scholarly journals The Gaia-ESO Survey: Target selection of open cluster stars

Author(s):  
A. Bragaglia ◽  
E. Alfaro ◽  
E. Flaccomio ◽  
2013 ◽  
Vol 734-737 ◽  
pp. 3071-3074
Author(s):  
Guo Dong Zhang ◽  
Zhong Liu

Aiming at the phenomenon that the chaff and corner reflector released by surface ship can influence the selection of missile seeker, this paper proposed a multi-target selection method based on the prior information of false targets distribution and Support Vector Machine (SVM). By analyzing the false targets distribution law we obtain two classification principles, which are used to train the SVM studies the true and false target characteristics. The trained SVM is applied to the seeker in the target selection. This method has advantages of simple programming and high classification accuracy, and the simulation experiment in this paper confirms the correctness and effectiveness of this method.


2006 ◽  
Vol 18 (6) ◽  
pp. 880-888 ◽  
Author(s):  
Markus Conci ◽  
Klaus Gramann ◽  
Hermann J. Müller ◽  
Mark A. Elliott

Illusory figure completion demonstrates the ability of the visual system to integrate information across gaps. Mechanisms that underlie figural emergence support the interpolation of contours and the filling-in of form information [Grossberg, S., & Mingolla, E. Neural dynamics of form perception: Boundary completion, illusory figures and neon colour spreading. Psychological Review, 92, 173–211, 1985]. Although both processes contribute to figure formation, visual search for an illusory target configuration has been shown to be susceptible to interfering form, but not contour, information [Conci, M., Müller, H. J., & Elliott, M. A. The contrasting impact of global and local object attributes on Kanizsa figure detection. Submitted]. Here, the physiological basis of form interference was investigated by recording event-related potentials elicited from contour- and surface-based distracter interactions with detection of a target Kanizsa figure. The results replicated the finding of form interference and revealed selection of the target and successful suppression of the irrelevant distracter to be reflected by amplitude differences in the N2pc component (240–340 msec). In conclusion, the observed component variations reflect processes of target selection on the basis of integrated form information resulting from figural completion processes.


Author(s):  
SERGEY I. ROMANOV ◽  

The article deals with a special type of euphemisms-amulets, that is, linguocultural units endowed with the function of protection. There are two types of euphemisms-amulets from the point of view of relevance: obsolete and current units. Obsolete euphemisms- amulets have targets that are not recognized as dangerous by the modern linguistic and cultural community. Current euphemisms-amulets, although not always consciously, are used by representatives of the modern Russian linguistic and cultural community to protect against something bad. The paper establishes that the use of the euphemism-amulet is based on the transla- tion of the target's representation into another cultural code. The work reveals that the euphemisms-amulets are directed not to mitigate an unwanted nomination but how to replace it. An undesirable nomination is endowed with negative magical properties, which is why the linguocultural community imposes a ban on its use. A protective cultural function is superim- posed on the euphemism. The main pragmatic explanation for the use of the euphemism- amulet is the speaker's desire not to predict an encounter with an unwanted object, which is based on belief in the magical power of the word. The factors that determine the linguocultural specificity of euphemisms-amulets are revealed. The first factor is target selection. For the Russian linguocultural community, such targets include a totemic animal, evil forces representing another world, death. The second factor is the selection of nominations for the euphemistic function, which is determined by culturally marked background knowledge, ideas, and typical practices. The communicative- pragmatic platform for the use of euphemisms-amulets is the belief in the magical power of the word, in the fact that the use of the forbidden word can lead to negative consequences (in particular, to cause the appearance of something dangerous, undesirable). The work proves that the identified cultural factors are universal, based on universal archetypes: one's own / another's, permission / prohibition, life / death. At the same time, the fact of the appearance of the euphemism-amulet, the choice of its internal form is determined by national and cultural factors.


2015 ◽  
Vol 84 (1) ◽  
pp. 3-28 ◽  
Author(s):  
James A. Green ◽  
Christopher P.M. Waters

For self-defence actions to be lawful, they must be directed at military targets. The absolute prohibition on non-military targeting under the jus in bello is well known, but the jus ad bellum also limits the target selection of states conducting defensive operations. Restrictions on targeting form a key aspect of the customary international law criteria of necessity and proportionality. In most situations, the jus in bello will be the starting point for the definition of a military targeting rule. Yet it has been argued that there may be circumstances when the jus ad bellum and the jus in bello do not temporally or substantively overlap in situations of self-defence. In order to address any possible gaps in civilian protection, and to bring conceptual clarity to one particular dimension of the relationship between the two regimes, this article explores the independent sources of a military targeting rule. The aim is not to displace the jus in bello as the ‘lead’ regime on how targeting decisions must be made, or to undermine the traditional separation between the two ‘war law’ regimes. Rather, conceptual light is shed on a sometimes assumed but generally neglected dimension of the jus ad bellum’s necessity and proportionality criteria that may, in limited circumstances, have significance for our understanding of human protection during war.


Author(s):  
Henrik Skovsgaard ◽  
Kari-Jouko Räihä ◽  
Martin Tall

This chapter provides an overview of gaze-based interaction techniques. We will first explore specific techniques intended to make target selection easier and to avoid the Midas touch problem. We will then take a look at techniques that do not require the use of special widgets in the interface but instead manipulate the rendering on the basis of eye gaze to facilitate the selection of small targets. Dwell-based interaction makes use of fixations; recent research has looked into the other option, using saccades as the basis for eye gestures. We will also discuss examples of how eye gaze has been used with other input modalities (blinks and winks, keyboard and mouse, facial gestures, head movements, and speech) to speed up interaction. Finally, we will discuss examples of interaction techniques in the context of a specific area of application: navigating information spaces.


2002 ◽  
Vol 9 (4) ◽  
pp. 641-653 ◽  
Author(s):  
Alberto Mercatanti ◽  
Giuseppe Rainaldi ◽  
Laura Mariani ◽  
Roberto Marangoni ◽  
Lorenzo Citti

2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Mathias Vormehr ◽  
Barbara Schrörs ◽  
Sebastian Boegel ◽  
Martin Löwer ◽  
Özlem Türeci ◽  
...  

Advances in nucleic acid sequencing technologies have revolutionized the field of genomics, allowing the efficient targeting of mutated neoantigens for personalized cancer vaccination. Due to their absence during negative selection of T cells and their lack of expression in healthy tissue, tumor mutations are considered as optimal targets for cancer immunotherapy. Preclinical and early clinical data suggest that synthetic mRNA can serve as potent drug format allowing the cost efficient production of highly efficient vaccines in a timely manner. In this review, we describe a process, which integrates next generation sequencing based cancer mutanome mapping,in silicotarget selection and prioritization approaches, and mRNA vaccine manufacturing and delivery into a process we refer to as MERIT (mutanome engineered RNA immunotherapy).


2006 ◽  
Vol 2 (S235) ◽  
pp. 331-331 ◽  
Author(s):  
W. Schuster ◽  
R. Michel ◽  
W. Dias ◽  
T. Tapia-Peralta ◽  
R. Vázquez ◽  
...  

AbstractA CCD UBVRI survey of northern open clusters is being undertaken at San Pedro Mártir, México, and performed using always the same instrumental setup (telescope, CCD, filters), reduction methods, and system of standards of Landolt (1992). To date more than 300 clusters (mostly unstudied previously) have been observed, and about half the data reduced using aperture-photometry and PSF techniques. Our analysis procedures are being refined by studying in detail a small subset of these clusters. For example, the heavily reddened clusters Be80 and Be95 are being examined in the color-color diagrams: (B-V, U-B) and (B-V, R-I) to better understand the problems of curvature and variable reddening. For clusters for which our U data reaches the F-type stars, such as NGC2192 and NGC7296, techniques are being examined for estimating both the reddening E(B-V) and metallicity [Fe/H] via the use of the (U-B) excess. If the clusters also have “red clump” stars, such as NGC1798 and Do02, these procedures can be iterated between the clump and main sequence stars to establish even better the values of E(B-V) and [Fe/H]. Finally, color-magnitude diagrams, such as (B-V, V) and (V-I, V), are being employed together with the SchmidtKaler (1982) colors and Padova isochrones of Girardi et al. (2000) to obtain distances and ages for these clusters. A java-based computer program is being developed to help in the visualization and analysis of these photometric data. This system is capable of displaying each cluster simultaneously in different color-color and color-magnitude diagrams and has an interactive way to identify a star, or group of stars, in one diagram and to see were it falls in the other diagrams, facilitating the elimination of field stars and the apperception of cluster features. This program is capable of displaying up to 16 different diagrams for one cluster and processing up to 20 clusters at the same time. Our aims are the following: (1) a common UBVRI photometric scale for open clusters, (2) an atlas of color-color and color-magnitude diagrams for open clusters, (3) a homogeneous set of cluster reddenings, distances, and ages, (4) an increased number of old and distant open clusters, and (5) a selection of interesting clusters for further study.


Sign in / Sign up

Export Citation Format

Share Document