patterns

CMENAS and Georgia State University Lecture Series. Bridging the Gulf: Patterns in Contemporary story from Kuwait to Oman (November 14, 2024 3:00pm)

Event Begins: Thursday, November 14, 2024 3:00pm
Location: Off Campus Location
Organized By: Center for Middle Eastern and North African Studies


This presentation focuses on the importance of studying contemporary Gulf states. The definition of contemporary in this context considers the period starting from the early 1990s. The reason for this has to do with the collapse of the Soviet Union, regional changes like the invasion of Kuwait and its consequences, and the wider Middle Eastern regional consequences. The presentation also looks at the patterns that emerged in all Gulf states at the same time in different contexts: political, economic, and social.

Mahjoob Zweiri is a professor of contemporary politics and Middle Eastern history with a focus on Iran and the Gulf region. He was the director of the Gulf Studies Center at Qatar University from 2018 to 2024 and the head of the humanities department from 2011 to 2016. Before joining Qatar University in 2010, Zweiri was a senior researcher in Middle Eastern politics and Iran at the Center for Strategic Studies, University of Jordan. From March 2003 to December 2006, he was a research fellow and then director of the Centre for Iranian Studies in the Institute for Middle Eastern and Islamic Studies at Durham University. Zweiri has more than 95 publications in the areas of Iran, contemporary Middle Eastern history and politics, Gulf studies, social sciences in universities of the future, and artificial intelligence’s role in social sciences. In addition to Arabic, he is fluent in Farsi and English. Zweiri is the founder and editor of the *Journal of Gulf Studies*, published by Intellect, and editor of the book series *Contemporary Gulf States*. Currently, he is a visiting professor at the University of Michigan.

Register and attend over Zoom: https://myumi.ch/pkJWz.




patterns

Analyzing spatial patterns of thermal alteration in the Stikine and Wrangell terranes of the Canadian Cordillera using the conodont color alteration index (CAI) to identify hot spots and cold spots

Lei, J Z X; Golding, M L; Husson, J M. Geological Survey of Canada, Open File 8746, 2020, 43 pages, https://doi.org/10.4095/327243
<a href="https://geoscan.nrcan.gc.ca/images/geoscan/gid_327243.jpg"><img src="https://geoscan.nrcan.gc.ca/images/geoscan/gid_327243.jpg" title="Geological Survey of Canada, Open File 8746, 2020, 43 pages, https://doi.org/10.4095/327243" height="150" border="1" /></a>




patterns

Polyphase glacial dynamics and clast dispersal patterns in glaciofluvial and glacial sediments in north-central Quebec, with application to diamond exploration

Parent, M. Surficial geology of northern Canada: a summary of Geo-mapping for Energy and Minerals program contributions; by McMartin, I (ed.); Geological Survey of Canada, Bulletin 611, 2023 p. 201-219, https://doi.org/10.4095/331425
<a href="https://geoscan.nrcan.gc.ca/images/geoscan/gid_331425.jpg"><img src="https://geoscan.nrcan.gc.ca/images/geoscan/gid_331425.jpg" title="Surficial geology of northern Canada: a summary of Geo-mapping for Energy and Minerals program contributions; by McMartin, I (ed.); Geological Survey of Canada, Bulletin 611, 2023 p. 201-219, https://doi.org/10.4095/331425" height="150" border="1" /></a>




patterns

Dynamics of Saccade Trajectory Modulation by Distractors: Neural Activity Patterns in the Frontal Eye Field

The sudden appearance of a visual distractor shortly before saccade initiation can capture spatial attention and modulate the saccade trajectory in spite of the ongoing execution of the initial plan to shift gaze straight to the saccade target. To elucidate the neural correlates underlying these curved saccades, we recorded from single neurons in the frontal eye field of two male rhesus monkeys shifting gaze to a target while a distractor with the same eccentricity appeared either left or right of the target at various delays after target presentation. We found that the population level of presaccadic activity of neurons representing the distractor location encoded the direction of the saccade trajectory. Stronger activity occurred when saccades curved toward the distractor, and weaker when saccades curved away. This relationship held whether the distractor was ipsilateral or contralateral to the recorded neurons. Meanwhile, visually responsive neurons showed asymmetrical patterns of excitatory responses that varied with the location of the distractor and the duration of distractor processing relating to attentional capture and distractor inhibition. During earlier distractor processing, neurons encoded curvature toward the distractor. During later distractor processing, neurons encoded curvature away from the distractor. This was observed when saccades curved away from distractors contralateral to the recording site and when saccades curved toward distractors ipsilateral to the recording site. These findings indicate that saccadic motor planning involves dynamic push–pull hemispheric interactions producing attraction or repulsion for potential but unselected saccade targets.




patterns

Deciphering Peripheral Taste Neuron Diversity: Using Genetic Identity to Bridge Taste Bud Innervation Patterns and Functional Responses

Peripheral taste neurons exhibit functional, genetic, and morphological diversity, yet understanding how or if these attributes combine into taste neuron types remains unclear. In this study, we used male and female mice to relate taste bud innervation patterns to the function of a subset of proenkephalin-expressing (Penk+) taste neurons. We found that taste arbors (the portion of the axon within the taste bud) stemming from Penk+ neurons displayed diverse branching patterns and lacked stereotypical endings. The range in complexity observed for individual taste arbors from Penk+ neurons mirrored the entire population, suggesting that taste arbor morphologies are not primarily regulated by the neuron type. Notably, the distinguishing feature of arbors from Penk+ neurons was their propensity to come within 110 nm (in apposition with) different types of taste-transducing cells within the taste bud. This finding is contrary to the expectation of genetically defined taste neuron types that functionally represent a single stimulus. Consistently, further investigation of Penk+ neuron function revealed that they are more likely to respond to innately aversive stimuli—sour, bitter, and high salt concentrations—as compared with the full taste population. Penk+ neurons are less likely to respond to nonaversive stimuli—sucrose, umami, and low salt—compared with the full population. Our data support the presence of a genetically defined neuron type in the geniculate ganglion that is responsive to innately aversive stimuli. This implies that genetic expression might categorize peripheral taste neurons into hedonic groups, rather than simply identifying neurons that respond to a single stimulus.




patterns

The Subtle Power of Spiritual Abuse By David Johnson and Jeff Vanvonderen (Bethany House, 1991, 2005) 235 pages -- The Subtle Power of Spiritual Abuse discusses unhealthy spiritual patterns in a constructive and helpful way - There are many books that att

But this book by Johnson and Vanvonderen is different. Drawing upon years of ministry experience as pastor and counselor (respectively), they examine the fine line between Biblical leadership and abuse. Without mentioning groups or demonizing those involved, they discuss how well-intentioned leadership can have abusive effects. This "high road" approach is highly helpful in identifying some of the critical factors that have led to harsh and harmful leadership in churches. -- Marks of a Spiritually Unhealthy Environment: For example, the authors identify the marks of a spiritually unhealthy system. I'd like to include these here as a sample of how the authors address these issues. (The following consists of verbatim citations of copyrighted material from Chapter 5,6 of "The Subtle Power of Spiritual Abuse.") -- 1. Power-Posturing: Power-posturing simply means leaders spend a lot of time focused on their own authority and reminding others of it, as well. They spend a lot of energy posturing about how much authority they have and how much everyone else is supposed to submit to it. The fact that they are eager to place people under them-- under their word, under their "authority"-- is one easy-to-spot clue that they are operating in their own authority. -- 2. Performance Preoccupation: In abusive spiritual systems, power is postured and authority is legislated. Therefore, these systems are preoccupied with the performance of their members. Obedience and submission are two important words often used. The way to tell if someone is doing the right thing for the wrong reason is if they are keeping track of it. Let's say that another way. If obedience and service is flowing out of you as a result of your own dependence on God alone, you won't keep track of it with an eye toward reward, you'll just do it. But if you're preoccupied with whether you've done enough to please God, then you're not looking at Him, you're looking at your own works. And you're also concerned about who else might be looking at you, evaluating you. What would anyone keep track of their godly behavior unless they were trying to earn spiritual points because of it? For many reasons, followers sometimes obey or follow orders to avoid being shamed, to gain someone's approval, or to keep their spiritual status or position intact. This is not true obedience or submission, it is compliant self-seeking. When behavior is simply legislated from the outside, instead of coming from a heart that loves God, it cannot be called obedience. It is merely weak compliance to some form of external pressure. -- 3. Unspoken Rules: In abusive spiritual systems, people's lives are controlled from the outside in by rules, spoken and unspoken. Unspoken rules are those that govern unhealthy churches or families but are not said out loud. Because they are not said out loud, you don't find out that they're there until you break them. The most powerful of all unspoken rules in the abusive system is what we have already termed the "can't talk" rule. The "can't talk" [rule] has this thinking behind it: "The real problem cannot be exposed because then it would have to be dealt with and things would have to change; so it must be protected behind walls of silence (neglect) or by assault (legalistic attack). If you speak about the problem, you are the problem. -- 4. Lack of Balance: The fourth characteristic of a spiritual abusive system is an unbalanced approach to living out the truth of the Christian life. This shows itself in two extremes: Extreme Objectivism - The first extreme is an empirical approach to life, which elevates objective truth to the exclusion of valid subjective experience. This approach to spirituality creates a system in which authority is based upon the level of education and intellectual capacity alone, rather than on intimacy with God, obedience and sensitivity to His Spirit. Extreme Subjectivism - The other manifestation of lack of balance is seen in an extremely subjective approach to the Christian life. What is true is decided on the basis of feelings and experiences, giving more weight to them than what the Bible declares. In this system, people can't know or understand truths (even if they really do understand or know them) until the leaders "receive them by spiritual revelation from the Lord" and "impart" them to the people. In such systems, it is more important to act according to the word of a leader who has "a word" for you than to act according to what you know to be true from Scripture, or simply from your spiritual growth-history. As with the extreme objective approach, Christians who are highly subjective also have a view of education-- most often, that education is bad or unnecessary. There is almost a pride in not being educated, and a disdain for those who are. Everything that is needed is taught through the Holy Spirit. ("After all, Peter and Timothy didn't go to college or seminary...") -- 5. Paranoia: In the church that is spiritually abusive, there is a sense, spoken or unspoken, that "others will not understand what we're all about, so let's not let them know-- that way they won't be able to ridicule or persecute us." There is an assumption that (1) what we say, know, or do is a result of our being more enlightened that others; (2) others will not understand unless they become one of us; and (3) others will respond negatively. In a place where authority is grasped and legislated, not simply demonstrated, persecution sensitivity builds a case for keeping everything within the system. Why? Because of the evil, dangerous, or unspiritual people outside of the system who are trying to weaken or destroy "us." This mentality builds a strong wall or bunker around the abusive system, isolates the abusers from scrutiny and accountability, and makes it more difficult for people to leave-- because they will then be outsiders too. While it is true that there is a world of evil outside of the system, there is also good out there. But people are misled into thinking that the only safety is in the system. Ironically, Jesus and Paul both warned that one of the worst dangers to the flock was from wolves in the house (Matthew 10:16, Acts 20:29-30). -- 6. Misplaced Loyalty: The next characteristic of spiritually abusive systems is that a misplaced sense of loyalty is fostered and even demanded. We're not talking about loyalty to Christ, but about loyalty to a given organization, church, or leader. Once again, because authority is assumed or legislated (and therefore not real), following must be legislated as well. A common way this is accomplished is by setting up a system where disloyalty to or disagreement with the leadership is construed as the same thing as disobeying God. Questioning leaders is equal to questioning God. "We Alone Are Right" There are three factors that come into place here, adding up to a misplaced loyalty. First, leadership projects a "we alone are right" mentality, which permeates the system. Members must remain in the system if they want to be "safe," or to stay "on good terms" with God, or not be viewed as wrong or "backslidden." - Scare Tactics - The second factor that brings about misplaced loyalty is the use of "scare tactics." We're already seen this in some of the paranoia described in the last section. Scare tactics are more serious. This is more than just the risk of being polluted by the world. We have counseled many Christians who, after deciding to leave their church, were told horrifying things. "God is going to withdraw His Spirit from you and your family." "God will destroy your business." "Without our protection, Satan will get your children." "You and your family will come under a curse." This is spiritual blackmail and it's abuse. And it does cause people to stay in abusive places. - Humiliation - The third method of calling forth misplaced loyalty is the threat of humiliation. This is done by publicly shaming, exposing, or threatening to remove people from the group. Unquestionably, there is a place for appropriate church discipline. In the abusive system, it is the fear of being exposed, humiliated or removed that insures your proper allegiance, and insulates those in authority. You can be "exposed" for asking too many questions, for disobeying the unspoken rules, or for disagreeing with authority. People are made public examples in order to send a message to those who remain. Others have phone campaigns launched against them, to warn their friends and others in the group about how "dangerous" they are. -- 7. Secretive: When you see people in a religious system being secretive-- watch out. People don't hide what is appropriate; they hide what is inappropriate. One reason spiritual abusive families and churches are secretive is because they are so image conscious. People in these systems can't even live up to their own performance standards, so they have to hide what is real. Some believe they must do this to protect God's good name. So how things look and what others think becomes more important than what's real. They become God's "public relations agents." The truth is, He's not hiring anyone for this position. Another reason for secrecy in a church is that the leadership has a condescending, negative view of the laity. This results in conspiracies on the leadership level. They tell themselves, "People are not mature enough to handle truth." This is patronizing at best. Conspiracies also develop among the lay people. Since it is not all right [sic] to notice or talk about problems, people form conspiracies behind closed doors and over the telephone as they try to solve things informally. But since they have no authority, they solve, and solve, and solve-- but nothing really gets solved. And all the while, building God's true kingdom is put on hold. -- Conclusion: I hope that what I have cited gets your attention and motivates you to read this book. The subtle patterns of unhealthy characteristics are discussed in a way that actually helps people identify them, resist them, and recover from them. Copyright © 2000 John Engler. All rights reserved. The Barnabas Ministry



  • Christian Church History Study
  • 4. 1881 A.D. to Present (2012) - Corrupt modern bible translations and compromised Seminaries and Universities

patterns

Nativity, Epiphany, and Pascha - Patterns of Worship

Fr. Thomas Hopko presents a meditation on how the liturgical services of Christmas and Epiphany pattern those of the Christ's Holy Pascha of Easter.




patterns

News roundup: deck.js, Yahoo Kills off Maps API, Patterns for Large-Scale JavaScript Application Architecture

Listen to this week's podcast (September 9, 2011) Patterns For Large-Scale JavaScript Application Architecture Patterns For Large-Scale JavaScript Application Architecture is a lengthy article by Addy Osmani detailing some basic principles of writing a large-scale JavaScript application. It's inspired by a classic Nicholas Zakas talk outlining some of the same principles ...




patterns

News roundup: iOS Orientationchange Fix, JavaScript Patterns, jQ.Mobi

Listen to this week's podcast (January 20, 2012)! iOS Orientationchange Fix jQuery Mobile's Scott Jehl has released iOS-Orientationchange-Fix (read his blog post). This has been a persistent annoyance on iOS since its release. You may be familiar with the mobile viewport tag, which allows you to properly fit sites to ...




patterns

Knowledge Extraction from RDF Data with Activation Patterns

RDF data can be analyzed with various query languages such as SPARQL. However, due to their nature these query languages do not support fuzzy queries that would allow us to extract a broad range of additional information. In this article we present a new method that transforms the information presented by subject-relationobject relations within RDF data into Activation Patterns. These patterns represent a common model that is the basis for a number of sophisticated analysis methods such as semantic relation analysis, semantic search queries, unsupervised clustering, supervised learning or anomaly detection. In this article, we explain the Activation Patterns concept and apply it to an RDF representation of the well known CIA World Factbook.




patterns

Influence of nostalgic behaviour on the consumption patterns of adults: a conceptual framework

Nostalgia has an intrinsic association with consumer behaviour. Retrieval of memories drives emotions among consumers and reinforces experience-led buying decisions. Despite nostalgia, and consumption being a common practice at various times in life, issues regarding the nostalgia stimuli on customers' perceptions and buying decisions remain less explored. This article aims at exploring the consumption pattern of adult consumers by analysing the influence of nostalgic behaviour referring to the autobiographic memories and social motivations. It describes the purchase intentions and consumption pattern among adult consumers in the context of self-reference criteria based on nostalgic memories and social motivations. This article offers constructive understanding on establishing relationship between nostalgic memories and consumption pattern over the temporal framework and establishing the brand loyalty and hedonic satisfaction. It contributes to the existing literature by critically examining the theoretical concepts and empirical findings of previous studies on perceptions of consumers on nostalgic emotions and their role in making buying decisions.




patterns

The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore

The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore.




patterns

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




patterns

Identification of Design Patterns for Mobile Services with J2ME




patterns

E-Learning Diurnal Time Patterns in the Navy




patterns

Evolving Consumption Patterns of Various Information Media via Handheld Mobile Devices

This study examines diverse information media in order to identify those formats that are most suitable for consumption via handheld mobile devices, namely, smartphones and tablets. The preferences of the users are measured objectively by analyzing actual data of their relative use of handheld mobile devices and personal computing (PC) desktop devices, including laptops and notebooks, for consumption of information presented in various formats. Our findings are based on Google Analytics pageview data of five course Websites during a period of three semesters, by 11,557 undergraduate students. M-learning contexts were chosen, since in a learning environment the interests of information providers (i.e., the instructors) are in accord with those of the information consumers (i.e., the students), whereas in commercial settings there may be conflicts of interests. Our findings demonstrate that although about 90% of the pageviews were via PC devices, the rate of smartphone use for consuming learning content in diverse information media is gradually increasing as time goes by, whereas the rate of tablet use for these purposes is stagnant. The most promising direction for smartphone development, emanating from the findings, is online video content.




patterns

Learning Object Patterns for Programming




patterns

Children's Participation Patterns in Online Communities:




patterns

Tuning Primary Learning Style for Children with Secondary Behavioral Patterns

Personalization is one of the most expected features in the current educational systems. User modeling is supposed to be the first stage of this process, which may incorporate learning style as an important part of the model. Learning style, which is a non-stable characteristic in the case of children, differentiates students in learning preferences. This paper identifies a new hybrid method to initiate and update the information of children’s learning style in an educational system. At the start-up phase, children’s learning style information is gathered through the modified Murphy-Meisgeier Type Indicator for Children (MMTIC) questionnaire, which is based on the well-known Myers-Briggs Type Indicator (MBTI). This primary information will be tuned by tracking children’s behaviors during the learning process. Analytical data mining helped us to cluster these behaviors and find their patterns. The proposed method was applied on 81 fourth grade children in elementary school. Delivering results suggest that this method provides a good precision in recognizing children learning style and may be an appropriate solution for non-stability problems in their preferences.




patterns

Socio-Economic Factors Affecting Home Internet Usage Patterns in Central Queensland




patterns

Informing Patterns of Student Case Writing




patterns

Critical Review of Stack Ensemble Classifier for the Prediction of Young Adults’ Voting Patterns Based on Parents’ Political Affiliations

Aim/Purpose: This review paper aims to unveil some underlying machine-learning classification algorithms used for political election predictions and how stack ensembles have been explored. Additionally, it examines the types of datasets available to researchers and presents the results they have achieved. Background: Predicting the outcomes of presidential elections has always been a significant aspect of political systems in numerous countries. Analysts and researchers examining political elections rely on existing datasets from various sources, including tweets, Facebook posts, and so forth to forecast future elections. However, these data sources often struggle to establish a direct correlation between voters and their voting patterns, primarily due to the manual nature of the voting process. Numerous factors influence election outcomes, including ethnicity, voter incentives, and campaign messages. The voting patterns of successors in regions of countries remain uncertain, and the reasons behind such patterns remain ambiguous. Methodology: The study examined a collection of articles obtained from Google Scholar, through search, focusing on the use of ensemble classifiers and machine learning classifiers and their application in predicting political elections through machine learning algorithms. Some specific keywords for the search include “ensemble classifier,” “political election prediction,” and “machine learning”, “stack ensemble”. Contribution: The study provides a broad and deep review of political election predictions through the use of machine learning algorithms and summarizes the major source of the dataset in the said analysis. Findings: Single classifiers have featured greatly in political election predictions, though ensemble classifiers have been used and have proven potent use in the said field is rather low. Recommendation for Researchers: The efficacy of stack classification algorithms can play a significant role in machine learning classification when modelled tactfully and is efficient in handling labelled datasets. however, runtime becomes a hindrance when the dataset grows larger with the increased number of base classifiers forming the stack. Future Research: There is the need to ensure a more comprehensive analysis, alternative data sources rather than depending largely on tweets, and explore ensemble machine learning classifiers in predicting political elections. Also, ensemble classification algorithms have indeed demonstrated superior performance when carefully chosen and combined.




patterns

Poor sleep patterns raise risks of metabolic disorders

Bethesda, MD — Irregular sleep patterns do more than just make you tired at work – they can have long-lasting adverse effects on your health.




patterns

Designs on Demand Tile From Artaic Introduces Three New Patterns and Colorways

Three patterns in three new colorways have been introduced to Artaic's Design on Demand collection. 







patterns

Symmetry groups of the Batak basketweave patterns

The symmetry groups of the weave patterns of the baskets, trays and mats of the Batak, an indigenous community in the Philippines, are discussed in this paper. The two-way twofold weaving technique is used by the Batak, and this study points to a total of 15 layer groups found in the Batak weaves out of the 80 layer groups known in crystallography.




patterns

RAPID, an ImageJ macro for indexing electron diffraction zone axis spot patterns of cubic materials

RAPID (RAtio method Pattern InDexing) is an ImageJ macro script developed for the quick determination of sample orientation and indexing of calibrated and uncalibrated zone axis aligned electron diffraction patterns from materials with a cubic crystal structure. In addition to SAED and NBED patterns, the program is also capable of handling zone axis TEM Kikuchi patterns and FFTs derived from HR(S)TEM images. The software enables users to rapidly determine whether materials are cubic, pseudo-cubic, or non-cubic, and to distinguish between P, I, and F Bravais lattices. It can also provide lattice parameters for material verification and aid in determining the camera constant of the instrument, thus making the program a convenient tool for on-site crystallographic analysis in the TEM laboratory.




patterns

MuscleX: data analysis software for fiber diffraction patterns from muscle

MuscleX is an integrated, open-source computer software suite for data reduction of X-ray fiber diffraction patterns from striated muscle and other fibrous systems. It is written in Python and runs on Linux, Microsoft Windows or macOS. Most modules can be run either from a graphical user interface or in a `headless mode' from the command line, suitable for incorporation into beamline control systems. Here, we provide an overview of the general structure of the MuscleX software package and describe the specific features of the individual modules as well as examples of applications.




patterns

Crystallographic phase identifier of a convolutional self-attention neural network (CPICANN) on powder diffraction patterns

Spectroscopic data, particularly diffraction data, are essential for materials characterization due to their comprehensive crystallographic information. The current crystallographic phase identification, however, is very time consuming. To address this challenge, we have developed a real-time crystallographic phase identifier based on a convolutional self-attention neural network (CPICANN). Trained on 692 190 simulated powder X-ray diffraction (XRD) patterns from 23 073 distinct inorganic crystallographic information files, CPICANN demonstrates superior phase-identification power. Single-phase identification on simulated XRD patterns yields 98.5 and 87.5% accuracies with and without elemental information, respectively, outperforming JADE software (68.2 and 38.7%, respectively). Bi-phase identification on simulated XRD patterns achieves 84.2 and 51.5% accuracies, respectively. In experimental settings, CPICANN achieves an 80% identification accuracy, surpassing JADE software (61%). Integration of CPICANN into XRD refinement software will significantly advance the cutting-edge technology in XRD materials characterization.




patterns

Phase quantification using deep neural network processing of XRD patterns

Mineral identification and quantification are key to the understanding and, hence, the capacity to predict material properties. The method of choice for mineral quantification is powder X-ray diffraction (XRD), generally using a Rietveld refinement approach. However, a successful Rietveld refinement requires preliminary identification of the phases that make up the sample. This is generally carried out manually, and this task becomes extremely long or virtually impossible in the case of very large datasets such as those from synchrotron X-ray diffraction computed tomography. To circumvent this issue, this article proposes a novel neural network (NN) method for automating phase identification and quantification. An XRD pattern calculation code was used to generate large datasets of synthetic data that are used to train the NN. This approach offers significant advantages, including the ability to construct databases with a substantial number of XRD patterns and the introduction of extensive variability into these patterns. To enhance the performance of the NN, a specifically designed loss function for proportion inference was employed during the training process, offering improved efficiency and stability compared with traditional functions. The NN, trained exclusively with synthetic data, proved its ability to identify and quantify mineral phases on synthetic and real XRD patterns. Trained NN errors were equal to 0.5% for phase quantification on the synthetic test set, and 6% on the experimental data, in a system containing four phases of contrasting crystal structures (calcite, gibbsite, dolomite and hematite). The proposed method is freely available on GitHub and allows for major advances since it can be applied to any dataset, regardless of the mineral phases present.




patterns

ProLEED Studio: software for modeling low-energy electron diffraction patterns

Low-energy electron diffraction patterns contain precise information about the structure of the surface studied. However, retrieving the real space lattice periodicity from complex diffraction patterns is challenging, especially when the modeled patterns originate from superlattices with large unit cells composed of several symmetry-equivalent domains without a simple relation to the substrate. This work presents ProLEED Studio software, built to provide simple, intuitive and precise modeling of low-energy electron diffraction patterns. The interactive graphical user interface allows real-time modeling of experimental diffraction patterns, change of depicted diffraction spot intensities, visualization of different diffraction domains, and manipulation of any lattice points or diffraction spots. The visualization of unit cells, lattice vectors, grids and scale bars as well as the possibility of exporting ready-to-publish models in bitmap and vector formats significantly simplifies the modeling process and publishing of results.




patterns

Observations of specimen morphology effects on near-zone-axis convergent-beam electron diffraction patterns

This work presents observations of symmetry breakages in the intensity distributions of near-zone-axis convergent-beam electron diffraction (CBED) patterns that can only be explained by the symmetry of the specimen and not the symmetry of the unit cell describing the atomic structure of the material. The specimen is an aluminium–copper–tin alloy containing voids many tens of nanometres in size within continuous single crystals of the aluminium host matrix. Several CBED patterns where the incident beam enters and exits parallel void facets without the incident beam being perpendicular to these facets are examined. The symmetries in their intensity distributions are explained by the specimen morphology alone using a geometric argument based on the multislice theory. This work shows that it is possible to deduce nanoscale morphological information about the specimen in the direction of the electron beam – the elusive third dimension in transmission electron microscopy – from the inspection of CBED patterns.




patterns

Patching-based deep-learning model for the inpainting of Bragg coherent diffraction patterns affected by detector gaps

A deep-learning algorithm is proposed for the inpainting of Bragg coherent diffraction imaging (BCDI) patterns affected by detector gaps. These regions of missing intensity can compromise the accuracy of reconstruction algorithms, inducing artefacts in the final result. It is thus desirable to restore the intensity in these regions in order to ensure more reliable reconstructions. The key aspect of the method lies in the choice of training the neural network with cropped sections of diffraction data and subsequently patching the predictions generated by the model along the gap, thus completing the full diffraction peak. This approach enables access to a greater amount of experimental data for training and offers the ability to average overlapping sections during patching. As a result, it produces robust and dependable predictions for experimental data arrays of any size. It is shown that the method is able to remove gap-induced artefacts on the reconstructed objects for both simulated and experimental data, which becomes essential in the case of high-resolution BCDI experiments.




patterns

A simple protocol for determining the zone axis direction from selected-area electron diffraction spot patterns of cubic materials

Using the well known Rn ratio method, a protocol has been elaborated for determining the lattice direction for the 15 most common cubic zone axis spot patterns. The method makes use of the lengths of the three shortest reciprocal-lattice vectors in each pattern and the angles between them. No prior pattern calibration is required for the method to work, as the Rn ratio method is based entirely on geometric relationships. In the first step the pattern is assigned to one of three possible pattern types according to the angles that are measured between the three reciprocal-lattice vectors. The lattice direction [uvw] and possible Bravais type(s) and Laue indices of the corresponding reflections can then be determined by using lookup tables. In addition to determining the lattice direction, this simple geometric analysis allows one to distinguish between the P, I and F Bravais lattices for spot patterns aligned along [013], [112], [114] and [233]. Moreover, the F lattice can always be uniquely identified from the [011] and [123] patterns.




patterns

Evolution of elliptical SAXS patterns in aligned systems

Small-angle X-ray and neutron scattering (SAXS and SANS) patterns from certain semicrystalline polymers and liquid crystals contain discrete reflections from ordered assemblies and central diffuse scattering (CDS) from uncorrelated structures. Systems with imperfectly ordered lamellar structures aligned by stretching or by a magnetic field produce four distinct SAXS patterns: two-point `banana', four-point pattern, four-point `eyebrow' and four-point `butterfly'. The peak intensities of the reflections lie not on a layer line, or the arc of a circle, but on an elliptical trajectory. Modeling shows that randomly placed lamellar stacks modified by chain slip and stack rotation or interlamellar shear can create these forms. On deformation, the isotropic CDS becomes an equatorial streak with an oval, diamond or two-bladed propeller shape, which can be analyzed by separation into isotropic and oriented components. The streak has elliptical intensity contours, a natural consequence of the imperfect alignment of the elongated scattering objects. Both equatorial streaks and two- and four-point reflections can be fitted in elliptical coordinates with relatively few parameters. Equatorial streaks can be analyzed to obtain the size and orientation of voids, fibrils or surfaces. Analyses of the lamellar reflection yield lamellar spacing, stack orientation (interlamellar shear) angle α and chain slip angle ϕ, as well as the size distribution of the lamellar stacks. Currently available computational tools allow these microstructural parameters to be rapidly refined.




patterns

Mitigation of DMM-induced stripe patterns in synchrotron X-ray radiography through dynamic tilting

In synchrotron X-ray radiography, achieving high image resolution and an optimal signal-to-noise ratio (SNR) is crucial for the subsequent accurate image analysis. Traditional methods often struggle to balance these two parameters, especially in situ applications where rapid data acquisition is essential to capture specific dynamic processes. For quantitative image data analysis, using monochromatic X-rays is essential. A double multilayer monochromator (DMM) is successfully used for this aim at the BAMline, BESSY II (Helmholtz Zentrum Berlin, Germany). However, such DMMs are prone to producing an unstable horizontal stripe pattern. Such an unstable pattern renders proper signal normalization difficult and thereby causes a reduction of the SNR. We introduce a novel approach to enhance SNR while preserving resolution: dynamic tilting of the DMM. By adjusting the orientation of the DMM during the acquisition of radiographic projections, we optimize the X-ray imaging quality, thereby enhancing the SNR. The corresponding shift of the projection during this movement is corrected in post-processing. The latter correction allows a good resolution to be preserved. This dynamic tilting technique enables the homogenization of the beam profile and thereby effectively reduces noise while maintaining high resolution. We demonstrate that data captured using this proposed technique can be seamlessly integrated into the existing radiographic data workflow, as it does not need hardware modifications to classical X-ray imaging beamline setups. This facilitates further image analysis and processing using established methods.




patterns

UAE unveils new payment technology using unique vein patterns

The UAE has announced the introduction of 'Palm ID' technology, a payment solution that utilises the unique vein patterns in individuals' palms for...




patterns

Premium Cigar Ingredients as Harmful as Cigars and Cigarettes - Health Effects Depend on Frequency, Patterns of Use

Overall cigar consumption has increased since the 1990s, but there is limited research on “premium” cigars. A new report examines the short- and long-term health effects of premium cigars, who is using them and how often, and marketing practices and consumer perceptions.




patterns

Q&A - National Academies Study Examines the Patterns of Use, Marketing, and Health Effects of Premium Cigars

In 1998, the National Cancer Institute undertook a review of available knowledge about cigars. A new National Academies consensus study report provides a comprehensive update to the 1998 report. Steven Teutsch, the chair of the committee that wrote the report, shared some of the report’s key findings and research recommendations to move the field forward.




patterns

Shopping frequency, naturalness impact baby boomer shopping patterns

With all baby boomers at least 65 or older by 2030, beverage-makers should consider what this demographic needs as their shopping habits evolve.




patterns

Theme patterns for the Site Editor

Learn how to use Template Part and Query Loop patterns to provide users with more design options.





patterns

Cell-Free RNA Patterns Help Solve Diagnostic Mysteries in Kids

RNA does many things in the body. Now, scientists have shown that RNA in blood samples can be used as a diagnostic indicator.



  • Cell &amp; Molecular Biology

patterns

Cell-Free RNA Patterns Help Solve Diagnostic Mysteries in Kids

RNA does many things in the body. Now, scientists have shown that RNA in blood samples can be used as a diagnostic indicator.



  • Genetics &amp; Genomics

patterns

Cell-Free RNA Patterns Help Solve Diagnostic Mysteries in Kids

RNA does many things in the body. Now, scientists have shown that RNA in blood samples can be used as a diagnostic indicator.



  • Clinical &amp; Molecular DX


patterns

Light Pollution Disrupts Bee Sleep Patterns, Threatening Vital Pollinators



  • Life & Non-humans

patterns

Making Sense of Compressor Frost Patterns

Any compressor that gets too hot or is overheated is subject to premature wear between its internal moving parts.