422 results on '"Hide and seek"'
Search Results
2. Hide-and-Seek Game with Capacitated Locations and Imperfect Detection.
- Author
-
Bahamondes, Bastián and Dahan, Mathieu
- Subjects
ZERO sum games ,MARGINAL distributions ,NASH equilibrium ,CONTINUOUS distributions ,GAMES - Abstract
We consider a variant of the hide-and-seek game in which a seeker inspects multiple hiding locations to find multiple items hidden by a hider. Each hiding location has a maximum hiding capacity and a probability of detecting its hidden items when an inspection by the seeker takes place. The objective of the seeker (respectively, hider) is to minimize (respectively, maximize) the expected number of undetected items. This model is motivated by strategic inspection problems, where a security agency is tasked with coordinating multiple inspection resources to detect and seize illegal commodities hidden by a criminal organization. To solve this large-scale zero-sum game, we leverage its structure and show that its mixed-strategy Nash equilibria can be characterized using their unidimensional marginal distributions, which are pure equilibria of a lower dimensional continuous zero-sum game. This leads to a two-step approach for efficiently solving our hide-and-seek game: First, we analytically solve the continuous game and derive closed-form expressions of the equilibrium marginal distributions. Second, we design a combinatorial algorithm to coordinate the players' resources and compute equilibrium mixed strategies that satisfy the marginal distributions. We show that this solution approach computes a Nash equilibrium of the hide-and-seek game in quadratic time with linear support. Our analysis reveals novel equilibrium behaviors driven by a complex interplay between the game parameters, captured by our closed-form solutions. Funding: This work was supported by the Georgia Tech Stewart Fellowship and the Georgia Tech New Faculty Start Up Grant. Supplemental Material: The online appendix is available at https://doi.org/10.1287/deca.2023.0012. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Suburbs in Wilkie Collins’s Fiction
- Author
-
Nitka, Małgorzata and Tambling, Jeremy, editor
- Published
- 2022
- Full Text
- View/download PDF
4. Traditional Games on Character Building: Integrating Hide and Seek on Learning
- Author
-
Asrial Asrial, Syahrial Syahrial, Dwi Agus Kurniawan, and Muhammad Dewa Zulkhi
- Subjects
character ,hide and seek ,response ,traditional game ,Education (General) ,L7-991 - Abstract
The purpose of this study was to determine the effect on learning of incorporating the traditional game of Hide and Seek. This type of research employs a mixed-methods. This study used several variables as research categories, including response, peace-loving character, and patriotism, and enrolled a total of 44 students. Descriptive and inferential statistics were used in the data analysis. The integration took place at an Elementary School and a Madrasah Ibtidaiyah in Batang Hari, as evidenced by the response, which reflected the peace-loving nature of patriotism. The result is that each response variable, peace, love, and patriotism, has a significant effect, with a value of sig 0.05, and that each variable is dominant in the good category.
- Published
- 2021
- Full Text
- View/download PDF
5. Hide and seek: A game reimagined.
- Author
-
Silin, Jonathan, Arndt, Sonja, and Bailey, Chelsea
- Abstract
We live in a culture that teaches us to value being seen and heard above all else. In early childhood classrooms teachers are encouraged to create individual spaces for every child and to artfully display their work as it is created. Especially in Euro-Western, neoliberal contexts, policy and curricula commonly call for early childhood professionals to pay special attention to children and families who come from immigrant or otherwise marginalized backgrounds. We are urged to acknowledge and elevate children's and families’ differences for all to see. But does everyone—child, teacher, and caregiver—want to be seen and heard all the time? What are the affordances and constraints of the visibility injunction under which we live? In this article we set out to reimagine the classic hide-and-seek paradigm in order to shed fresh light on the place of hiddenness and withdrawal from public view in the formation of positive self-regard. Is the joy of hiding always defined by the anticipation of being found? Are the pleasures of seeking only realized by the possibility of finding something/someone or is seeking an activity with its own rich rewards? Our stories and responses to each other are set out in a call-and-response pattern that echoes the six semi-structured hour-long conversations on which this article is built. Musical interludes are provided between each story/response couplet offering readers moments to pause, reflect, and argue with us as they move through the article. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Hide and seek: molecular barcoding clarifies the distribution of two cryptic duckweed species across Alberta
- Author
-
Robert A. Laird, Varina E. Crisfield, Theresa M. Burg, and Kanishka M. Senevirathna
- Subjects
Species complex ,Ecology ,business.industry ,Biogeography ,Hide and seek ,Distribution (economics) ,Plant Science ,Biology ,DNA barcoding ,Evolutionary biology ,Botany ,business ,Ecology, Evolution, Behavior and Systematics ,Global biodiversity - Abstract
Regional and global biodiversity may be underestimated due to the presence of cryptic species: species that are morphologically similar, but genetically distinct. Here, we focus on two cryptic duckweed species, Lemna minor L. and Lemna turionifera Landolt, which have overlapping geographic ranges and are easily mistaken for one another. We developed species-specific primers based on DNA barcoding sequences to facilitate the rapid identification of these two monomorphic duckweeds, allowing us to investigate their presence and distribution in Alberta, Canada. While current reports indicate the presence of L. turionifera (and the morphologically distinct Lemna trisulca L.) in Alberta, our data indicate that L. minor is also present, predominantly in the southern part of the province. Thus, this paper (i) contributes to the accuracy and completeness of a regional flora, and (ii) provides useful and flexible tools for the rapid molecular identification of cryptic Lemna species, which are of wide interest in diverse fields such as biotechnology, toxicology, bioremediation, and ecology.
- Published
- 2021
- Full Text
- View/download PDF
7. Hide and seek – the role of personality, sense of coherence and experiential information in hidden information needs
- Author
-
Shahrokh Nikou, Jannica Heinström, Eero Sormunen, Tampere University, and Communication Sciences
- Subjects
media_common.quotation_subject ,Hide and seek ,518 Media and communications ,Shame ,Stigma (botany) ,Information needs ,Library and Information Sciences ,113 Computer and information sciences ,Experiential learning ,Personality ,Big Five personality traits ,Psychology ,Social psychology ,Information Systems ,media_common ,Sense of coherence - Abstract
PurposeThe aim of this study is to assess the impact of personality traits and sense of coherence (SOC) on concealing information needs out of shame. The study also investigates the link between concealed information needs and the use of experiential information for psychological wellbeing.Design/methodology/approachA Partial Least Square ‐ Structural Equation Modelling (PLS-SEM) approach is used to assess and analyse the proposed conceptual model, which is based on the responses of 412 upper secondary school students.FindingsThe findings reveal that personality traits not only have direct significant effects on concealing information needs but that their effects are also mediated by SOC. The positive relationship between concealed information needs and the use of experiential information is confirmed in the study.Originality/valueThis study is the first to show that personality and SOC influence concealing information needs. Two pathways are found. Firstly, negative emotionality and a low SOC lead to a heightened sense of shame. Secondly, introversion induces a more guarded behaviour. The study, moreover, quantitatively demonstrates a link between concealed information needs and the use of experiential information for psychological wellbeing.
- Published
- 2021
- Full Text
- View/download PDF
8. Hide and Seek: Choices of Virtual Backgrounds in Video Chats and Their Effects on Perception
- Author
-
Cheng Yao Wang, Yao-Yuan Yang, Angel Hsing-Chi Hwang, and Andrea Stevenson Won
- Subjects
Computer Networks and Communications ,Social perception ,Hide and seek ,media_common.quotation_subject ,Applied psychology ,Video mediated communication ,Human-Computer Interaction ,Perception ,Trait ,Personality ,Big Five personality traits ,First impression (psychology) ,Psychology ,Social Sciences (miscellaneous) ,media_common - Abstract
In two studies, we investigate how users choose virtual backgrounds and how these backgrounds influence viewers' impressions. In Study 1, we created a web prototype allowing users to apply different virtual backgrounds to their camera views and asked users to select backgrounds that they believed would change viewers' perceptions of their personality traits. In Study 2, we then applied virtual backgrounds picked by participants in Study 1 to a subset of videos drawn from the First Impression Dataset. We then ran a series of three online experiments on Amazon Mechanical Turk (MTurk) to compare participants' personality trait ratings for subjects (1) with the selected virtual backgrounds, (2) with the original video backgrounds, and (3) with a gray screen as a background. The selected virtual backgrounds did not change the personality trait ratings in the intended direction. Instead, virtual background use of any kind results in a consistent "muting effect" that mitigates very high or low ratings (i.e., compressing ratings to the mean level) compared to the ratings of the video with the original background.
- Published
- 2021
- Full Text
- View/download PDF
9. Išče se čudaški otrok: Queerovski otrok in otroštvo
- Author
-
Jasmina Šepetavc
- Subjects
queerovski otrok ,avtobiografija ,biomitografija ,temporalnot ,Zami ,Hide and Seek ,rast vstran ,Sociology (General) ,HM401-1281 - Abstract
Članek se ukvarja s queerovskim otrokom, nenormativnim otrokom, ki znotraj formulacije otroka kot nedolžnega bitja s predpostavljeno bodočo heteroseksualnostjo po navadi ostaja skrit. Zanima nas, kje iskati queerovskega otroka in kako o njem govoriti. Ravno zato, ker je queerovskemu otroku navadno zanikano mesto znotraj formulacij otroštva in se izrekanje queerovstva v sedanjiku (»Sem queerovski otrok.«) le malokrat zgodi, ga iščemo v fikciji z avtobiografskimi elementi, ki queerovstvo otroku pripiše za nazaj. Skozi primere biomitografije Zami: novo črkovanje mojega imena in eksperimentalnega dokumentarca Hide and Seek poskušamo pokazati, kako queerovsko otroštvo odpira potenciale drugačne formulacije želje in rasti, ki jima ne moremo zlahka določiti smeri in izid.
- Published
- 2015
10. Hide and Seek: The Orphan Well Problem in America
- Author
-
Blake Wright
- Subjects
Fuel Technology ,business.industry ,Strategy and Management ,Hide and seek ,Political science ,Industrial relations ,Internet privacy ,Energy Engineering and Power Technology ,business - Abstract
It’s a problem as old as the industry itself. The initial oil rush in the late 1800s spread like wildfire through Pennsylvania, and by 1891 the state’s annual crude output had hit 31 million barrels, or 58% of the nation’s total oil production for that year. However, by the turn of the century the bloom was off the rose. Pennsylvania’s once-robust oil allure had been eclipsed by finds in Texas, California, and Oklahoma, each spawning its own regional oil booms. So why the history lesson? Because it’s important to understand the potential volume and impact of orphan wells in the US. In the infancy of the industry, plugging-and-abandonment (P&A) techniques were crude at best, if anyone even went to the trouble. Worse still was the overall record keeping at the time. With oil booms around the country setting off races to harness as much black gold as possible, wells were being drilled at breakneck pace. Once these earliest wells were tapped of their commercial usefulness, operators moved on to the next. There was little-to-no over-sight. No regulations. No standards. The result? Thousands, if not more, of scattered, undocumented wells. “Back in the day, you have people drilling wells, and nobody’s keeping track of where the wells are drilled and who owns the wells,” said Daniel Raimi, fellow with Resource for the Future, an independent institution that conducts environmental, energy, and natural resource research. “The government’s not keeping track and has little to no regulation in place to ensure that operators safely decommission their assets at the end of their lives. As a result, you have wells that maybe produce for a couple of years, and then the owners walk away. Multiply that by a couple of hundred thousand and now you’ve got a problem.” Today, there is plenty of oversight and regulation for the industry to leave abandoned wells in much better shape than those earliest probes. However, orphan wells are still a problem. To paint the clearest picture, it would be prudent to define what an orphan well is. This is where we run into our first problem. Definitions can vary wildly from state to state and organization to organization. Some lump all abandoned, unplugged wells into their counts as orphan wells. Others count all idle wells. However, for the sake of clarity we will define orphan wells as those nonproducing, idle wells whose ownership is unknown. By that definition it is safe to say that many of the nation’s earliest wells fit that criteria. In more modern times, orphans result from idle wells whose owner goes belly-up prior to any P&A work. In most of these cases, bonds are employed to help offset the cost of plugging these wells. However, while they vary state to state, most bonding minimums do not cover the full cost of abandonment and remediation, if needed. According to the US Environmental Protection Agency, there are about 2 million unplugged, abandoned oil and gas wells scattered across the US. Other experts place the number higher; some believe it is lower. Some researchers believe as many as half of those could be orphan wells. A survey by the Interstate Oil and Gas Compact Commission in 2018 put the range of orphaned and idle wells at around 560,000 to 1.1 million. Again, abandoned doesn’t always mean orphaned. One fact that can be extrapolated from the data gathered to date is that no one knows for sure just how many orphaned wells are out there. But that is changing.
- Published
- 2021
- Full Text
- View/download PDF
11. 'The Great Game of Hide and Seek Has Worked': Suzanne Césaire, Cultural Marronnage, and a Caribbean Mosaic of Gendered Race Consciousness around World War II
- Author
-
Jennifer Anne Boittin
- Subjects
History ,Race (biology) ,Sociology and Political Science ,media_common.quotation_subject ,Hide and seek ,World War II ,Mosaic (geodemography) ,Gender studies ,Consciousness ,media_common - Abstract
Cet article analyse la résistance culturelle dans les Caraïbes autour de la Seconde Guerre mondiale. Se basant sur les écrits de Suzanne Roussi Césaire pour la revue Tropiques (1941–1945), sous le régime de Vichy en Martinique, mais s’inspirant aussi de son travail pour la revue, tel l’obtention du papier nécessaire pour l’imprimer, cet article propose de reconnaître ses pratiques comme une forme de marronnage. En reconnaissant la part du marronnage dans ses tactiques, on peut mieux apprécier les liens étroits entre les Œuvres de Suzanne Roussi Césaire, et les activités d’autres femmes caribéennes tout au long de la première moitié du XXe siècle. En effet, ses pratiques de marronnage rejoignent celles de Suzanne Lacascade, des sŒurs Paulette et Jane Nardal, ou encore d’Annie Desroy. Ensemble, elles produisent au fil de plusieurs décennies une conscience de race genrée, une mosaïque faite des histoires et mémoires de l’esclavage, de la colonisation et de la dissidence, et qui cumulera dans la décolonisation d’après-guerre.
- Published
- 2021
- Full Text
- View/download PDF
12. A Game of Hide-and-Seek between Proprietary and Buy-Side Algorithmic Traders: Causal links with Market Quality
- Author
-
Devika Arumugam and P. Krishna Prasanna
- Subjects
Buy side ,Economics and Econometrics ,050208 finance ,Hide and seek ,05 social sciences ,computer.software_genre ,Crowding out ,Market liquidity ,Microeconomics ,Market quality ,Proprietary trading ,0502 economics and business ,Economics ,ComputingMilieux_COMPUTERSANDSOCIETY ,050207 economics ,Algorithmic trading ,High-frequency trading ,computer - Abstract
This paper classifies Algorithmic Traders (ATs) as Proprietary Algorithmic Traders (PATs) and Buy-side Algorithmic Traders (BATs) and examines their dynamic relationship with market quality, using ...
- Published
- 2021
- Full Text
- View/download PDF
13. Viral strategies for circumventing p53: the case of severe acute respiratory syndrome coronavirus
- Author
-
Camila Martin Cardozo and Pierre Hainaut
- Subjects
p53 ,0301 basic medicine ,replication ,Cancer Research ,2019-20 coronavirus outbreak ,Coronavirus disease 2019 (COVID-19) ,Hide and seek ,coronavirus ,CANCER BIOLOGY: Edited by Pierre Hainaut and Paolo Boffetta ,virus ,03 medical and health sciences ,0302 clinical medicine ,nsp3 ,Animals ,Humans ,Medicine ,Hit and run ,Permissive ,Innate immune system ,SARS-CoV-2 ,Mechanism (biology) ,business.industry ,COVID-19 ,RING finger and CHY zinc finger domain-containing protein 1 ,Virology ,030104 developmental biology ,Oncology ,030220 oncology & carcinogenesis ,Severe acute respiratory syndrome coronavirus ,Tumor Suppressor Protein p53 ,business ,severe acute respiratory syndrome coronavirus 2 - Abstract
Purpose of review Virtually all viruses have evolved molecular instruments to circumvent cell mechanisms that may hamper their replication, dissemination, or persistence. Among these is p53, a key gatekeeper for cell division and survival that also regulates innate immune responses. This review summarizes the strategies used by different viruses and discusses the mechanisms deployed by SARS-CoV to target p53 activities. Recent findings We propose a typology for the strategies used by different viruses to address p53 functions: hit and run (e.g. IAV, ZIKV), hide and seek (e.g. HIV1), kidnap and exploit (e.g. EBV, HSV1), dominate and suppress (e.g. HR HPV). We discuss the mechanisms by which SARS nsp3 protein targets p53 for degradation and we speculate on the significance for Covid-19 pathogenesis and risk of cancer. Summary p53 may operate as an intracellular antiviral defense mechanism. To circumvent it, SARS viruses adopt a kidnap and exploit strategy also shared by several viruses with transforming potential. This raises the question of whether SARS infections may make cells permissive to oncogenic DNA damage.
- Published
- 2021
- Full Text
- View/download PDF
14. Analiza prawna przypadku bpa Edwarda Janiaka w kontekście filmu 'Zabawa w chowanego' Marka i Tomasza Sekielskich
- Author
-
Michał Skwarzyński
- Subjects
Kościół Katolicki ,Philosophy. Psychology. Religion ,Hide and seek ,Active Defense ,Context (language use) ,Character (symbol) ,dziennikarstwo ,Pedophilia ,Canon law ,Legal protection ,Law ,prawo kanoniczne ,Sociology ,zwalczanie pedofilii ,Simple fact - Abstract
Niniejsza analiza koncentruje się na kilku kluczowych zagadnieniach dotyczących przypadku ks. bpa Edwarda Janiaka, rozważanych w kontekście filmu Marka i Tomasza Sekielskich pt. „Zabawa w chowanego”. Punkt wyjścia stanowi określenie obowiązków hierarchy, zgodnie z obowiązującymi przepisami prawa polskiego i prawa kanonicznego, w związku z powzięciem przez niego informacji o przypadkach pedofilii podległych mu duchownych. Kolejne fragmenty analizy odnoszą się odpowiednio do rzetelności warstwy faktograficznej filmu, dokonanych w nim naruszeń obowiązujących przepisów i możliwości ochrony prawnej bpa Janiaka, a także pozaprawnych aspektów podjęcia przez niego aktywnej obrony. Przeprowadzone rozważania prowadzą do wniosku, że w omawianym filmie zafałszowano nie tylko chronologię zdarzeń, ale i rzeczywistość prawną. Natomiast wybór bpa Janiaka na negatywnego bohatera „Zabawy w chowanego” wynikał nie tyle z racji merytorycznych, ile raczej z faktu dysponowania nagraniami jego wypowiedzi, które można było w filmie wykorzystać.
- Published
- 2020
- Full Text
- View/download PDF
15. Assessment of Acidogenicity of Commercially Available Biscuits on Salivary pH - An in vivo Study
- Author
-
Jayashri Prabakar and B. Vivek Babu
- Subjects
Saliva ,education.field_of_study ,business.industry ,Kruskal–Wallis one-way analysis of variance ,Hide and seek ,Group ii ,Significant difference ,Population ,Clinical study ,Animal science ,In vivo ,Medicine ,business ,education - Abstract
Saliva is a complex secretion consisting of 99% of water and remaining 1% of organic and inorganic molecules. Sucrose and starches are the predominant dietary carbohydrates in modern societies. Among all the foods consumed by children, chocolates and biscuits are the most common. Therefore this present in vivo study was conducted to assess the acidogenic effect of commercially available biscuits on salivary pH among 10 to 15 years old children. Study Design used in the study was In Vivo clinical study (Pilot Trail). The population collected in the survey was children between the age group of 10 - 15 years old children. 4 Groups were considered and 10 in each group. Group 1: Hide and Seek, Group 2: Good Day, Group 3: Dream and Cream, Group 4: Oreo. Sampling method used in the study was conducted as simple random sampling. Ethical approval of the study was obtained from Saveetha Institutional Review Board. Informed consent of the children were obtained from the parents. Descriptive statistics were expressed by means of mean and standard deviation. Shapiro Wilks test used to test the normality of the data set. Kruskal Wallis test was used to find the difference in mean Salivary pH between the groups and within the groups at Baseline, Immediate and after 15 min, 30 mins. A statistically significant difference in mean Salivary pH was observed between the groups at Immediate and after 30 mins (p
- Published
- 2020
- Full Text
- View/download PDF
16. As Brincadeiras Realizadas por Crianças nas Praças da Cidade de Patos-PB
- Author
-
Diogo Peixoto Medeiros and Alana Simões Bezerra
- Subjects
criança ,Character (mathematics) ,jogos e brinquedos ,Hide and seek ,atividades de lazer ,Field research ,lcsh:Recreation. Leisure ,Foundation (evidence) ,lcsh:GV1-1860 ,Football ,Sociology ,Child development ,Social psychology - Abstract
A brincadeira é de fundamental importância para o desenvolvimento infantil na medida em que a criança pode transformar e produzir novos significados. Esta pesquisa tem como objetivo realizar um levantamento das brincadeiras que são realizadas pelas crianças nas praças da cidade de Patos-PB, assim como verificar se elas são de caráter tradicional. É uma pesquisa de campo, tendo como objetivo compreender e explicar o problema do estudo. Durante a coleta dos dados, foram observadas as seguintes brincadeiras: o futebol (travinha, dois toques), esconde-esconde, pega-pega, toca-ajuda, bola de gude e taco, onde o futebol foi a que mais se repetiu. Crianças do sexo masculino foram as mais encontradas nas brincadeiras. Pode-se concluir que se tem realizado brincadeiras tradicionais, sendo estas catalogadas, também se percebe que elas preferem os finais de semana para brincar nas praças e no horário noturno.
- Published
- 2020
- Full Text
- View/download PDF
17. Hide-and-seek with hoverflies: Merodon aureus – a species, a complex or a subgroup?
- Author
-
Jelena Ačanski, Samad Khaghaninia, Ante Vujić, Snežana Radenković, Laura Likov, Ljiljana Šašić Zorić, Anja Šebić, Dubravka Milić, Milica Ranković, and Mihajla Djan
- Subjects
0106 biological sciences ,0301 basic medicine ,03 medical and health sciences ,030104 developmental biology ,Merodon aureus ,Hide and seek ,Zoology ,Animal Science and Zoology ,Biology ,cryptic taxa, distribution, DNA sequences, environmental niche modelling, geometric morphometry, identification key, new species, Palaearctic ,010603 evolutionary biology ,01 natural sciences ,Ecology, Evolution, Behavior and Systematics - Abstract
In order to disentangle the currently confused interpretations and nomenclature ofMerodon aureusandM. aeneus, we have reviewed all existing type material and species names known to us as assigned synonyms of these taxa. We resolveM. aeneusas being a junior synonym ofM. aureus. We designate a lectotype forM. aureusand a neotype forM. aeneus.Additionally, we provide evidence thatM. aureus, together with two newly discovered taxa (M. calidussp. nov.andM. ortussp. nov.), represent a complex of cryptic species named theM. aureusspecies complex. This complex, together with theM. unicolorspecies complex and the speciesM. pumilus, is part of theM. aureussubgroup. TheM. unicolorspecies complex comprises two cryptic species:M. unicolorandM. albidussp. nov. The new species are described by applying an integrative taxonomic approach using several data types (COIand 28S rRNA genes, geometric morphometry of the wings, ecological and distributional data). Based on theCOIgene sequence analysis and distributional data, the pupa previously described as an immature stage of the speciesM. aureusis redefined as an immature stage of the new speciesM. calidus. Speciation within theM. aureussubgroup is discussed in the context of the phylogeographic history in the studied region.
- Published
- 2020
- Full Text
- View/download PDF
18. Search and concealment strategies in the spatiotemporal domain
- Author
-
Motohiro Ito and Jun-ichiro Kawahara
- Subjects
Visual search ,Linguistics and Language ,Sequence ,Computer science ,Hide and seek ,05 social sciences ,Friends ,Experimental and Cognitive Psychology ,050105 experimental psychology ,Sensory Systems ,Language and Linguistics ,Domain (software engineering) ,03 medical and health sciences ,0302 clinical medicine ,Visual masking ,Salient ,Reaction Time ,Visual Perception ,Humans ,Attention ,0501 psychology and cognitive sciences ,Physical accessibility ,030217 neurology & neurosurgery ,Cognitive psychology - Abstract
Although visual search studies have primarily focused on search behavior, concealment behavior is also important in the real world. However, previous studies in this regard are limited in that their findings about search and concealment strategies are restricted to the spatial (two-dimensional) domain. Thus, this study evaluated strategies during three-dimensional and temporal (i.e., spatiotemporal) search and concealment to determine whether participants would indicate where they would hide or find a target in a temporal sequence of items. The items were stacked in an upward (Experiments 1-3) or downward (Experiment 4) direction and three factors were manipulated: scenario (hide vs. seek), partner type (friend vs. foe), and oddball (unique item in the sequence; present vs. absent). Participants in both the hide and seek scenarios frequently selected the oddball for friends but not foes, which suggests that they applied common strategies because the oddball automatically attracts attention and can be readily discovered by friends. Additionally, a principle unique to the spatiotemporal domain was revealed, i.e., when the oddball was absent, participants in both scenarios frequently selected the topmost item of the stacked layer for friends, regardless of temporal order, whereas they selected the first item in the sequence for foes, regardless of the stacked direction. These principles were not affected by visual masking or number of items in the sequence. Taken together, these results suggest that finding and hiding positions in the spatiotemporal domain rely on the presence of salient items and physical accessibility or temporal remoteness, according to partner type.
- Published
- 2020
- Full Text
- View/download PDF
19. The Existence of Traditional Games Among 5-6 Years Old Children (In RT 23, Kelurahan Kota Baru, Kecamatan Alok Timur, Maumere)
- Author
-
Mintje Ratoe Oedjoe, Beatriks Novianti Bunga, Maria Ernawati N. Mbasa, and Credo Gregori Betty
- Subjects
Social life ,Documentation ,biology ,Hide and seek ,Perspective (graphical) ,Materials Chemistry ,Attendance ,Baru ,Social science ,biology.organism_classification ,Psychology - Abstract
This research aims to identify the traditional games exist, factors influencing the existence of and describe the attendance at the traditional games in Maumere. This research took place in RT 23, Kelurahan Kota Baru, Kecamatan Alok Timur, Maumere. The subjects of this research were 5-6 years old children, their parents and some officials of RT 23. The data was collected through observation, interviews, and documentation during the research. The results indicated that segong (hopscotch), inggo (hide and seek), ban (rolling wheel) and tali merdeka (jump rope) and several seasonal games still existed as children played the games every day. The presence of people who could teach children the traditional games, the no replacement of modern games, the safety aspects of the game from parents’ perspective and the strong family-tied social life contributed to the survival of traditional games. On the other hand, the decreasing availability of land to play contributed to the extinction of traditional games among children in Maumere.
- Published
- 2020
- Full Text
- View/download PDF
20. PTU-85 Playing Hide and Seek: Qualitative research and Gastroenterology
- Author
-
John deCaestecker, Vikram Mohanan, Ajay Verma, and Mohammad Farhad Peerally
- Subjects
Medical education ,Hide and seek ,Psychology ,Qualitative research - Published
- 2021
- Full Text
- View/download PDF
21. Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment
- Author
-
P. Vinod, Ashik Mathew, A. Jyothish, S. Anandaram, and Francesco Mercaldo
- Subjects
Software_OPERATINGSYSTEMS ,business.industry ,Computer science ,Hide and seek ,Feature selection ,computer.software_genre ,Machine learning ,Reduction methods ,Set (abstract data type) ,Feature (computer vision) ,Virtual machine ,Malware ,Artificial intelligence ,business ,computer ,Host (network) - Abstract
In this work, we investigate whether malware understands the analysis environment. This analysis is carried out by executing a set of real malicious programs and benign samples on virtual and native machines. The result of execution is API sequence collected independently from virtual machines and host systems. In order to enhance the detection rate and accuracy, we have introduced four feature selection techniques. Thus, identified that feature reduction methods enhance the detection rate to a considerable extent. The experimental study depicted that while classifying malware and benign samples in virtual machines, most of the samples have misclassified, giving a clear indication that many malware samples remain dormant on identifying sandbox environment.
- Published
- 2021
- Full Text
- View/download PDF
22. Material Hide‐and‐Seek: Looking for the Resource Savings Due to International Trade of Food Products
- Author
-
Zhi Cao, Zoltán Szakály, Gang Liu, Mihály Dombi, and Virág Ágnes Kiss
- Subjects
Resource (biology) ,Ecology ,Natural resource economics ,Physics ,Hide and seek ,international trade ,material footprint ,Decomposition analysis ,Environmental sciences ,food products ,Capital stock ,Chemistry ,decomposition analysis ,Food products ,capital stock ,Earth and Planetary Sciences (miscellaneous) ,GE1-350 ,Business ,Biology ,QH540-549.5 ,material intensity ,General Environmental Science - Abstract
Adverse environmental effects of international trade are emphasized in the literature frequently. Nevertheless, following a theoretical trade logic, the production of goods in regions with higher resource efficiency may lead to reduced global resource use. In this article, major drivers of food-related material footprint (MF) are analyzed at the global, regional, and country levels. Changes in consumption, the supply chain's efficiency, and participation in international trade are considered drivers of MF. An index decomposition analysis was conducted to assess the contribution of these factors to the variation of the MF in time. Our results partially prove that the optimization regarding natural resource use may contribute to a lower MF of food consumption. Regions and countries with increasing food imports reinforce their efficiency improvement with the lower resource intensity of imported goods, and the international trade counteracted the effects on additional resource requirements of increasing consumption throughout the analyzed period (1990-2013). Furthermore, the impact of international trade on capital stock is discussed. In line with the descending flow-type material intensity by approximately 5%, the material composition of the footprint has shifted toward stock building materials. Additionally, the intensity of the trade was found to be negatively correlated with domestic efficiency improvements.
- Published
- 2021
- Full Text
- View/download PDF
23. AN ANALYSIS OF DAVID AND EMILY CALLAWAY’S PSYCHOPATH PROBLEMS IN HIDE AND SEEK MOVIE VIEWED FROM SIGMUND FREUD’S PSYCHOANALYSIS THEORY
- Author
-
Suhendar Suhendar and Dean Rahmat Fuady
- Subjects
Psychoanalysis ,Hide and seek ,media_common.quotation_subject ,Character (symbol) ,Empathy ,medicine.disease ,Power (social and political) ,Dissociative identity disorder ,medicine ,Affect (linguistics) ,Psychoanalytic theory ,Psychology ,Relation (history of concept) ,media_common - Abstract
This research aims to analyze the main characters in Hide and Seek movie as the characters who have psychopathic problem and Dissociative Identity Disorder. In relation to which, the writer studied Hide and Seek movie as the unit of analysis. Psychopathic problems viewed from Sigmund Freud’s psychoanalysis concepts are used for the review of related literature theories or concepts of the research. Therefore, the method of the research is descriptive qualitative, which tries to explain about the intrinsic elements of the movie; such as characterization and the scenes of the movie, then followed by analyzing them through Sigmund Freud’s psychoanalysis. Through observations of the scenes and the behavior of the main characters the writer reveals David and Emily have been identified to have psychopathic characters such as manipulative, parasitical, deceitful, power hungry, less empathy, often lie, shallow affect and poor behavioral control. In addition, the causes of such character are trauma and stress viewed from Sigmund Freud’s psychoanalysis theory
- Published
- 2019
- Full Text
- View/download PDF
24. Cheater's hide and seek: Strategic cognitive network activation during ethical decision making
- Author
-
Julia J. Lee, Catherine T. Shea, Tanya Menon, and Dong-Kyun Im
- Subjects
050402 sociology ,Sociology and Political Science ,Social network ,Process (engineering) ,business.industry ,Hide and seek ,05 social sciences ,Control (management) ,Ethical decision ,Psychology of self ,General Social Sciences ,Cognitive network ,0506 political science ,Social support ,0504 sociology ,Anthropology ,050602 political science & public administration ,Psychology ,business ,Social psychology ,General Psychology - Abstract
We consider the dynamic process by which people cognitively activate their social networks during ethical decision making. We compare actors’ goals during anticipatory and ex-post phases of ethical decision making, and propose that they trigger hide-and-seek patterns of network activation. Experiment 1 links cognitively activated network structures with self-report ethical behavior. Consistent with “hiding goals,” actors randomly assigned to anticipate behaving unethically (versus honestly or in the control condition), activated sparser networks that could better hide unethicality (Experiment 2). Consistent with “seeking” goals, participants randomly assigned to unethical (versus honest) conditions mentally activated dense networks, seeking out social support to uphold their sense of self (Experiment 3a). This network activation process is mitigated when participants affirm themselves (Experiment 3b). Experiment 4 replicates these hide and seek patterns of social network activation in a single study that captures both the anticipatory and ex-post phases of ethical decision making.
- Published
- 2019
- Full Text
- View/download PDF
25. Al esconder, hide and seek: RicanStructing college choice for Puerto Rican students in urban schools
- Author
-
Jason G. Irizarry, Nichole M. Garcia, and Yedalis Ruiz
- Subjects
Cultural Studies ,Cultural influence ,media_common.quotation_subject ,Hide and seek ,05 social sciences ,Immigration ,050401 social sciences methods ,050301 education ,Puerto rican ,Gender studies ,Education ,Diaspora ,Race (biology) ,0504 sociology ,ComputingMilieux_COMPUTERSANDEDUCATION ,Sociology ,0503 education ,Demography ,media_common - Abstract
Drawing from two data sets – one focused on students in high school actively engaged in the process of college choice, the other centering the perspectives of college graduates and their parents re...
- Published
- 2019
- Full Text
- View/download PDF
26. Hide and Seek
- Author
-
Sarah Fishman
- Subjects
History ,Politics ,Hide and seek ,Media studies ,Sociology - Abstract
Since the publication in 1960 of Philippe Ariès’s foundational, if problematic, Centuries of Childhood, the history of childhood has developed into a rich and varied field. At the annual conference of the Western Society for French History in 2018, a call for panelists for a roundtable on the history of childhood expanded into two separate panels ranging from the medieval era through the thirty glorious postwar years. The panelists and the audience grappled with questions about the social construction of age, the ages of childhood, and the challenges of finding sources for a group that left few “ego documents.” Although children per se never exercised political or global power, attention to children clarifies how critical children were to political and international systems. Material generated by children themselves can be difficult to locate, but adults generated plenty of material about children. The intersectionality of the history of childhood with fields like labor history, urban history, the history of the welfare state, and the history of psychology parallels the intersectionality of children themselves, who come from every race, social class, and gender. All humans, it turns out, start out as children.
- Published
- 2019
- Full Text
- View/download PDF
27. The growth of the hide and seek botnet
- Author
-
Sam Haria
- Subjects
021110 strategic, defence & security studies ,Information Systems and Management ,Computer Networks and Communications ,Computer science ,Hide and seek ,0211 other engineering and technologies ,Botnet ,02 engineering and technology ,Computer security ,computer.software_genre ,Malware ,Safety, Risk, Reliability and Quality ,Reset (computing) ,computer ,Reboot - Abstract
Security researchers recently found a botnet that remains live and working, even after a device has been reset. 1 This malware has been named ‘Hide and Seek’ (HnS) and appears to be the world's first to survive a reboot, making it very persistent and extremely dangerous.
- Published
- 2019
- Full Text
- View/download PDF
28. Structural racism hide and seek: only one of five official UK reports on health has found structural racism
- Author
-
Raj Bhopal
- Subjects
medicine.medical_specialty ,Government ,2019-20 coronavirus outbreak ,Coronavirus disease 2019 (COVID-19) ,Inequality ,media_common.quotation_subject ,Hide and seek ,Public health ,No reference ,General Medicine ,030204 cardiovascular system & hematology ,Criminology ,Racism ,United Kingdom ,03 medical and health sciences ,0302 clinical medicine ,Political science ,medicine ,Humans ,030212 general & internal medicine ,Healthcare Disparities ,media_common - Abstract
Gopal and Rao’s editorial made me reflect on five important UK reports published in the past year, generating controversy about institutional and structural racism.1 The UK government commissioned Public Health England (PHE) to report on inequalities in covid-19, including ethnicity.2 The report was criticised for having no recommendations and no reference to extensive public consultations by PHE. A second report including the consultations with more than …
- Published
- 2021
29. Hide-and-Seek: The Tale of Three Girls in the Giado Concentration Camp in Libya (1942–1943)
- Author
-
Nava T. Barazani
- Subjects
integumentary system ,Hide and seek ,Sociology ,Criminology - Abstract
typhus epidemic that broke out in the Giado concentration camp in Libya in December 1942 constituted the major cause of death among the hundreds of Jewish detainees. Seeking to prevent its spread, the camp guards shaved the heads of those who had lice in their hair. In interviews conducted between 2009 and 2017 with survivors of the camp who were children at that time, only the women mention the shaving of heads and their desperate attempt to evade this fate. This chapter relates the story of three women who, as children, were incarcerated in the camp. Their narratives, which move fluidly between their perceptions as children and their adult recollections, point to a gender-related phenomenon pertaining to the dread of being caught and subjected to a head-shaving, and the trauma associated with a girl’s being shorn of her hair.
- Published
- 2021
- Full Text
- View/download PDF
30. Fracture hide and seek
- Author
-
Carl van Heyningen and Katie Keaney
- Subjects
Computer science ,Hide and seek ,Forensic engineering ,Fracture (geology) - Published
- 2021
- Full Text
- View/download PDF
31. Playing hide and seek with structural racism
- Author
-
Mala Rao and Dipesh P Gopal
- Subjects
2019-20 coronavirus outbreak ,Coronavirus disease 2019 (COVID-19) ,business.industry ,SARS-CoV-2 ,Hide and seek ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,media_common.quotation_subject ,Internet privacy ,COVID-19 ,General Medicine ,Racism ,State Medicine ,United Kingdom ,Humans ,Healthcare Disparities ,Psychology ,business ,media_common - Published
- 2021
32. IŠČE SE ČUDAŠKI OTROK: QUEEROVSKI OTROK IN OTROŠTVO.
- Author
-
Šepetavc, Jasmina
- Abstract
Copyright of Družboslovne Razprave is the property of Druzboslovne Razprave and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2015
33. Hide-and-seek strategies and post-contact immobility
- Author
-
Nigel R. Franks, Ana B. Sendova-Franks, and Alan Worley
- Subjects
biology ,Ecology ,Hide and seek ,Marginal value theorem ,Context (language use) ,biology.organism_classification ,Agricultural and Biological Sciences (miscellaneous) ,Predation ,Larva ,Predatory Behavior ,Animals ,Animal Behaviour ,Antlion ,General Agricultural and Biological Sciences ,Predator ,Systematic search - Abstract
To understand why an animal might gain by playing dead, or more precisely, exhibit post-contact immobility (PCI), we consider the context in which this behaviour occurs. Is it, for example, a method by which a potential victim encourages a predator to direct its attention elsewhere? We investigate this possibility by using the marginal value theorem to analyse predator behaviour in the context of this defence strategy by potential prey. We consider two models. In the first, (random revisiting) the predator may return to sites it has already depleted within the patch. In the second, (systematic search) the predator goes only to new sites within the patch. The results of the two models are qualitatively extremely similar. We show that when prey occur in patches, PCI favours prey survival. Indeed, certain antlion larvae have PCI durations characterized by very long half-lives. These appear to be of such long durations that further increases would convey no substantial benefits in redirecting potential predators to other antlions within the patch and subsequently to other patches.
- Published
- 2021
34. Hide and seek. Ticagrelor and central apneas after acute coronary syndrome
- Author
-
Chiara Borrelli, Claudio Passino, Gianluca Mirizzi, Alberto Giannoni, Michele Emdin, and Francesco Gentile
- Subjects
Acute coronary syndrome ,medicine.medical_specialty ,Ticagrelor ,business.industry ,Hide and seek ,Central apnea ,General Medicine ,medicine.disease ,Sleep Apnea, Central ,Clopidogrel ,Percutaneous Coronary Intervention ,Internal medicine ,medicine ,Cardiology ,Humans ,Acute Coronary Syndrome ,business ,medicine.drug - Published
- 2021
35. Strategic gaze : an interactive eye-tracking study
- Author
-
Susanne Goldlücke, Jan Hausfeld, and K. von Hesler
- Subjects
300 Social sciences, sociology & anthropology ,Computer science ,Hide and seek ,05 social sciences ,Economics, Econometrics and Finance (miscellaneous) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputingMilieux_PERSONALCOMPUTING ,Gaze ,050105 experimental psychology ,Competitive game ,330 Economics ,InformationSystems_MODELSANDPRINCIPLES ,Human–computer interaction ,0502 economics and business ,ddc:330 ,Eye tracking ,0501 psychology and cognitive sciences ,050207 economics ,150 Psychology - Abstract
We present an interactive eye-tracking study that explores the strategic use of gaze. We analyze gaze behavior in an experiment with four simple games. The game can either be a competitive (hide & seek) game in which players want to be unpredictable, or a game of common interest in which players want to be predictable. Gaze is transmitted either in real time to another subject, or it is not transmitted and therefore non-strategic. We find that subjects are able to interpret non-strategic gaze, obtaining substantially higher payoffs than subjects who do not see gaze. If gaze is transmitted in real time, gaze becomes more informative in the common interest games and players predominantly succeed to coordinate on efficient outcomes. In contrast, gaze becomes less informative in the competitive game.
- Published
- 2021
- Full Text
- View/download PDF
36. On the Subtle Nature of a Simple Logic of the Hide and Seek Game
- Author
-
Fenrong Liu, Dazhu Li, Sujata Ghosh, and Yaxin Tu
- Subjects
Class (set theory) ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Modal ,Theoretical computer science ,Constant (computer programming) ,Simple (abstract algebra) ,Computer science ,Hide and seek ,Expressive power ,Undecidable problem ,Decidability - Abstract
We discuss a simple logic to describe one of our favourite games from childhood, hide and seek, and show how a simple addition of an equality constant to describe the winning condition of the seeker makes our logic undecidable. There are certain decidable fragments of first-order logic which behave in a similar fashion and we add a new modal variant to that class of logics. We also discuss the relative expressive power of the proposed logic in comparison to the standard modal counterparts.
- Published
- 2021
- Full Text
- View/download PDF
37. Hide-and-seek: Neurotropic squamous cell carcinoma of the periorbital region - a series of five cases and review of the literature
- Author
-
Bettina Zelger, Evi M. Morandi, Benjamin Henninger, Petra Puelzl, Dolores Wolfram, Tina Rauchenwald, Bernhard Zelger, and Gerhard Pierer
- Subjects
Periorbital region ,Pathology ,medicine.medical_specialty ,Poor prognosis ,Skin Neoplasms ,business.industry ,Hide and seek ,Cranial nerves ,Perineural invasion ,Dermatology ,medicine.disease ,Malignancy ,Carcinoma, Basal Cell ,Face ,Carcinoma, Squamous Cell ,Medicine ,Humans ,Basal cell ,Basal cell carcinoma ,Neoplasm Invasiveness ,business - Abstract
Squamous cell carcinoma is the second most common malignancy of the skin after basal cell carcinoma and mainly found in sun-exposed areas such as the face. This mostly locally destructive malignancy may show invasive growth and insidious mechanisms of dissemination such as perineural invasion. Periorbital squamous cell carcinoma is associated with perineural invasion in up to 14 % of cases. Specifically in this region, the proximity to cranial nerves and therefore the associated risk of progression to the central nervous system are associated with poor prognosis. The clinically concealed character of this entity often leads to a delay in diagnosis and consequently makes complete resection and reconstruction demanding. Careful clinical evaluation often hints at perineural invasion before obtaining histology. Aside from presenting five challenging cases, this work analyzes risk factors, clinical as well as histological features, and treatment options for periorbital squamous cell carcinoma with perineural invasion.
- Published
- 2020
38. Hide and Seek
- Author
-
Yair Neuman
- Subjects
Philosophy of science ,Aesthetics ,Hide and seek - Published
- 2020
- Full Text
- View/download PDF
39. Sound Reactive Bio-Inspired Snake Robot Simulation
- Author
-
Sriranjan Rasakatla, Ikuo Mizuuchi, and Bipin Indurkhya
- Subjects
Sound localization ,0209 industrial biotechnology ,geography ,geography.geographical_feature_category ,business.industry ,Computer science ,Interface (computing) ,Hide and seek ,Robotics ,02 engineering and technology ,computer.software_genre ,Vibration ,Software framework ,03 medical and health sciences ,020901 industrial engineering & automation ,0302 clinical medicine ,Human–computer interaction ,030220 oncology & carcinogenesis ,Robot ,Artificial intelligence ,business ,computer ,Sound (geography) - Abstract
We present a hardware and software framework in which we use the direction of the sound source to interact with the simulation of a snake robot. We present a gamification idea (similar to hide and seek) of how one can use the direction of the sound and develop interactive simulations in robotics and especially use the bio-inspired idea of a snake's reactive locomotion to sound. We use multiple microphones and calculate the direction of sound coming from the sound source in near real-time and make the simulation respond to it. Since a biological snake moves away from a sound source when it senses vibrations, we bio-mimic this behavior in a simulated snake robot. This idea can be used for developing games that are reactive to multiple people interacting with a computer, based on sound direction input. This is a novel interface and first of its kind presented in this paper.
- Published
- 2020
- Full Text
- View/download PDF
40. Taylor, Elizabeth: A Game of Hide and Seek
- Author
-
Corinna Assmann
- Subjects
business.industry ,Hide and seek ,Internet privacy ,Sociology ,business - Published
- 2020
- Full Text
- View/download PDF
41. A game of hide and seek in networks
- Author
-
Bhaskar Dutta, Francis Bloch, Marcin Dziubiński, Paris School of Economics (PSE), École des Ponts ParisTech (ENPC)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Université Paris 1 Panthéon-Sorbonne (UP1)-Centre National de la Recherche Scientifique (CNRS)-École des hautes études en sciences sociales (EHESS)-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Paris Jourdan Sciences Economiques (PJSE), Université Paris 1 Panthéon-Sorbonne (UP1)-École normale supérieure - Paris (ENS Paris), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-École des hautes études en sciences sociales (EHESS)-École des Ponts ParisTech (ENPC)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), University of Warwick [Coventry], Ashoka University, University of Warsaw (UW), and ANR-18-CE26-0020,MaRiNe,Gestion du Risque sur les Réseaux(2018)
- Subjects
FOS: Computer and information sciences ,Economics and Econometrics ,Computer science ,Hide and seek ,TK ,JEL: D - Microeconomics/D.D6 - Welfare Economics/D.D6.D62 - Externalities ,Covert organizations ,FOS: Economics and business ,Single node ,Computer Science - Computer Science and Game Theory ,0502 economics and business ,Economics - Theoretical Economics ,050207 economics ,Network design ,050205 econometrics ,business.industry ,Node (networking) ,05 social sciences ,[SHS.ECO]Humanities and Social Sciences/Economics and Finance ,Network planning and design ,Core (game theory) ,JEL: D - Microeconomics/D.D8 - Information, Knowledge, and Uncertainty/D.D8.D85 - Network Formation and Analysis: Theory ,JEL: C - Mathematical and Quantitative Methods/C.C7 - Game Theory and Bargaining Theory/C.C7.C72 - Noncooperative Games ,Theoretical Economics (econ.TH) ,Networks ,business ,Computer Science and Game Theory (cs.GT) ,Computer network - Abstract
We propose and study a strategic model of hiding in a network, where the network designer chooses the links and his position in the network facing the seeker who inspects and disrupts the network. We characterize optimal networks for the hider, as well as equilibrium hiding and seeking strategies on these networks. We show that optimal networks are either equivalent to cycles or variants of a core-periphery networks where every node in the periphery is connected to a single node in the core., 27 pages
- Published
- 2020
- Full Text
- View/download PDF
42. How Portable Is Level-0 Behavior? A Test of Level- k Theory in Games With Non-Neutral Frames.
- Author
-
Hargreaves Heap, Shaun, Rojo Arjona, David, and Sugden, Robert
- Subjects
GAME theory ,PROBABILITY theory ,ECONOMETRICS ,MATHEMATICAL economics ,REASON - Abstract
We test the portability of level-0 assumptions in level- k theory in an experimental investigation of behavior in Coordination, Discoordination, and Hide and Seek games with common, non-neutral frames. Assuming that level-0 behavior depends only on the frame, we derive hypotheses that are independent of prior assumptions about salience. Those hypotheses are not confirmed. Our findings contrast with previous research which has fitted parameterized level- k models to Hide and Seek data. We show that, as a criterion of successful explanation, the existence of a plausible model that replicates the main patterns in these data has a high probability of false positives. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
43. Multiagent Simulation On Hide and Seek Games Using Policy Gradient Trust Region Policy Optimization
- Author
-
Judhi Santoso and Hani'ah Wafa
- Subjects
Trust region ,Computer science ,business.industry ,Hide and seek ,Reinforcement learning ,Artificial intelligence ,business ,Gradient method - Abstract
The hide and seek game is a game that implements a multi-agent system so that it will be solved by using multi-agent reinforcement learning. In this research, we examine how to apply policy gradient method, Trust Region Policy Optimization (TRPO) to solve the hide and seek game environment. We also examine the configuration of TRPO algorithm that gives the best performance and its comparison with the Vanilla Policy Gradient (VPG) algorithm. From the results of experiments conducted, we found that in general the VPG algorithm gives a better performance than the TRPO algorithm when tested in the same environment as the training environment. However, on the contrary, the TRPO algorithm gives better performance when tested in a different environment than that in the training environment.
- Published
- 2020
- Full Text
- View/download PDF
44. Hide and Seek: Intermittent Preexcitation Wolff-Parkinson-White Syndrome Case Report and Management Overview
- Author
-
Jennifer B. Rosenthal, Lloyd Tannenbaum, Rachel E Bridwell, Amber Cibrario, and Neil P Larson
- Subjects
medicine.medical_specialty ,intermittent preexcitation ,Hide and seek ,Cardiology ,Accessory pathway ,030204 cardiovascular system & hematology ,wolff-parkinson-white ,03 medical and health sciences ,QRS complex ,0302 clinical medicine ,Internal medicine ,medicine ,cardiovascular diseases ,PR interval ,business.industry ,General Engineering ,medicine.disease ,WPW SYNDROME ,Prolonged QRS duration ,supraventricular tachycardia ,Ecg findings ,cardiovascular system ,Emergency Medicine ,Supraventricular tachycardia ,business ,030217 neurology & neurosurgery - Abstract
Wolff-Parkinson-White (WPW) syndrome is an uncommon form of cardiac preexcitation due to an underlying structural accessory pathway, which may lead to potentially lethal arrhythmias. Classic electrocardiogram (ECG) findings of WPW include short PR interval, slurred upstroke of the QRS complex, and prolonged QRS duration. However, in intermittent preexcitation, a rare variant in contrast to continuous preexcitation, these findings are not always present, thus masking a diagnosis of WPW syndrome. Consequently, this may adversely affect or delay the appropriate treatment of short-term tachyarrhythmias and long-term definitive therapies for this syndrome. The emergency physician should promptly obtain an ECG after the termination of any tachyarrhythmia, and maintain a high index of suspicion for intermittent preexcitation with typical WPW ECG findings which were not present on prior studies. The authors present a case of a 17-year-old female diagnosed with an intermittent preexcitation variant of WPW syndrome after a case of successfully treated symptomatic supraventricular tachycardia (SVT).
- Published
- 2020
45. Hide and Seek
- Author
-
Purva Grover
- Subjects
Mandatory reporting ,business.industry ,Hide and seek ,Internet privacy ,Business - Abstract
The system of mandatory reporting was created in response to a growing recognition of devastation that child abuse was causing in the United States. All states designate people in certain professions as “mandated reporters.” This has led to discussion regarding unintended consequences or negative effects of mandatory reporting. What are our obligations toward adult patients who confide that they were abused as a child but are unsure if they want to report this now? Are we still the mandated reporters? How does patient autonomy factor into this? These laws and statutes are complex, and our legal obligations must be weighed against various ethical and practical considerations.
- Published
- 2020
- Full Text
- View/download PDF
46. Hidden Computed Tomography Texture Features in Ex-Smokers with Abnormal Spirometry? Playing Hide and Seek Using Machine Learning
- Author
-
Grace Parraga, A.R. Westcott, D.G. McCormack, Jonathan L. MacNeil, M. Sharma, and B. Hou
- Subjects
Spirometry ,medicine.diagnostic_test ,Computer science ,business.industry ,Hide and seek ,medicine ,Ex smokers ,Computed tomography ,Pattern recognition ,Artificial intelligence ,Texture (music) ,business - Published
- 2020
- Full Text
- View/download PDF
47. Hide and seek: Somatic SMAD3 mutations in melorheostosis
- Author
-
Bart Loeys, Aline Verstraeten, and Joe Davis Velchev
- Subjects
0301 basic medicine ,Somatic cell ,MAP Kinase Kinase 1 ,Melorheostosis ,Bone Morphogenetic Protein 2 ,medicine.disease_cause ,Mice ,0302 clinical medicine ,Smad3 gene ,Osteogenesis ,Transforming Growth Factor beta ,Immunology and Allergy ,Mutation ,integumentary system ,Osteoblast ,Cell Differentiation ,Extracellular Matrix ,Up-Regulation ,Protein Transport ,medicine.anatomical_structure ,Gain of Function Mutation ,biological phenomena, cell phenomena, and immunity ,Signal Transduction ,Hide and seek ,Immunology ,Biology ,Insights ,Models, Biological ,Bone and Bones ,Cell Line ,03 medical and health sciences ,Calcification, Physiologic ,medicine ,Animals ,Humans ,Smad3 Protein ,Cell Proliferation ,Cell Nucleus ,Osteoblasts ,Mechanism (biology) ,medicine.disease ,030104 developmental biology ,Gene Expression Regulation ,Cancer research ,Human medicine ,Transcriptome ,030217 neurology & neurosurgery ,Human Disease Genetics ,Transforming growth factor - Abstract
The role of somatic SMAD3 mutations in melorheostosis pathogenesis, In the current issue of JEM, Kang et al. (https://doi.org/10.1084/jem.20191499) describe somatic mutations in the SMAD3 gene causing endosteal melorheostosis. Using osteoblast models, the identified mutations are demonstrated to exert a gain-of-function mechanism, augmenting transforming growth factor (TGF) β signaling. These findings provide further insights into the genetic etiology of melorheostosis and consolidate the importance of the TGFβ pathway in skeletal disorders.
- Published
- 2020
48. Chemical Hide and Seek: Nematode's Journey to Its Plant Host
- Author
-
Henok Zemene Yimer, Natalie Hamada, Shahid Siddique, and Valerie M. Williamson
- Subjects
Nematode ,Nematoda ,Ecology ,Host (biology) ,Hide and seek ,Polyamines ,Animals ,Plant Science ,Biology ,Plants ,biology.organism_classification ,Molecular Biology - Published
- 2020
49. Hide-and-Seek: Chitin-Triggered Plant Immunity and Fungal Counterstrategies
- Author
-
Feng-Zhu Wang, Jian-Feng Li, and Ben-Qiang Gong
- Subjects
0106 biological sciences ,0301 basic medicine ,Hide and seek ,Arabidopsis ,Plant Immunity ,Chitin ,macromolecular substances ,Plant Science ,Biology ,Protein Serine-Threonine Kinases ,01 natural sciences ,03 medical and health sciences ,chemistry.chemical_compound ,Fungal cell walls ,Plant Diseases ,business.industry ,Abiotic stress ,Arabidopsis Proteins ,fungi ,food and beverages ,biology.organism_classification ,Biotechnology ,Elicitor ,carbohydrates (lipids) ,Crosstalk (biology) ,030104 developmental biology ,chemistry ,business ,010606 plant biology & botany - Abstract
Fungal pathogens are major destructive microorganisms for land plants and pose growing challenges to global crop production. Chitin is a vital building block for fungal cell walls and also a broadly effective elicitor of plant immunity. Here we review the rapid progress in understanding chitin perception and signaling in plants and highlight similarities and differences of these processes between arabidopsis and rice. We also outline moonlight functions of CERK1, an indispensable chitin coreceptor conserved across the plant kingdom, which imply potential crosstalk between chitin signaling and symbiotic or biotic/abiotic stress signaling in plants via CERK1. Moreover, we summarize current knowledge about fungal counterstrategies for subverting chitin-triggered plant immunity and propose open questions and future directions in this field.
- Published
- 2020
50. Hide and Seek: Ellen Emmet Rand, Childhood, and US Art Study in France, c. 1898
- Author
-
Emily C. Burns
- Subjects
Hide and seek ,Art history ,Sociology - Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.