furthermore, the presence of two orthogonal π-bonds that can be manipulated separately enables flexible synthetic cascades stemming from alkynes. Behind these “obvious” traits, there are other more subtle, often concealed aspects of this functional group’s appeal. This review is focused on yet another interesting but underappreciated alkyne feature: the fact that the CC alkyne unit has the same oxidation state as the -CH2C(O)- unit of a typical carbonyl compound. Thus, “classic carbonyl chemistry” can be accessed through alkynes, and new transformations can be engineered by unmasking the hidden carbonyl nature of alkynes. The goal of this review is to illustrate the advantages of using alkynes as an entry point to carbonyl reactions while highlighting reports from the literature where, sometimes without full appreciation, the concept of using alkynes as a hidden entry into carbonyl chemistry has been applied.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography