text stringlengths 21 4k | label stringclasses 2 values |
|---|---|
MOUSEGWAS An R package for automated inbred and F1 mouse strains GWAS execution https://github.com/TheJacksonLaboratory/mousegwas Presenter: Asaf Peer, Assoc. Computational Scientist, The Jackson Laboratory for Genomic Medicine Asaf.peer@jax.org | non_poster |
Special issue on: Coopetition IMPORTANT DATES: Submission of Full Paper: until October 01, 2023. Initial decision sent to authors: until October 31, 2023 Deadline for revised papers: December 31, 2023 Notification of acceptance: until January 15, 2024 Deadline for final versions: February 20, 2024 Special Issue publication (expected): March 2024 Guest Editors: Dr. Jefferson Marlon Monticelli Universidade do Vale do Rio dos Sinos, Business and Management School, Brazil (jmmonticelli@unisinos.br) Dr. Emilene Leite Örebro University School of Business, Sweden (emilene.leite@oru.se) Dr. Adriana Fumi Chim Miki Universidade Federal de Campina Grande, Graduate Program in Management, Brazil (adriana.c.miki@ufcg.edu.br) BAR Editor-in-Chief: Dr. Ivan Lapuente Garrido Universidade do Vale do Rio dos Sinos, Business and Management School, Brazil (bar-eic@anpad.org.br) | non_poster |
Search strategies-Characteristics, treatment, and outcomes of borderline personality disorder A systematic review of case report and case series- A systematic review of case report and case series. Estrategia de Búsqueda presentada en la Escuela de Medicina de la Facultad de Ciencias Médicas de la Universidad Central del Ecuador Asignatura: Psicopatología. Profesor: Dr. Danny Raúl Zuñiga Carrasco Estudiantes: Duran Almeida Natalia Elizabeth Moreno Vaca Eduarda Camilly Navas Hidalgo Alann David Changoluisa Aimacaña Nancy Janeth Andrade Llundo Ans Naomi Sasintuña Betancourt Paola Mercedes Quito 2023 | non_poster |
Measurements of NO3 and IO during ACSOE B.J. Allan, H. Coe, G. McFiggans and J.M.C. Plane . School of Environmental Sciences, University of East Anglia, Norwich, NR4 7TJ, UK | non_poster |
Subjects Reproducible Research , Open Science, Publishing Submitted: 15 October 2021 Accepted: 15 February 2022 Published: 20 May 2022 Published by GigaScience Press. Preprint submitted at: http://dx.doi.org/10.6084/m 9.figshare.19802782 This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org / licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. GigaByte, 2022 DOI:10.6084/m9.figshare.19802782 Scott C Edmunds1* The coronavirus pandemic has underlined the importance of open, rapid dissemination of research; as well as increasing trust by making research output easier to access, interact with, and understand. GigaScience Press has partnered with River Valley to launch a new platform and publishing workflow that aims to address these issues using custom-built, end-to-end publishing technology. The system enables accepted manuscripts to be converted to online, PDF-ready articles within a day. The new journal, GigaByte, streamlines editorial effort by focusing on short-format data and software- centric articles. The publication process integrates with the GigaScience Database (GigaDB , RRID:SCR_004002) that serves as a broad-spectrum repository, displaying data and code snapshots associated with these publications. Communication further sped up by linking with preprints that are collected together in a Sciety group. Curators are on hand to help host supporting data, curate metadata as well as visualisations of the resultant data. By integrating visualisations and interactive content within the article, GigaByte transforms the article from the traditional static, descriptive journal article. Aiding the sharing of the outputs of data science research, by building upon the open code and integrating a reproducibility toolkit of third-party tools to showcase interactive and executable versions of the results. As well as providing the opportunity to more easily test code and provide certificates of executable computation. The presentation of this poster will offer a live demo showcasing examples of how this interactivity can be built upon the data, software and results. Bringing publications to life in this manner allows a rethink of the concept of “Version of Record” to focus more on archiving the underlying data, software, PIDs and factual entities, and away from the traditional unchanging proofed document that is mostly superfluous packaging. * Corresponding author. E- mail: scott@gigasciencejournal.com ABSTRACT 1/1 POSTER 1 GigaScience Press, BGI HK Tech Co Ltd., 26F Kings Wing Plaza 2, 1 On Kwan St, Shek Mun, Hong Kong Figure 1. Embedded video example demonstraUng the interacUve features of GigaByte journal, hVps://youtu.be/ltlZ4HdJ1qY Voir la version Française de cet article 查看本文的中文版本 This poster is a demo article demonstrating where interactive features can be integrated in GigaByte articles, with embedded content and tabs to allow annotation and switching between different (human) views and languages. With PIDs and metadata integrated into the XML (ORCIDs, CReDiT taxonomy, ROR, RRIDs, data and software DOIs, etc) for machine readers. INTRODUCTION Toggle between different views (Lens, dyslexic fonts, etc.) Export on-the-fly and view content many different ways… Executable Research Article view (interact with code underlying figures) hypothes.is annotation Rede$ining the Version of Record Through Bringing Publications to Life | non_poster |
Cross-Alliances Forum 2023 AUTHORS. Mireia Reus, Jaime Llorca, Meritxell Chaves (CHARM-EU, Universitat de Barcelona); Rasa Krolė (EU-CONEXUS, Klaipeda University); Harriet Hine, Sam Cole (EUTOPIA, University of Warwick); Julie Hyzewicz (CIVIS, Aix-Marseille University), Marie Ugeux (CIVIS, Université Libre de Bruxelles); Nicole Birkle (FORTHEM, Johannes Gutenberg-Universität Mainz); Claire Douet (ERUA, Université Paris 8). DEVELOPING A COMMON R&I AGENDA AND ACTION PLAN H MAPPING EUROPEAN ALLIANCE R&I BEST PRACTICES LINKED TO THE SWAFS TRANSFORMATIONAL MODULES Science with and for Society in European Universities Alliances: Brussels, November 30 - December 1 Joint Research Action Plan Research Support Platform Booklet on Collaborative Research Projects Interactive map of Research Resources and Infrastructures Online Research Group Platform Survey on R&I needs within partner universities Creation of a common R&I agenda Co-created R&I Agenda Research fields (opportunities for networking, sharing best practices, finding partners and developing joint proposals) Survey to identify main common research areas and researchers Series of sub-clustering events (identification of common goals and project ideas) InnoCORE strategy: Identification of Strategic Research Areas Symposia with representatives of R&I structures Common R&I Agenda Foundations for a future Common Research Agenda Analysis report and recommandations: value propositions to partners from other sectors to be involved in EPIChallenges Charter for common research (link with expertise on RRI and engagement) Research Portal Based on Research Units Mapping R&I code of conduct regarding research integrity Challenges for an interuniversity campus to implement actions required by HRS4R award Conferences and workshops Promoting sustainable Science for Business and Society: in line with current and future challenges of European Universities EUniWell R&I Framework EUniWell Well-Being Research Incubator Definitions of strategies that support and underpin complete academic environments Pilot projects Publications (scientific journals) Universities' Selected Good Practices in R&I Protocol for setting up a Strategic Action Plan in the International R&I Field Development of an Innovation Ecosystem R&I Ambassador Network Report Methodology Timeline R&I Action Plan: An agenda for Ulysseus Una Europa researcher match- making Una Europa R&I Strategy Enhanced Joint Research Schemes promoting engaged research Open Science initiatives Monthly Research Newsletter Cartography of research policies within UNITA Alliance Integrated R&I Support Services (IRIS network) Workshop on Energy, Green Transition, and Climate for the creation of a network of experts Reseach conference Ongoing process for a Marie Curie project Community- engagement based research best practices R&I Support Structures and Mechanisms Creating Transdisciplinary Research Networks: Guide of Experts, Collaboration Networks App, R&I Days. TORCH Common Science Agenda (overview) Snowball Seminar Series Work in process - contact the alliance | non_poster |
THE ROLE OF DIFFUSION OF INNOVATION IN AGRICULTURAL BUSINESS TO COMPETE IN ECONOMIC ASEAN COMMUNITY Harisa Mardiana1, Esther Kembauw2 1Department of Information Technology, Faculty of Science and Technology, Universitas Buddhi Dharma, Tangerang, Indonesia 2Department Social Economic, Faculty of Agriculture, University Pattimura Ambon Indonesia Email: harisa.mardiana@buddhidharma.ac.id; ekembauw@yahoo.co.id ABSTRACT Diffusion of innovation is one of the most needed in agribusiness farming. Many farmers failed to increase their income. Besides, they lost their income and even their land because they couldn’t be able to solve their problems which the national development of agriculture business seemed impossible to overcome the problems and the obstacles to resolving thoroughly as the requirement needed more serious attention. The innovation was a key factor for agribusiness growth, development and the welfare of chili pepper farmer. Diffusion of chili pepper farming had given differences in innovativeness to determine the characteristic of the adopter categories. But the communication and adoption process could explain the need of diffusion of innovation. The important in diffusion was the time dimension in chronology and not as history. Innovation was treated as both products of contradiction and caused of new contradiction and the process of adoption as both being structured was changed after all. When a new idea adopted, the innovations required in the period of time to become available. A new technology as a smart technology adopted and transformed in a learning process. By having to identify and examining the WHY and HOWs of the interface the farmer and innovation systems would, therefore, create a very good intervention ground to make a rational use of resources and knowledge for the development of agribusiness farming systems I. Introduction Agribusiness has a chance to be one of the most important parts of the economic growth in Indonesia. Data from World Bank indicated that 40% of Indonesian people live in rural area and work as a farmer. (Quincieu, 2015) This problem continues from time to time and the farmer needs more information to have problem solving. When we look at the case, innovation is a key factor for agribusiness growth, development and the welfare of chili pepper farmer. To measure the innovation is useful because it may provide orientation for the nature and degree of development of society towards a better future. (Ariza, César. et al., 2013) Innovation in agribusiness implies to a recent task, which has just told from Medan Business Newspaper. As far as we concerned the diffusion of innovation has not yet been applied and the selling and buying systems need to be changed and renewed. (Figure 1). II. Theory and the Applicable of Diffusion of Innovations in Chili Pepper Farming Diffusion really includes three fairly distinct processes: Presentation of the new culture element or elements to the society, acceptance by the society, and the integration of the accepted element or elements into the preexisting culture (Linton, 1936). Diffusion theory does not lead to the conclusion that one must wait for the diffusion of a new product or practice to reach the poorest people. In fact, one can accelerate the rate of adoption in any segment of the population through more intensive and more appropriate communication and outreach. (Green & Parcel, 1991). III. Methodology The Innovations Decision Process in Farming the Chili Pepper The research has used case study methodology to obtain the advantages of the actor’s perspective on societal contexts and dynamics. The qualitative interview and the close dialogue are at the centre of this methodology, thereby allowing for empirical inquiry of unclear ’boundaries between the phenomenon studied and the context’ (Yin, 1994). The goal of this methodology is to expand the theory, rather than proving it. This methodology is adopted as the qualities of clusters and its innovati | non_poster |
EUROGRAPHICS Workshop on Graphics and Cultural Heritage (2023) Poster H. Graf, S. Pescarin, and S. Rizvic (Editors) The Scream (ca. 1910) through the Years: from Photographic Documentation to Spatio-Temporal Modelling I. Ciortan1, G. Trumpy1, I. Sandu2 and H. Bjørngård2 1Department of Computer Science, NTNU Gjøvik, Norway 2Munch Museum, Oslo, Norway Abstract The Scream (ca. 1910) is one of Edvard Munch’s representations of the well-known scene of a man awestruck by the beauty and colors of the sunset over the fjord, painted in oil and tempera on cardboard. Given the age of the artwork, it is expected that its appearance has significantly changed since its creation to the current state. Previous studies found that the yellow and dark red hues that depict the sky are especially sensitive to moisture and light exposure, respectively. In addition, several film photographs were taken of the painting between 1970 and 2003. In this work, we aim to use these photographs in an attempt to model the changes that the artwork withstood, and reconstruct its past appearance. We perform color correction of the photographs, by comparing the unfaded values in the films against reference values in the current version of the painting. To define the reference values, we use the existing knowledge on the highly sensitive areas and other damages that occured to the painting. Finally, we obtain a color transformation function that facilitates the digital rejuvenation of the painting appearance. CCS Concepts • Applied computing →Fine arts; • Computing methodologies →Model development and analysis; 1. Introduction Digital rejuvenation [BBC∗06] estimates the past appearance of a painting, and is of high interest for art historians, conser- vators, museum curators, educators and the general public. In the last decade, several approaches were proposed in this sense, where scientific data collected from an artwork (such as spec- tral reflectance, elemental maps, fading behaviour) are coupled with analytical [ZvdLL19, CPGH23] and physically-based mod- els [KLL∗18] and/or artistic editing in image processing software [FKHS17,Ber19,BZM∗22]. In some fortunate cases, information with respect to a painting’s composition and previous appearance can be retrieved from doc- umentary sources and archival records, where a good example is given by Vincent van Gogh’s letters describing his artistic process to his brother [vG]. Similarly, photographs from the past can repre- sent a useful piece of information to monitor the change of an art- work [SKR∗16]. However, photographic documentation presents an important challenge, that of accurate color calibration. This is especially problematic for film photographs, that are themselves subject to degradation due to dye decay, and are generated with complex photo-chemical processes.For instance, in an attempt to restore the film photographs of Brazilian artist Candido Portinari, Leão [Lea11] found a lower stability for the colour patches of the Kodak Q-13 control target with respect to the grayscale patches. In this work, we intend to develop a novel color correction method for the film photographs of The Scream (ca. 1910) in Munch Museum’s collection that provides the artwork’s accurate colors at the time in which the image was taken. Our approach is to obtain the color transformation relying on ground-truth scien- tific data that characterizes the materials in the painting and their aging behaviour. This is somewhat similar to the idea of Stenger et al. [SKR∗16] who use the unfaded parts of Rothko’s Harvard mu- rals in the creation of the digital reconstruction. However, differ- ent from [SKR∗16], we include the map of unfaded regions in the film color correction stage. The ultimate purpose of our proposed method is to employ the existing photographic documentation to- wards the digital rejuvenation of The Scream (ca. 1910). As a support to our work stands an extensive prior investigation of The Scream [SATCT10,CSR∗19,MCR∗20 | non_poster |
Businesses and Society – The UN Sustainable Development Goals Exploring their relevance and application Growing populations and changing consumption patterns, together with environmental concerns and its associated social tensions continue to place societies around the world under severe pressures. The Sustainable Development Goals (SDGs), adopted by the United Nations in 2015 consists of seventeen goals to help stimulate a universal call to action to end poverty, protect the planet, and ensure that by 2030 people can enjoy both peace and prosperity. By advancing a diverse range of sustainable development themes it can be hoped that current and future drivers of societal change can be acknowledged by both business and societies when it comes to industrial production, consumption, and urbanisation. Furthermore, the pandemic has also offered businesses and societies a golden opportunity to build new recovery strategies and plans to help change previous trends, consumption, and production patterns to better reflect a more sustainable future. Therefore, reflecting the integrated nature of the seventeen SDGs, where action in one area will affect outcomes in others, you are invited to present research that covers one (or several) of the following. CALL FOR PAPERS Date: 16th and 17th of May 2023 Venue: Cardiff School of Management, Cardiff Metropolitan University Conference Theme We welcome working papers, conceptual papers, empirical research papers and impact case studies from experienced and new researchers (including research students). Goal 1: No Poverty Goal 2: Zero Hunger Goal 3: Good Health and Wellbeing Goal 4: Quality Education Goal 5: Gender Equality Goal 6: Clean Water and Sanitation Goal 7: Affordable and Clean Energy Goal 8: Decent Work and Economic Growth Goal 9: Industry, Innovation, and Infrastructure Goal 10: Reduced Inequalities Goal 11: Sustainable Cities and Communities Goal 12: Responsible Consumption and Production Goal 13: Climate Action Goal 14: Life Below Water Goal 15: Life on Land Goal 16: Peace, Justice, and Strong Institutions Goal 17: Partnership for the Goals (Source: https://sdgs.un.org/goals) Advances in Management and Innovation Conference 2023 | non_poster |
Bulge classification using MaNGA Sabyasachi Chattopadhyay South African Astronomical Observatory, Cape Town Shravan Shetty The Kavli Institute of Astronomy & Astrophysics, Peking University Abstract: Numerous studies have demonstrated strong correlations between the galaxy bulges and other host galaxy properties suggest that understanding bulge evolutions is crucial for any complete theory for galaxy evolution. Galaxy bulges come in two flavours; rotations supported Pseudo bulges and dispersion-supported Classical bulges. These bulge types have distinct properties like the galaxy Sersic index and their position in the Kormendy relation, which have been traditionally used for the classification of galaxy bulges. However, these properties are more empirical as they do not probe the galaxy bulges directly compared to kinematics. We have performed the photometric and kinematic classification of ~4310 galaxies from the Mapping of Nearby Galaxies at the Apache point observatory (MaNGA) survey. We have defined classical and pseudo bulge host (CBH & PBH) galaxies using Sloan Digital Sky Survey (SDSS) r-band photometric data we formed Kormendy relation of slope 2.84, offset of 18.08 and a scatter of 0.99 within the ellipticals classified by PyMorph and Deep Learning. We use PyMorph derived bulge properties to separate classical and pseudo bulges by their distance from the derived Kormendy relation. We use this to investigate the performance of traditional classification techniques to disentangle Pseudo-bulge and Classical bulge host galaxies. | non_poster |
Abstract Sifter: A literature informatics tool for computational toxicology Nancy C. Baker1 and Thomas Knudsen2 1Leidos, Research Triangle Park, NC, 2U.S. Environmental Protection Agency, Office of Research and Development, Center for Computational Toxicology and Exposure, Research Triangle Park, NC OBJECTIVES APPROACH MAIN RESULTS IMPACT • The Abstract Sifter is a free, innovative tool that provides an effective way to retrieve, read, screen, tag, and export PubMed citations. • The tool provides a literature landscape for chemical lists and visual entry point for mechanism exploration. • The Abstract Sifter is downloadable here: https://comptox.epa.gov/dashboard/downloads • Contact: Nancy Baker, Baker.Nancy@epa.gov Abstract # 298 • Define mechanism through PubMed queries Toxicity type queries Key characteristics of carcinogens queries • New approach methods (NAMs) in chemical safety research rely an understanding of the mechanisms underpinning chemical toxicity. • The biomedical literature is a rich source of information about mechanisms of toxicity, but because resources like PubMed are so large and complex, literature informatics methods are needed to help researchers use this resource more effectively. • We have developed a freely available Excel-based literature tool called the Abstract Sifter to retrieve and triage articles and to visualize the literature landscape for a set of chemicals. • The tool streamlines exploration of mechanisms behind chemical activity. • Run queries with chemical compounds • Visualize and explore article count results • Landscape sheet visualizes results and is entry point to agile exploration of citations | non_poster |
Bogotá D.C., Barranquilla, CaƱagena, Cúcuta, Riohacha y Santa MaƱa. Inequalities in health care utilization among Venezuelan migrants and refugees in Colombia How to strengthen the local response within the humanitarian emergency? | non_poster |
UNIVERSIDAD NACIONAL DE MOQUEGUA ESCUELA PROFESIONAL DE INGENIERÍA AMBIENTAL “Año del Bicentenario, de la consolidación de nuestra Independencia, y de la conmemoración de las heroicas batallas de Junín y Ayacucho” ELABORACIÓN DE QUBIT - 4 PRÁCTICA DE LABORATORIO DOCENTE: Blgo. SOTO GONZALES, HEBERT HERNAN ESTUDIANTES: CATACORA FLORES, FIORELLA LESLIE - 2021205085 CHURASACARI CCAMA, YISSEL ALEYDA - 2021205116 DÍAZ CABRERA, GERALDINE ADRIANA - 2021205072 HERRERA LÓPEZ, NICOLE SCARLET - 2020205084 CURSO: BIOTECNOLOGÍA CICLO: VII ILO – MOQUEGUA – PERÚ 2024 | non_poster |
EVALUACIÓN DE FACTORES PREDICTIVOS A TFD EN PACIENTES CON CORIORRETINOPATÍA SEROSA CENTRAL BASADOS EN OCT MEDIANTE INTELIGENCIA ARTIFICIAL Verónica Gómez Calleja, José Ignacio Fernández-Vigo, José Joaquim de Moura Ramos, Jorge Novo-Bujan, Marcos Ortega-Hortas Servicio de Oftalmología, Hospital Universitario Clínico San Carlos VARPA Research Group, Instituto de Investigación Biomédica de A Coruña., Universidad da Coruña, Determinar si mediante el análisis de la OCT macular basal de los pacientes con coriorretinopatía serosa central crónica (CSCc) se puede predecir mediante inteligencia artificial (IA) la respuesta a la terapia fotodinámica (TFD) • Estudio retrospectivo. • 216 ojos con CSCc tratados con TFD (2017-2021). • Recogida de imágenes de OCT pre TFD y OCT post TFD (3 meses) y clasificación según la reabsorción de LSR en: - Grupo 1: reabsorción completa de LSR (Imagen A). - Grupo 2: reabsorción parcial o de al menos 15 % (Imagen B). - Grupo 3: sin respuesta. •Análisis predictivo de la respuesta mediante “deep learning”: Experimento 1: grupo 1 vs. 2 vs 3. Experimento 2: grupo 1 vs. 2 y 3 Experimento 3: grupo 2 vs. 3 PROPÓSITO MÉTODOS P77 A B 1 2 3 INPUT: DEEP LEARNING: OUTPUT: | non_poster |
MetaBelgica: Breaking Belgian Federal Data Silos to support Named Entity Linking Sven Lieber, 0000-0002-7304-3787, KBR (Royal Library of Belgium) Ann Van Camp, 0000-0002-1915-5956, KBR (Royal Library of Belgium) Dieter De Witte, 0000-0001-8480-5719, Royal Museums of Fine Arts & Ghent University Erik Buelinckx, 0000-0003-1831-158X, Royal Institute for Cultural Heritage Els Angenon, 0000-0002-8888-9662, Royal Museums of Art and History Hannes Lowagie, 0000-0002-0671-3568, KBR (Royal Library of Belgium) Inez De Prekel, 0000-0002-5794-7575, Royal Institute for Cultural Heritage Julie M Birkholz, 0000-0003-1193-0847, KBR & Ghent University Karine Lasaracina, 0009-0006-1732-6607, Royal Museums of Fine Arts Ravi Khatri, 0009-0005-3652-6762, Ghent University Keywords: FAIR, LOD, bibliographic metadata, NLP, wikibase, cultural heritage Format: poster The analysis of the full text of sources and related Natural Language Processing techniques has drawn considerable attention in the Digital Humanities; often overlooked in DH is the analysis on metadata (Lahti et al., 2018). For instance, bibliographic (meta) data were used to study the history of the book (Lahti et al., 2018) and literary translation flows (Roig-Sanz and Fólica, 2021). The outcome of the analysis and the efforts spent for the analysis depend on the availability and quality of the data. Not only researchers, but also other stakeholders such as cultural heritage institutions or commercial agencies benefit from high quality metadata, for example derived from national bibliographies (Lubas et al., 2022). There are a number of opportunities for employing metadata in DH research. Named Entity Linking (NEL) is an often applied method where entities identified in an electronic text or digitised document are linked to a common identifier of that entity for unique identification. | non_poster |
06/11/09 1 JB Poline Databasing, neuroimaging and genetics Jean-Baptiste Poline Thanks: A. Barbot, B. Thyreau, Y. Schwartz , A. Moreno, B. Thirion, V. Frouin, E. Duchesnay, P Pinel and many others | non_poster |
arXiv:2004.05004 Neutrino Oscillations and Non-standard Interactions with KM3NeT-ORCA N. R. Khan Chowdhury on behalf of the KM3NeT Collaboration IFIC - Instituto de Fisica Corpuscular (Univ. de Valencia - CSIC) nafis.chowdhury@ific.uv.es Abstract ORCA (Oscillations Research with Cosmics in the Abyss) is the low-energy node of KM3NeT, the next generation underwater Cherenkov neutrino detector in the Mediterranean sea. The primary goal of KM3NeT-ORCA is the determi- nation of the neutrino mass ordering (NMO). With an energy threshold of few GeV and an effective mass of several Mtons, KM3NeT-ORCA can also make precision measurements of atmospheric oscillation parameters. Moreover, its access to a wide range of energies and baselines makes it optimal to discover exotic physics beyond the Standard Model such as Non-Standard Interactions (NSI) of neutrinos. The sensitivity of the detector to the neutrino mass order- ing is presented, along with its potential for determination of the atmospheric oscillation parameters. It is observed that KM3NeT-ORCA will improve the current upper limits on NSI parameters by an order of magnitude after three years of data taking. Presented at NuPhys2019: Prospects in Neutrino Physics Cavendish Conference Centre, London, 16–18 December 2019 1 | non_poster |
Zooniverse and IASC: citizen science at the service of education and popularization of astronomy and in the search for objects and events in the Cosmos. Prof. Felipe Sérvulo Maciel Costa | non_poster |
issn 1468-1331 volume 31 | supplement 1 June 2024 | non_poster |
Newsletter Issue 3 March 2020 The overall objective of the MASTRO project is to develop intelligent bulk materials for the transport sector incorporating self-responsive properties From nanomaterials and manufacturing know-how to building self-responsive materials for the aerospace, automotive, and transport sectors This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Grant Agreement no 76094. The material presented and views expressed here are the responsibility of the author(s) only. The EUCommission takes no responsibility for any use made of the information set out. | non_poster |
Artículo Original Competencia modelación matemática: concepciones y situación diagnóstica en carreras de Ingeniería Conceptions of Mathematical Modeling Competence, and a Diagnosis of its Situation in Engineering Degrees Jairo Ramón Beltrón Cedeño1* Lourdes María Hernández Rabell2 Teresa de Jesús Carrasco Jiménez2 1Universidad Técnica de Manabí, Ecuador. 2Universidad Tecnológica de La Habana «José Antonio Echeverría», ISPJAE, Cuba. *Autor para la correspondencia. jbeltron@utm.edu.ec RESUMEN Esta investigación tuvo como propósito determinar qué concepción de competencia, de competencia matemática y competencia modelación matemática debe asumirse en contextos de formación para carreras de ingeniería, a partir del análisis de diferentes posiciones y criterios afines de destacados investigadores en este campo. Asimismo, se presenta un diagnóstico del nivel de desarrollo de la competencia modelación matemática en los cursos de ingeniería en la Universidad Técnica de Manabí. Los resultados evidenciaron un bajo nivel de desarrollo de esta competencia en los estudiantes y un insuficiente tratamiento metodológico dado por los profesores para potenciarla. Esta investigación busca con intencionalidad el perfeccionamiento de la enseñanza de la matemática en estas carreras potenciando la competencia modelación matemática. Para ello se requieren de tareas docentes que favorezcan un aprendizaje desarrollador en ambientes flexibles, de colaboración e interactividad mediadas con recursos tecnológicos, que vinculen al estudiante a situaciones de la ingeniería a través de la modelación. Palabras clave: didáctica de la matemática, diagnóstico, educación superior. Revista Cubana de Educación Superior RNPS: 2418 • ISSN: 2518-2730 • No 2• mayo-septiembre 2019 | non_poster |
International Journal of Education, Social Science & Humanities. Finland Academic Research Science Publishers ISSN: 2945-4492 (online) | (SJIF) = 8.09 Impact factor Volume-12| Issue-12| 2024 Published: |22-12-2024| 586 Publishing centre of Finland THE PRINCIPLE OF MOTIVATION IN GAMIFICATION FOR TRAINING HIGHLY QUALIFIED PERSONNEL https://doi.org/10.5281/zenodo.14526470 Associate Professor M.A. Karimova Department of “Humanities,” Akhai Institute. Abstract This article analyzes the concept of gamification and its significance in modern society. The opportunities to enhance human activity and efficiency through the application of gamification in education, manufacturing, healthcare, marketing, and other fields are discussed. The article examines the core psychological principles of gamification, reward systems, tools to influence participants, and mechanisms to inspire motivation. Additionally, the role of rewards, recognition, and competitive environments in social relations is elaborated upon. The future trends of gamification and factors driving its rapid development are analyzed. Keywords Gamification, motivation, education system, game mechanics, stimulation, reward systems, competitive environment, efficiency, technology, innovation, participants, social relations, psychological principles. We live in a world where we can achieve new results every day. We communicate with those around us, set goals, and open new horizons, and technology helps us do this today. Nowadays, engaging in any activity is very easy, but a frequently heard problem arises — boredom. Yes, you read that right — just boredom. Let‘s take the education system (don‘t assume this is pure criticism): modern children rarely pick up a pen for long, and even in classrooms (though not always), they are on smartphones, tablets, portable gaming devices, and other gadgets. Why? Naturally, to play, because now, thanks to computer technology, you can find incredible games. Children play at home, on the streets, and even in hiding places. But then the bell rings, and they must sit at their desks and immediately switch to other ―games‖ — activities that are far from interesting or engaging. We won‘t dive deeper into this topic because we believe every one of you can recall a typical classroom lesson from 10-15 years ago taught by a regular teacher. | non_poster |
Poster STI 2022 Conference Proceedings Proceedings of the 26th International Conference on Science and Technology Indicators All papers published in this conference proceedings have been peer reviewed through a peer review process administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a conference proceedings. Proceeding Editors Nicolas Robinson-Garcia Daniel Torres-Salinas Wenceslao Arroyo-Machado Citation: Lewison, G., Roe, P., Webber, R., Sharp, H., & Sullivan, R.(2022). The sex (or gender) of world cancer researchers in 2009 and 2019. In N. Robinson-Garcia, D. Torres-Salinas, & W. Arroyo-Machado (Eds.), 26th International Conference on Science and Technology Indicators, STI 2022 (sti22236). https://doi.org/10.5281/zenodo.6957564 Copyright: © 2022 the authors, © 2022 Faculty of Communication and Documentation, University of Granada, Spain. This is an open access article distributed under the terms of the Creative Commons Attribution License. Collection: https://zenodo.org/communities/sti2022grx/ | non_poster |
What Can We Learn From Roman Space Telescope Observations of eRosita Galaxy Clusters? – v7-no-audio (And What Can We Learn from eRosita and Roman Space Telescope Observations of Massive Already-Known Galaxy Clusters?) Ray A. Lucas • With many thanks to Harald Ebeling, Priyamvada Natarajan, Dan Coe, Marc Postman and others(?) for useful comments and suggestions. | non_poster |
1 https://www.in stagram.co m/alexgbcas tro?igsh=Mn Fuamd2c3N http://latte s.cnpq.br/ 880400869 1610182 CASTRO alexandre - mestre em ciências da saúde (UFPel/RS) - médico (pós graduado em medicina legal, antropologia forense) - perito médico legista (SAF-IML/DF – seção de antropologia forense) - cirurgião dentista (especialista em cirurgia e traumatologia bucomaxilofacial e odontologia legal) - professor e preceptor medicina UNIEURO Caso Leandro Bossi: revisão do caso pericial e discussão se a arqueologia forense poderia ajudar na elucidação deste caso. https://orcid .org/0000- 0003 http s:// | non_poster |
UTILIZACIÓN DE LOS DATOS DE LAS FUENTES ESCRITAS EN LA ARQUEOLOGÍA: EL ESTUDIO DEL URBANISMO MEDIEVAL DE ALMUÑÉCAR USE OF DATA SOURCES WRITTEN IN ARCHAEOLOGY: STUDYING THE MEDIEVAL TOWN ALMUÑÉCAR CARLOS ALBERTO TOQUERO PÉREZ 1 1 Arqueólogo, doctorando en la Universidad de Granada. C/. La Fabriquilla, núm. 11, 18600, Motril (Granada). karlstoquero@hotmail.com | non_poster |
Colección de ESMOS 1 Infografía Complejo Enzimático: NADPH oxidasa Nahomy Lazcano González* iD Licenciatura en Biotecnología, Facultad de Ciencias Biológicas, Benemérita Universidad Autónoma de Puebla, Puebla, México. *Email: nahomy.lazcanog@alumno.buap.mx 29 de Enero de 2023 DOI: http://doi.org/10.5281/zenodo.7580767 Editado por: Jesús Muñoz-Rojas (Instituto de Ciencias, Benemérita Universidad Autónoma de Puebla). Revisado por: Paola Guadalupe Gordillo Guerra (Profesor Cátedra, Escuela de Bioingeniería y Ciencias, Tecnológico de Monterrey, Puebla, México). Colección de ESMOS Resumen El sistema NADPH oxidasa (NOX) es un complejo multi-proteico encargado de producir especies reactivas del oxígeno (ERO) en diferentes células y tejidos; el cual es de gran importancia en las células fagocíticas. La producción fisiológica de las ERO puede ocurrir como un producto secundario de otras reacciones biológicas, sin embargo, estas | non_poster |
Page | 1 Variable construction process to understand cyclists' route choice from GPS records of mobile applications Laura Daniela Ramírez-Leuro*1, Lenin Alexander Bulla-Cruz†2 1Department of Urban Planning Technische Universität Berlin 2Department of Civil and Agricultural Engineering, Faculty of Engineering Universidad Nacional de Colombia GISRUK 2023 Summary This document summarizes the process for the treatment of GPS records of mobile applications and builds variables to understand the route decisions of cyclists. Therefore, improve public policies of sustainable mobility from a geographical analysis of road safety, infrastructure, and public safety (thefts) parameterized by km of the route traveled, which are subsequently analyzed statistically. Finally, this case study is based on the GPS records of the Biko mobile application in Bogotá, Colombia. The process can be replicated in any city with the available information. KEYWORDS: sustainable mobility, geospatial analysis, variables per km of route 1. Introduction This case study was for Bogotá, Colombia, from the GPS records of cyclists’ routes available from the Biko mobile application (from February 1, 2018, to February 28, 2018). This information was joined with other geo-referenced data sources such as claims, thefts, and infrastructure such as traffic lights and bike lanes. A multi-layer treatment was also performed for the generation of cyclist routes, zoning with date and time, creation of Origin-Destination, and variables were created with the km of route traveled parameter. 2. Literature review The geospatial analysis of cyclists' routes is related to the origin of the information, usually from mobile applications. Lee and Nese (2021), in their literature review, on Strava, one of the mobile apps to analyze cyclists, specify: "Bicycle route monitoring is no longer limited to traditional sources, such as surveys and trip counts. Strava, a popular fitness tracker, has enriched cycling research opportunities over the past five years (...) Strava Metro data has potential, albeit finite, to be used to: identify travel patterns, estimate travel demand, analyze route choice, monitor exposure in crash models, and assess exposure to air pollution. However, it involves challenges such as: poor representativeness of the general population, bias towards and away from certain groups, lack of demographic details and individual-level travel data. (...) These prevent researchers from relying entirely on this data source and it was identified that cross-use with other sources and validation of reliability with official data could improve its potential." According to the above from a geospatial study on cyclists in Norway (Pritchard, Frøyen and Snizek, * Laura.daniela.ramirez.leuro@campus.tu-berlin.de † labullac@unal.edu.co | non_poster |
Agriculture Extension in Developing Countries (AEDC) 1(1) (2023) 38-42 Quick Response Code Access this article online Website: www.aedc.com.my DOI: 10.26480/aedc.01.2023.38.42 Cite the Article: Most. Sabiha Yesmin, Md. Shafiqul Islam Sikder, Md. Sohidul Islam, Md. Mahfuzul Hasan and Nayan Chandra Howlader (2023). Effect of Organic Seed Priming on Yield and Yield Attributing Traits of Chickpea (Cicer Arietinum L.) In Drought Prone Area. Agriculture Extension in Developing Countries, 1(1): 38-42. ISSN: 2990-9279 (Online) CODEN: AEDCAH RESEARCH ARTICLE Agriculture Extension in Developing Countries (AEDC) DOI: http://doi.org/10.26480/aedc.01.2023.38.42 EFFECT OF ORGANIC SEED PRIMING ON YIELD AND YIELD ATTRIBUTING TRAITS OF CHICKPEA (Cicer arietinum L.) IN DROUGHT PRONE AREA Most. Sabiha Yesmina*, Md. Shafiqul Islam Sikdera, Md. Sohrab Hossaina, Md. Mahfuzul Hasanb and Nayan Chandra Howladerb aDepartment of Agronomy, Faculty of Agriculture, Hajee Mohammad Danesh Science and Technology University, Dinajpur-5200, Bangladesh bDepartment of Horticulture, Faculty of Agriculture, Bangladesh Agricultural University, Mymensingh-2202, Bangladesh *Correspondence Author Email: sabihasumoni234@gmail.com This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ARTICLE DETAILS ABSTRACT Article History: Received 23 October 2023 Revised 15 November 2023 Accepted 09 December 2023 Available online 14 December 2023 The goals of this study are to evaluate the suitable variety and priming method and find out the interaction effect of seed priming and variety for maximization of chickpea yield and yield attributes at drought-prone region. The Agronomy Research Plot of Hajee Mohammad Danesh Science and Technology University, Dinajpur, Bangladesh led this experiment during November 2021 to April 2022 following randomized complete block design with three replications. The experiment had two factors: (A) two chickpea varieties, V1= BARI Chola-10 and V2= BARI Chola-11, and (B) five priming treatments, P1= Control (No priming), P2= Hydropriming, P3= Alovera leaf extract, P4= Azadirachta indica leaf extract, and P5= Moringa olifera leaf extract. It was manifested that BARI Chola-10 (V1) exhibited the superior performance in the yield and yield attributing traits subjected to no. of pods plant-1 (5.62), no. of seeds plant-1 (2.18), 1000 seeds weight (207.8 g), grain (1.76 t ha-1), stover (2.71 t ha-1) and biological yield (4.48 t ha-1). In varied priming treatments, P5 (Moringa olifera leaf extract) produced the most grain yield (2.07 t ha-1), whereas control (P1) produced the least (1.35 t ha-1). The maximal stover yield was 2.72 t ha-1 with Moringa olifera leaf extract and the lowest was 2.40 t ha-1 without priming. The treatment combination V1P5 performed best in extent of grain (2.13 t ha-1) and stover yield (2.83 t ha-1) whereas the minimum seed yield (1.30 t ha-1) and stover yield (2.26 t ha-1) were recorded from V2P1 treatment combination. BARI Chola-10 (V1) primed with Moringa olifera leaf extract (P5) improved chickpea yield in the study region. KEYWORDS Cicer arietinum, Drought-prone, Organic seed priming, Yield, Moringa olifera 1. INTRODUCTION In a scenario of steady economic development, agricultural demand is predicted to rise by 50% from 2013 to 2050 as the global population approaches 10 billion (FAO, 2017). Food and nutritional security for a growing population in the face of global climate change requires a second green revolution. Due to their low production cost and symbiotic nitrogen fixing, grain legumes are the best choice. Chickpea (Cicer arietinum L.) under the family of legumes, Fabaceae is a staple crop worldwide, notably in Afro-Asia. It is an excellent storehouse of carbohydrate and protein, and its protein quality is superior than other pulses. Chickpeas contains calcium, zinc, | non_poster |
Betting shop provisioning and crime patterns in England Oluwole Adeniyi1, Ferhat Tura2 and Andy Newton3 1School of Management, Nottingham Business School, Nottingham Trent University, UK 2Department of Social Sciences and Social Work, Bournemouth University, UK 3Department of Criminology and Criminal Justice, School of Social Sciences, Nottingham Trent University, UK GISRUK 2023 Summary Critics alleged that there is a link between gambling provisioning and crime and scholars argue that gambling outlets serve as attractors of anti-social and criminal behaviours. This study compared the patterns of betting shops with different categories of crime in England. using a spatial longitudinal approaches b at neighbourhood level. Spatial analysis and multilevel negative binomial model results identified significant effect of betting shops on crime, even after accounting for ethnic heterogeneity, concentrated disadvantage, and other neighbourhood factors. Our findings suggest risk factors of crime including betting shops converge in similar areas, and this creates opportunities for more crimes. Keywords Crime, gambling, betting shop, social disorganisation theory, risky facilities, crime attractors and generators. 1. Introduction Critics allege that there is a link between gambling provisioning and crime (Adolphe et al., 2019). They argue that gambling opportunities are abundant in areas with high crime clusters, and they serve as attractors of anti-social and criminal behaviours (Newham Council, 2016; Martin, 2019). International studies have examined the relationship between gambling facilities and crime from different approaches such as analysing the geographical distribution of gambling facilities and crime or individual behaviours as a result of engaging in gambling (Laursen et al., 2016; Lan et al, 2020). In the UK, proliferation of gambling opportunities has gained considerable attention (Adeniyi et al., 2020). Unfortunately, there has been limited empirical studies to examine the linkages between gambling provisioning and crime in the UK. Most of the evidence has been drawn mostly from North American and Australian studies. This research opines that developing policies in the UK based on results of studies from Canada, US and Australia is inappropriate because the gambling landscape in the UK and these countries are not comparable. This is because the gambling landscape in these countries, especially the US comprises of mostly casinos while the landscape comprises of mostly betting shops in the UK. This brings to fore the importance of this research which looks at relationship between betting shop location and crime in England. 1*corresponding author: oluwole.adeniyi@ntu.ac.uk 2 ftura@bournemouth.ac.uk 3 Andy.newton@ntu.ac.uk | non_poster |
Folder de orientações ao paciente da Clínica Cirúrgica Mista do HUAP que seguirá com o uso de SVD em domicílio Produto G E R Ê N C I A D E E N F E R M A G E M I I D I S C E N T E S : A N N A F L Á V I A V E L O Z O , M A R I A J Ú L I A M E N D E S E T H A Y A N I O L I V E I R A S E T O R : C L Í N I C A C I R Ú R G I C A M I S T A - H O S P I T A L U N I V E R S I T Á R I O A N T Ô N I O P E D R O P R E C E P T O R A : N I E L Z A M O R E I R A D E S O U Z A T U T O R A : Y A S M I N S A B A D E A L M E I D A M O N I T O R A : S T É F A N Y M A R I N H O D E O L I V E I R A D O C E N T E S : È R I C A B R A N D Ã O D E M O R A E S E G E I L S A S O R A I A C A V A L C A N T I V A L E N T E | non_poster |
RAN Simulator Is NOT What You Need: O-RAN Reinforcement Learning for the Wireless Factory Ta Dang Khoa Le ta-dang-khoa.le@eurecom.fr EURECOM Biot, France Navid Nikaein navid.nikaein@eurecom.fr EURECOM Biot, France ABSTRACT As modern manufacturing lines embrace greater modularity and flexibility, the need to transition factory networks from wired to wireless grows. Yet the mission-critical nature of factory networks poses a key challenge - connecting numer- ous diverse machines with high QoS predictability. After formulating this challenge as predictable RAN optimization via Reinforcement Learning (RL), we highlight a major-yet- overlooked modeling issue: matching the packet handling mechanics of a production/real RAN software. In this paper, we show that these mismatches inside RAN simulators can cause non-trivial QoS gaps in production. Then, we present Twin5G, a novel training solution that brings scalable and near-discrete-time emulations to real RAN software, remov- ing the need for RAN simulators. In a RAN Slicing example, Twin5G-trained policy outperforms simulator-trained and standard RL-trained policies in both QoS achieved (+16%) and predictability (+19%) during tests. ACM Reference Format: Ta Dang Khoa Le and Navid Nikaein. 2023. RAN Simulator Is NOT What You Need: O-RAN Reinforcement Learning for the Wireless Factory. In The 29th Annual International Conference on Mobile Computing and Networking (ACM MobiCom ’23), October 2–6, 2023, Madrid, Spain. ACM, New York, NY, USA, 3 pages. https://doi.org/ 10.1145/3570361.3615758 1 INTRODUCTION To meet increasingly customized and smaller manufactur- ing orders, modern manufacturing lines are designed to be highly modular and reconfigurable. This necessitates the use Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. ACM MobiCom ’23, October 2–6, 2023, Madrid, Spain © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-9990-6/23/10...$15.00 https://doi.org/10.1145/3570361.3615758 of mobile machinery at minimal rewiring costs, i.e., wire- less networking [1]. However, transitioning mission-critical factory networks from wired to wireless is a challenge; one needs to connect as many UEs as possible, despite much limited resources, while guaranteeing each UE’s QoS before actual deployment (i.e., QoS predictability), despite diverse requirements and stochastic workload variations. In this paper, we formulate this wireless factory challenge as (a) per-UE predictable QoS optimization solved with (b) RL-based RAN control. (a) is crucial because we want to maximize the value of each used resource unit. Yet, optimiz- ing system-level or multi-UE objectives cannot guarantee predictable network conditions for any UE [2]. (b) is neces- sary because, due to radio scarcity, RAN remains the only bottleneck in modern network deployments [3]. Yet, opti- mizing it requires a sequential stochastic control approach to handle adaptive traffic profiles and partially-observable channel variations. Under this formulation, multiple per-UE RL policies simultaneously control the RAN, with each pol- icy’s expected total reward being the prediction for its UE’s in-production QoS. Still, as Deep RL is sensitive to modeling errors [4], high QoS predictability requires accurate emulation of produc- tion traffic, channel, and RAN-stack dynamics. In this paper, we leave the well-known traffic-channel modeling errors to future work, and fo | non_poster |
Telenomus podisi: one species, or more? THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Kelsey Rae Bowers Graduate Program in Evolution, Ecology and Organismal Biology The Ohio State University 2015 Master's Examination Committee: Dr. Norman F. Johnson, advisor Dr. Marymegan Daly Dr. John V. Freudenstein | non_poster |
Poster: A practical methodology for ML-Based EM Side Channel Disassemblers Cesar Arguello CISE University of Florida carguello1@ufl.edu Hunter Searle CISE University of Florida huntersearle@ufl.edu Sara Rampazzi CISE University of Florida srampazzi@ufl.edu Kevin Butler CISE University of Florida butler@ufl.edu Abstract—Providing security guarantees for embedded de- vices with limited interface capabilities is an increasingly crucial task. Although these devices don’t have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine learning model, we built an EM side channel based instruction level disassembler. The disassembler was tested on an Arduino UNO board, yielding an accuracy of 88.69% instruction recognition for traces from twelve instructions captured at a single location in the device; this is an improvement compared to the 75.6% (for twenty instructions) reported in previous similar work. Index Terms—electromagnetism, side-channel, disassembly, security 1. Introduction Embedded devices form an integral part of the modern computing ecosystem. They can be found in a myriad of applications, ranging from household appliances to security-critical industrial controllers. Securing this wide range of devices is a massive and crucial design challenge, especially with the rise in connectivity of the Internet of Things and emerging threats [1]. Many of these devices, such as fuel tank monitors or farming field sensors, offer little insight into their internal workings due to proprietary technology or limited interfaces. Additionally, devices such as medical devices might be deployed long-term, with little or no ability to update their software against cyberthreats. This combination of longevity and minimal access create a situation where devices are susceptible to many forms of attacks, including disrupting functionality, falsifying sensor output, and increasing power consump- tion to drain batteries [2]. One proposed approach to the challenge of protecting embedded devices against these attacks is to use side- channel information. Side-channels refer to information that is leaked by unintentional signals generated in the normal operation of a processor. There are many forms of side-channel, including power, noise, electromagnetism, timing, etc [3] [4] [5]. In each case, the signal is correlated to the operations that generated them, so that information about those operations can be retrieved from the signal. Of these, power side-channels offer the clearest signal, and have consequently received more attention from re- searchers. However, they require a direct connection to the processor’s power rail. Electromagnetic signals, however, can be captured with no physical connection, making them more preferable as a side-channel security mechanism. In this work we propose an efficient approach for building an electromagnetic side-channel based disas- sembler, which can identify specific instructions being executed on an embedded processor. We then use our approach to build a proof-of-concept EM-based disassem- bler to be used for implementing anomaly detection and control flow mechanisms on low-cost embedded systems without the need for firmware or hardware redesign. In comparison with previous work [6], [7] that uses wiring or multiple measurement points, our approach leverages the presence in the device’s board of electronic components that generate EM emanations (e.g., amplifiers) correlated to the internal processor operations. Using a simple ran- dom forest algorithm for classification, we achieve single instruction granularity with 88.69% accuracy over twelve different instructions on an ATMega328P 16MHz pro- cessor. This is an improvement over previous work [6] which required multiple measurement points and was only tested on a 4MHz processor to achiev | non_poster |
Characteristics, treatment, and outcomes of Paranoid Personality Disorder: A systematic review of case report and case series. Search Strategies 1. MEDLINE/PubMed (National Library of Medicine) Website: https://pubmed.ncbi.nlm.nih.gov/ Search strategy: disorder, paranoid personality[ti] Filters: humans Fields: All Fields. Loging required References exported by own PubMed Investigator: Giancarlo Xavier Aguagallo Sanaguano 2. Elsevier (ScienceDirect) Website: https://www.sciencedirect.com/ Search strategy: Paranoide OR paranoid Refine by: review articles and research articles. Loging required References exported using zotero Investigator: German Santiago Cajamarca Bolaños 3. Biblioteca Virtual de salud (BVS) Website: https://bvsalud.org/es/ Search strategy: Paranoid Personality Disorder ; Trastorno Paranoide de la Personalidad Búsqueda por: Título Restricción de idioma: Ingles, español,portugués References exported by own BVS Investigator: Mishel Carolina Callatasig Chisaguano 4. WorldWideScience Website: https://worldwidescience.org/ | non_poster |
www.Lnu.se Quantum Theory: from foundations to technologies International Centre for Mathematical Modelling in Physics, Engineering and Cognitive Sciences Linnaeus University, Växjö, Sweden June 8-11, 2015 List of abstracts | non_poster |
A mechanistic in silico molecular recognized approach for the ligand based generation of a dual N-formyl-Met-Leu-Phe (fMLP), and MMK-1peptide mimetic hyper-agonist fMLP targeted receptor against the PGE2 EP4 pathway chemotherapy-induced alopecia. Grigoriadis Ioannis1, Grigoriadis George2 and Grigoriadis Nikolaos3* 1.Department of Computer Drug Discovery Science, BiogenetoligandorolTM, Thessaloniki, Greece, 2.Department of Stem Cell Bank and ViroGeneaTM, Biogenea Pharmaceuticals Ltd, Thessaloniki, Greece, 3.Department of IT Computer Aided Personalized Myoncotherapy, Cartigenea-Cardiogenea, Neurogenea-Cellgenea, Cordigenea-HyperoligandorolTM, ABSTRACT: It has been shown that the Oral administration for 6 days of 100 mg/kg MMK-1, of an agonist peptide selective for the FPRL1 receptor, suppressed alopecia induced by the anticancer drug etoposide in neonatal rats. However, the anti-alopecia effect of orally administered MMK-1 was inhibited by indomethacin, an inhibitor of cyclooxygenase (COX), or AH-23848B, an antagonist of the EP4 receptor for prostaglandin (PG) E2, suggesting involvement of PGE2 release and the EP4 receptor in the oral MMK-1 anti-alopecia mechanism. The anti-alopecia effect of orally administered MMK-1 was also blocked by an inhibitor of nuclear factor-kappaB (NF- kappaB), pyrrolidine dithiocarbamate, suggesting that the oral anti-alopecia effect of MMK-1 may be mediated by activation of NF-kappaB. These results suggested that MMK-1 bound to FPRL1 receptor might suppress etoposide-induced apoptosis of hair follicle cells and alopecia by way of PGE2 release and NF-kappaB activation. Previously, it has also been found that an intraperitoneally administered chemotactic peptide, N-formyl-Met-Leu-Phe (fMLP), and MMK-1, a selective agonist of formyl peptide receptor-like 1 (FPRL1) receptor, the low affinity subtype of the fMLP receptor, prevented the alopecia in neonatal rats induced by the anticancer agent etoposide. The anti-alopecia effect of fMLP was not inhibited at all by Boc-FLFLF, a selective antagonist of formylpeptide receptor (FPR), which is the high affinity subtype of the receptor, but it was partly inhibited by Trp-Arg-Trp-Trp-Trp-Trp-NH(2) (WRW(4)), an antagonist of FPRL1 receptor. The anti-alopecia effects of fMLP and MMK- 1 were also inhibited by Lys-D-Pro-Thr (K(D)PT) and pyrrolidine dithiocarbamate, which are inhibitors of interleukin-1 (IL-1) and nuclear factor-kappaB (NF-kappaB) respectively. Computational methods utilizing the structural and functional information help to understand specific molecular recognition events between the target biomolecule and candidate hits and make it possible to design improved lead molecules for the target. Here we represents a massive on-going scientific endeavor to provide a freely accessible state of the art software suite for protein and DNA targeted lead molecule discovery. by resulting in a Mechanistic in silico molecular recognized approach for the ligand based generation of a dual N-formyl-Met-Leu-Phe (fMLP), and MMK-1peptide mimetic agonists formyl-peptide hyper-agonist interactive receptors against chemotherapy-induced alopecia. II METHODS Α Sequential Solution of the Poisson-Boltzmann Equation through a Combination Index Dynamic Unified Theorem for Multiple Entities: and when m ≠ 1, then: Based on Eqs. 1 and 2, in conjunction with Eq. 4, Chou and Talalay in 1983 introduced the term combination index (CI) for quantification of synergism (CI<1), additive effect (CI=1), and antagonism (CI>1) [6,13,14], where at x% inhibition, the general equation for two drugs is given below: A typical presentation of algorithms and graphics of CI values as a function of effect (fa) is illustrated in Figure 2. The resulting Fa-CI plot is also called Chou-Talalay plot. The Fa-CI plot and isobologram are two sides of the same coin, where Fa-CI plot is effect-oriented and the isobologram is dose-oriented (Figure 1). More details have been given in Reference 6. The algorithm for | non_poster |
Home Astronomy for early childhood and its assessment 5th Shaw-IAU Workshop on Astronomy Education November 29 to December 1, 2023, online Akihiko Tomita, Wakayama University, Japan Takuya Kotani, Osaka Ohtani University, Japan Yoshiko Nagase, Osaka Ohtani University, Japan Yukiko Takegawa, Science Planning Office for Kids, Japan Hiromi Tsuji, Osaka Shoin Women’s University, Japan Problem Teachers of nurseries/kindergartens/preschools like fun play of science, but they are less confident in science activity. Possible solution Introduce playing with science in everyday life. Teachers are already experts of it! But how to evaluate it? Kitchen Science Outdoor / Nature game Living things Landscape Water/ Sand/Rock Sky / Universe | non_poster |
1 Supporting material for poster: Soil moisture drydown curves after flooding events across an irrigated farmland Presented at: AmeriFlux “Land-Atmosphere Interactions – Workshop” from June 10 – June 11, 2021 (https://ameriflux.lbl.gov/community/ameriflux-meetings-workshops/land-atmosphere-interaction-workshop- overview/). Gaxiola-Ortiz F., Álvarez-Yepiz J. C., Franz T., Garatuza-Payan J., Guevara M., Peñuelas-Rubio O., Rosolem R., Torres-Velázquez J. R., Yepez E. A., Sanchez-Mejia Z. By: Francisco Gaxiola-Ortiz (francisco.gaxiola111644@potros.itson.edu.mx, ORCID 0000-0001-9244-2049). Revised by: Dr. Zulia Mayari Sánchez Mejía (zulia.sanchez@itson.edu.mx, ORCID 0000-0001-8444-3885). Methods and equations 1. Soil moisture observations 1.1 Integrated soil moisture (𝜃) from the TDR sensors. Two TDR 𝜃 sensors (see section 4) were buried in the study site, both observe 6 depths simultaneously (5, 10, 20, 30, 40 and 50 cm). To be compared with a CRNS we only used the depths up to 30 cm, so we obtained daily means for the 5, 10, 20 and 30 cm from both sensors. The 𝜃 of all the depths was averaged for every sensor (eq 1 and eq 2) and then averaged between both sensors daily (eq 3). 𝜃𝑣𝑒𝑔= (𝜃5𝑐𝑚+ 𝜃10𝑐𝑚+ 𝜃20𝑐𝑚+ 𝜃30𝑐𝑚) 4 ⁄ (eq 1) where 𝜃𝑣𝑒𝑔 is the daily integrated soil moisture for the sensor in the vegetation (ridge) site (cm³/cm³) and 𝜃5−30𝑐𝑚 is the daily soil moisture for every specific depth for the sensor in the vegetation (ridge) site (cm³/cm³). 𝜃𝑏𝑎𝑟𝑒= (𝜃5𝑐𝑚+ 𝜃10𝑐𝑚+ 𝜃20𝑐𝑚+ 𝜃30𝑐𝑚) 4 ⁄ (eq 2) where 𝜃𝑏𝑎𝑟𝑒 is the daily integrated soil moisture for the sensor in the bare soil (furrow) site (cm³/cm³) and 𝜃5−30𝑐𝑚 is the daily soil moisture for every specific depth for the sensor in the bare soil (furrow) site (cm³/cm³). 𝜃𝑇𝐷𝑅= (𝜃𝑣𝑒𝑔+ 𝜃𝑏𝑎𝑟𝑒)/2 (eq 3) Where 𝜃𝑇𝐷𝑅 is the daily integrated soil moisture for the first 30 cm and both sensors (cm³/cm³), 𝜃𝑣𝑒𝑔 is the daily integrated soil moisture for the sensor in the vegetation (ridge) site (cm³/cm³) and 𝜃𝑏𝑎𝑟𝑒 is the daily integrated soil moisture for the sensor in the bare soil (furrow) site (cm³/cm³). 1.2 Cosmic-Ray Neutron Sensor (CRNS) calibration and estimate of 𝜃. A CRNS is a tool that observes neutrons, to use it to estimate 𝜃 we first must correct and calibrate the neutron counts observed by the sensor following a standardized procedure (Franz et al., 2020). To do this, a field sampling took place to obtain 𝜃 from the gravimetric method. Then, the time series of the CRNS for that specific day was used to apply the corrections for air pressure (eq 4), water vapor (eq 5) and neutron intensity (eq 9) (Desilets et al., 2010; Desilets & Zreda, 2006; Rosolem et al., 2013). Equations 6, 7 and 8 are for absolute humidity (𝜌𝑣), actual vapor pressure at surface (𝑒) and saturated vapor pressure at surface (𝑒𝑜) respectively, obtained from (Stull., 2011). 𝑓𝑝= exp ( 𝑃−𝑃𝑜 𝜆) (eq 4) | non_poster |
Analysis of HARPS Astro-Comb data Dinko Milakovic, Luca Pasquini, Gaspare Lo Curto, G. Avila, A. Manescau, B.N. Canto Martins, I.C. Leão, J.R. De Medeiros, M. Esposito, J.I. González Hernández, R. Rebolo, R. Probst, T. Steinmetz, T. W. Hänsch, Th. Udem, R. Holzwarth | non_poster |
Simelys Hernández Scale up of a photoelectrochemical process: Current status and challenges Simelys Hernández Associated Professor * E-mail: simelys.hernandez@polito.it CREST Group, DISAT, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Torino (Italy) Center for Sustainable Future Technologies, CSFT@POLITO, Italian Institute of Technology, C.so Trento 21, 10129 Torino (Italy) CO2OLING THE EARTH SUMMER SCHOOL September 28th, 2021 | non_poster |
Music and astronomy. Radio Clásica's Longitud de Onda Club Band José A. Caballero1, Fernando Blázquez2, Yolanda Criado2 1Centro de Astrobiología, CSIC-INTA; 2Radio Clásica, Radio Nacional de España "¡Hola y saludos a todos!". Does listening to Mozart make us smarter? How could Beethoven going on composing when he became deaf? How are the places with the best acoustics? Is there music outside our planet? Music, science and new technologies, and their relation, are the central axis of Longitud de Onda (Wavelength), a unique radio programme in Spanish radio. The LDO “astrónomo de cabecera” recounts his wanderings and adventures at the Radio Clásica studio, accompanied by microphones, two awarded presenters and a grand piano (and, from time to time, some guests).”Y que la Fuerza os acompañe". @radioclasica o #LDOnda http://exoterrae.eu/ldo.html http://zenodo.org/communities/sea2022/… | non_poster |
EUROPT(R) ODE XVI Sunday 24 – Wednesday 27 March 2024 University of Birmingham XVI CONFERENCE ON OPTICAL CHEMICAL SENSORS AND BIOSENSORS Conference Chair: Dr Ruchi Gupta, University of Birmingham | non_poster |
nanoTrek® - Quantum Tunneling Linear Encoder for Sub-nanometer Positional Metrology with Centimeters Range M.T. Michalewicz*, P. Glowacki*, N. Singh**, S. Balakumar** and N. N. Gosvami*** *Quantum Precision Instruments Asia Pte Ltd, 14A Prince George’s Park, Singapore 118413, marek@quantum-pi.com , piotr@quantum-pi.com **Institute of Microelectronics, 11 Science Road, Singapore 117685, navab@ime.a-star.edu.sg, ***Department of Mechanical Engineering, National University of Singapore, 9 Engineering Drive 1 Singapore 117576, ngosvami@nus.edu.sg ABSTRACT Realisation of the first working linear encoder based on quantum tunneling between arrays of nanowires is presented. The sensing element consists of 12,000 nanowires, each 90 nm wide and 5 mm long, on an area of 5 x 4.3 mm. The sensing element was fabricated using phase shift mask lithography and dry etch processes followed by CMP; characterisation was carried with SEM and AFM. Finally transduction mechanism, showing linear encoder performance was demonstrated with electrical testing using independent nanopositioner. Strong signals in µA range are obtained on scans from several hundred nm to several mm range. nanoTrek® may address problems of dimensional metrology and alignment at the next technology nodes in micro-fabrication, nano-positioning and nano-imprinting. Keywords: quantum tunneling, NEMS, positional metrology, linear encoder, tunneling sensors 1 MOTIVATION Sub-nanometer dimensional metrology is critical to advance microelectronic manufacturing below the 100 nm critical dimensions limit, and then on to the next nodes defined by Sematech International: 65 nm and 45 nm. Metrology tools to reach those next nodes are not well developed. New sub-nanometer metrology solutions and new technology is required [1]. Quantum-π proprietary technology [2,3] is well suited to offer those solutions and to provide the necessary metrology tools. Nanometer and sub-nanometer scale positional metrology is also critical to advancements in nanotechnology, in general. 2 nanoTrek® CONCEPT Quantum-π technology utilizes physical phenomenon of electron tunneling. Quantum electron tunneling occurs when two electrical conductors are placed in a very close proximity to each other and are separated by an insulating layer. When small bias potential is applied between conductors, electric current flows between them despite no apparent “presence or availablity” of electric carriers in the gap region. Quantum tunneling is an exceedingly sensitive probe of inter-electrode separation, electrode area, the type of electrode material and the nature of intervening insulator. Quantum-π technology is based on variable overlap area of the electrodes. A generic Quantum-π nanoTrek® device is composed of two plates separated by a very thin layer of soft-matter spacer insulator. Several hundred to several thousand nanowires are fabricated on each substrate. The nanowires on the two surfaces facing each other and aligned with each other form elongated electrodes in the tunneling process. Substrates are allowed to slide past each other while their normal separation remains constant – this makes our device distinctly different from any previously built tunneling sensors where cantilevers and tips were critical elements and it was variable inter-electrode separation that produced transduction signal. Any lateral shift of substrates with nanowires will induce change in alignment and that in turn will result in measurable changes of electrical current flowing between the plates. This effect is demonstrated on Figures 1 and 2. Figure 1: Idealised device showing strips of conductors perfectly overlapping each other (top projection at left panel, cross section at middle panel, max current – right panel). Figure 2: Idealised device showing strips of conductors in off-set position (top projection at left panel, cross section at middle panel, results in no current – right panel). | non_poster |
ANAIS 2017 VI CEFIVASF VI CONGRESSO DE EDUCAÇÃO FÍSICA DO VALE DO SÃO FRANCISCO 24 a 26 de Agosto de 2017, Petrolina-PE / Juazeiro-BA Educação Física no Brasil: Aplicações na Escola, Saúde e Desempenho GEPEGENE CEFIS Colegiado de Educação Física Prefeitura de Juazeiro O trabalho segue em frente para mudar ainda mais Ministério da Saúde Ministério do Esporte Realização Patrocínio Apoio Sec. Executiva TREINAMENTOS E EVENTOS FACULDADE INSPIRAR ® WZ PETROLINA | non_poster |
Colección de ESMOS 1 El sensor de la glucosa Bezie Guadalupe Espinoza-Herrera* iD Licenciatura en Biotecnología, Facultad de Ciencias Biológicas, Benemérita Universidad Autónoma de Puebla, Puebla, México. *Email: betzie.espinozah@alumno.buap.mx 21 de Noviembre de 2022 DOI: http://doi.org/10.5281/zenodo.7341273 Editado por: Jesús Muñoz-Rojas (Instituto de Ciencias, Benemérita Universidad Autónoma de Puebla). Revisado por: Cristina Domínguez Castillo (Facultad de Medicina, Benemérita Universidad Autónoma de Puebla, Puebla, México). Colección de ESMOS Resumen Las enzimas son proteínas involucradas en la catalización de reacciones en el organismo de los seres vivos. Es por esto que su estudio es de gran importancia, porque permite conocer las funciones que realizan y las consecuencias de su ausencia o disminución. La glucoquinasa (GK) es clasificada como una enzima fosforilante, lo que significa que adiciona un grupo fosfato a otras moléculas. Está clasificada | non_poster |
Designing, Building, and Characterizing RF Switch-based Reconfigurable Intelligent Surfaces Marco Rossanese NEC Laboratories Europe marco.rossanese@neclab.eu Placido Mursia NEC Laboratories Europe placido.mursia@neclab.eu Andres Garcia-Saavedra NEC Laboratories Europe andres.garcia.saavedra@neclab.eu Vincenzo Sciancalepore NEC Laboratories Europe vincenzo.sciancalepore@neclab.eu Arash Asadi TU Darmstadt, Germany aasadi@wise.tu-darmstadt.de Xavier Costa-Perez i2cat, NEC Labs Europe, ICREA xavier.costa@neclab.eu ABSTRACT In this poster, we present the Reconfigurable Intelligent Surface (RIS) that we designed, built, and tested. At first, the RIS technology is briefly discussed, subsequently, our prototype details are explained, and finally, we conclude by showing the obtained test results. Our RIS design comprises arrays of patch antennas, delay lines, and pro- grammable radio-frequency (RF) switches that enable almost-passive 3D beamforming, i.e., without active RF components. 1 INTRODUCTION Reconfigurable Intelligent Surfaces (RISs) are well per- ceived as a key technology for next-generation mobile systems [2]. A RIS can be seen as a planar structure able to manipulate the electromagnetic response of the impinging RF signals. A typical RIS can programmatically re-focus the re- ceived signal towards selected directions by changing the phase shifts of its antennas/reflectors. This ability of the RIS opens a new paradigm of wireless environment: traditionally it has been treated as an optimization con- straint, but now it plays an active role in the system, creating the so called Smart Radio Environment [1]. For instance, the presence of a RIS can be beneficial when the line of sight between the base station and the user is obstructed; the user can rely on the RIS, which still has a direct channel with the base station and can beamform the signal to the user. This scenario is depicted in Fig. 1. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). ACM MobiCom ’22, October 17–21, 2022, Sydney, NSW, Australia © 2022 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-9181-8/22/10...$15.00 https://doi.org/10.1145/3495243.3558256 RIS TX RX Figure 1: Scenario with blocked RX. Figure 2: Example of RIS beamforming. Beamforming is a technique that exploits the phe- nomenon of interference: in the RIS case, the signals are received by the antennas, forwarded to the phase shifters, and finally retransmitted. If the phase shift for each antenna is correctly applied, then the signals will constructively interfere towards the desired direction and destructively interfere with the rest. Therefore, the signal is reinforced and the power channeled where it is needed, as represented in Fig. 2. In addition, RISs are supposed to be cheap and low consuming devices, hence they must satisfy the follow- ing requirements: (𝑖) RISs shall (re-)steer RF signals with minimal power loss; (𝑖𝑖) RISs must not use active RF com- ponents; (𝑖𝑖𝑖) RISs must minimize the energy required to re-configure their reflective cells; (𝑖𝑣) RISs shall be re- configurable in real-time; and (𝑣) RISs must be amenable to low-cost production at scale. 2 OUR RIS PROTOTYPE Our prototype [3] is built in PCB technology with a thickness of 0.6mm, it contains 100 patch antennas dis- posed in a 10x10 grid and all the necessary electronic components; the RIS prototype can be seen in Fig. 4. The working frequency of the antennas is 5.3 GHz with a bandwidth of 100 MHz and the antennas are separated by an inter-element distance between antennas of 𝜆/2. The RIS is designed with a 3bit phase shift granularity; the phase shifting procedure is the me | non_poster |
Conferencia de la Asociación Poblana de Ciencias Microbiológicas 1 Curso Taller Curso-Taller ¿Cómo usar INOCREP? Yolanda Elizabeth Morales-García iD Grupo Inoculantes Microbianos, Facultad de Ciencias Biológicas, Benemérita Universidad Autónoma de Puebla *Email: yolanda.moralesg@correo.buap.mx http://doi.org/10.5281/zenodo.14292382 Sesión 238 Fecha de publicación: 7 de diciembre de 2024 Editado por: Jesús Muñoz-Rojas (Instituto de Ciencias, BUAP). Revisado por: Dolores Castañeda Antonio (Instituto de Ciencias, BUAP). Resumen INOCREP es una formulación multiespecies de segunda generación que fue diseñado para potenciar el crecimiento de plantas de interés agrícola [1] y posteriormente plantas de jardín [2]. Los inoculantes microbianos de segunda generación son desarrollos más avanzados en el campo de los inoculantes biológicos utilizados en agricultura [3]. A diferencia de los inoculantes de primera generación, que usualmente contienen un solo tipo de microorganismo beneficioso (como rizobios para la fijación de nitrógeno en leguminosas), los de segunda generación suelen ser formulaciones más complejas y con mejores propiedades que los de primera generación [2, 4, 5]. INOCREP contiene 6 especies bacterianas compatibles entre sí, pero que producen sustancias inhibitorias contra microorganismos patógenos [1, 4]. Las cepas bacterianas de este inoculante son tolerantes a desecación por lo que pueden ser aplicadas en zonas de baja disponibilidad de agua y cuando hay condiciones propicias | non_poster |
Efficiency of different trap types for the monitoring of Philaenus spumarius A. Markheiser1, L. Reinhard2, D. Kröhner1,3,Y. Kappel1,3, M. Maixner1 1 JKI, Institute for Plant Protection in Fruit Crops and Viticulture, Siebeldingen, Germany 2 University Koblenz-Landau, Landau, Germany 3 Public Service Center for Rural Development (DLR-Mosel), Bernkastel-Kues, Germany | non_poster |
Robust public computational services supporting proteomics for Australian researchers Johan Gustafsson, Andrew Lonie, Jeffrey Christiansen, Simon Gladman, Gareth Price | non_poster |
“A SAÚDE É PARA TODOS” RESUMO SIMPLES ANAIS | non_poster |
Hassan Baghbani Mahdi Rokni, Fatemeh Hasheminasab, Elham Rajaei, Ayda Rajaei, Mina Someilipour, Ameneh Jamali, Fatemeh Baghbani www.skylian.org Hasan.baghbani1971@gmail.com Astronomy And Environmental Protection Mehr Observatory- IRAN, ITAU | non_poster |
Reproducible geographic methods for priortising safe routes to school in data poor environments Robin Lovelace∗1 and Eli Pousson2 1University of Leeds, Active Travel England, UK 2Baltimore Plannning Department, USA January 20, 2023 Summary Safe routes to school have great potential to tackle a wide range of social and environmental challenges, leading to the development of geographic methods to answer the question of ’where to build’. Existing research in the area suffers from various limitations, including low geographic resolution, a focus on only one active mode (cycling) to the expense of others (e.g. walking and scooting), and the fact that the approach only works in ’data rich’ contexts. The aim of this paper is to outline geographic methods that can overcome this final limitation. KEYWORDS: transport, active travel, routing, development. 1 Introduction Physical inactivity, climate change, and mental health are three of most pressing problems of the 21st century. Although the evidence on each issue is still emerging, each is well-documented in the scientific literature Department of Health (2004). In this context, interventions that enable active travel, “moving on your own steam”, can be considered as a “miracle pill” (Pont et al. 2010). By active travel we mean school pupils ‘moving on their own steam’ by one of the following modes of transport: • Walking • Wheeling, which can include scooting, rollerblading, or even skatingboarding • Biking, using a pedal cycle • Ebiking, using a pedal cycle with electric assist (aka pedelec) Active travel tackles physical inactivity by embedding exercise into everyday life, rather than treating as a separate (often competitive and potentially unpleasant) activity typically labelled as “sport”. It tackles the root causes of climate change by reducing car dependency and enabling low energy lifestyles. And it can improve mental health outcomes. ∗r.lovelace@leeds.ac.uk | non_poster |
2018 25 October 2018 Szeged Hungary International Conference on Science, Technology, Engineering and Economy | non_poster |
A look at the Norwegian krone since the euro “Curbing the exploitation of oil and gas resources is not a feasible alternative. The abiding question is how to limit the vulnerability associated with increased oil dependence.” Øystein Olsen, Governor Norges Bank, 14 February 2013 by geirmund@gmail.com | non_poster |
‘’Ultra-compact, low-cost plasmo-photonic bimodal multiplexing sensor platforms as part of a holistic solution for food quality monitoring’’ Newsletter N° 1 – March 2022 The project is funded by Horizon 2020, the EU Framework Programme for Research and Innovation for 2014-2020 under grant agreement No 101007448. The project is an initiative of the Photonics Public Private Partnership FLEXIBLE FARM-TO-FORK SENSING - Call identifier: H2020-ICT-2020 | non_poster |
Bidyarthi Dutta1 & Anup Kumar Das2 1Department of Library & Information Science, Vidyasagar University, West Bengal 2Centre for Studies in Science Policy, Jawaharlal Nehru University, New Delhi, Email: anup_csp@jnu.ac.in Introduction • India has a rich legacy in astronomical traditions dating back more than two millennia. • The remarkable contributions by Aryabhatta, Varahamihira, Brahmagupta, Bhaskara-I and Bhaskara-II glorify heritage in Indian astronomy. • It is interesting to note that of all science disciplines, astronomy is the first stepping stone towards the scientific mission of systematic observations followed by mathematics. • The astronomy here indicates only observational or positional astronomy, which introduced the concept of linking movement of celestial objects and seasons on the earth. Indian Astronomical Traditions and Noted Astronomers (As listed on Wikipedia) References 1. Rahman, A. (1984). Science and Technology in India. CSIR-NISTADS, New Delhi. 2. Das, G., Das, A. K., & Dutta, B. (2021). Exploring 120 years of Indian physics and astronomy journals. Annals of Library and Information Studies, 68(3), 238-257. 3. Das, G., Dutta, B., & Das, A. K. (2022). Citation Trend of Indian Physics and Astronomy Research during 2005-2020 through the Lens of Some New Indicators. DESIDOC Journal of Library & Information Technology, 42(1), 30-37. Discussion The footstep of modern astronomy in India was in tow with the Europeans. The earliest recorded use of a telescope in India was by Jeremiah Shakerley (1626-1655), who viewed the transit of Mercury in 1651 from Surat in western India. In 1689, Jesuit priest Father Jean Richaud (1633-1693) discovered from Pondicherry that the bright star Alpha Centauri is a double-star. In 1764, Major James Renell (1742-1830) was appointed as the East India Company surveyor and astronomy was hitherto used in the process of surveying. This particular application of astronomy paved the way towards the institutionalisation of modern astronomy in India. In 1787, Madras Observatory was initiated by William Petrie, an officer of the East India Company with the use of two 3" achromatic telescopes, two astronomical clocks and a transit instrument. Around hundred and ten years later in 1899, astronomical activity of the observatory was shifted to Kodaikanal and Madras observatory became a purely meteorological observatory. The systematic solar observations were commenced at Kodaikanal Observatory in early 1901. As per B. K. Sen, there were 103 observatories in India in 1878, which was increased to 128 in 1885. Conclusion • There is a need prepare a compendium of works of Indian Astronomers and Mathematicians and preserve the Indian Traditional Knowledge in the domains of Mathematics, Astronomy and Astrophysics. • There is a need for popularizing concepts and ideas of Indian Mathematicians, Astronomers, and Astrophysicists amongst the school and college going students and general public. An Analytical Study of Traditional Knowledge in Indian Astronomy during Ancient and Medieval Period Classical (Cont.) • Śaṅkaranārāyaṇa, (840 – 900 CE) • Vaṭeśvara (born 880 CE) • Mahavira (9th century CE) • Jayadeva (9th century CE) • Aryabhata II (920 – 1000 CE) • Vijayanandi (940–1010 CE) • Halayudha (10th Century CE) • Śrīpati (1019–1066 CE) • Abhayadeva Suri (1050 CE) • Brahmadeva (1060–1130 CE) • Pavuluri Mallana (11th century CE) • Hemachandra (1087–1172 CE) • Bhaskara II (1114–1185 CE) • Someshvara III (1127–1138 CE) Medieval Period (1200–1800 CE) • Kerala School of Mathematics and Astronomy • Madhava of Sangamagrama • Parameshvara (1360–1455 CE), discovered drk-ganita, a mode of astronomy based on observations • Nilakantha Somayaji (1444–1545 CE), mathematician and astronomer • Shankara Variyar (c. 1530) • Jyeshtadeva (1500–1610 CE), author of Yuktibhāṣā • Achyuta Pisharati (1550–7 July 1621), mathematician and astronomer • Melpathur Narayana Bhattathiri (1560– 1646/1666) Ancient • Baudhayana sutras (fl. c | non_poster |
Bringing Astronomy to the students and teachers using “AppStronomy” Rupesh Labade Inter-University Centre for Astronomy and Astrophysics (IUCAA),INDIA | non_poster |
Page | 1 The Potential of Social Media Analysis for Tourism in Indonesia Raidah Hanifah *1,2, Alexis Comber †2, Nicholas Malleson ‡2 and Victoria Houlden§2 1Departement of Informatics, Institut Teknologi Sumatera 2School of Geography, University of Leeds GISRUK 2023 Summary Nowadays, social media are recognised as a media for information aggregation rather than just a sociability and gathering platform. Because of the exponential growth of social media usage, there has been an explosion of social media data produced by its users as UGC (User Generated Content), which can be stored in a variety of formats, including textual data, images, videos, audio, and geolocations. This potential can be used to explain various phenomena and solve problems in the tourism sector. This study will examine the use of social media data to gain a better understanding of Indonesian tourism. KEYWORDS: Social Media, UGC, Tourism, Indonesia 1. Introduction 1.1. Social Media Analysis The perspective of social media has evolved through time. Aichner et al. (2021) found that prior to 2010, social media was typically viewed as a tool for connecting people with similar interests. After 2010, the emphasis shifted to creating and sharing User Generated Content (UGC). However, the role of social media as a facilitator of human connection and a means of connecting with other users remains unchanged. Social media technologies have recently been widely acknowledged for their ability to promote information aggregation (Kapoor et al., 2018). They are no longer merely seen as sociability and gathering platforms. The exponential growth of social media usage has resulted in an explosion of social media data producing by its users as UGC, which can be stored in various formats, including textual data, images, videos, audio, and geolocations (Stieglitz et al., 2018). Social networks' widespread adoption and use provide a rich data source that can be used to answer a wide range of research questions from various disciplines (Dwivedi et al., 2021). Specifically, the analysis of social media data offers the possibility of gaining a deeper understanding of societal phenomena, generating numerous opportunities for businesses such as a competitive advantage, and influencing political outcomes or public opinion (Zachlod et al., 2022). Furthermore, Zachlod et al., (2022) investigated the definition of social media analytics and suggested a definition namely an interdisciplinary research field that focuses on developing, adapting, and extending informatics tools, * raidah.hanifah@itera.ac.id/gyrh@leeds.ac.uk † a.comber@leeds.ac.uk ‡ n.s.malleson@leeds.ac.uk § v.houlden@leeds.ac.uk | non_poster |
Single molecule studies of membrane proteins on glass substrates using atomic force microscopy Nagaraju Chada1, Krishna P. Sigdel1, Tina R. Matin1, Raghavendar Reddy Sanganna Gari1, Chunfeng Mao2, Linda L. Randall2, and Gavin M. King1,2 1Department of Physics and Astronomy, 2Department of Biochemistry, University of Missouri, Columbia, Missouri, USA 65211 Abstract Since its invention in the mid-1980s, the atomic force microscope1 (AFM) has become an invaluable complementary tool for studying membrane proteins in near-native environments. Historically, mica is the most common substrate utilized for biological AFM. Glass being amorphous, transparent, and optically homogeneous has its own set of advantages over mica and has the potential to broaden the use the AFM into fields that require high quality non-birefringent optical access. The use of silanized glass as AFM substrates has been reported as a means to fine tune surface chemistry. However, such coatings usually require hours of additional preparation time and can lead to increased surface roughness. In this work2, we present a simple technique for preparing borosilicate glass as a substrate for two membrane systems: non- crystalline translocons (SecYEG) of the general secretary system from E. coli, and bacteriorhodopsin (BR) from H. salinarum. For both these membrane proteins, quantitative comparisons of the measured protein structures on glass versus mica substrates show agreement. An additional advantage of glass is that lipid coverage is rapid (< 10 minutes) and complete (occupying the entire surface). A goal is to study the bacterial export system using recently developed precision measurement techniques such as ultra-stable AFM. Why use glass as a substrate? Typical AFM substrates mica and HOPG exhibit birefringence, complicating optical paths Many well established biological and biochemical assays like FRAP, FRET, Fluorescence Microscopy, FIONA and TIRF require transparent and optically homogeneous substrates Recently developed techniques like US-AFM4, 3D AFM and polarization anisotropy methods require transparent substrates and non-birefringence due to polarization based detection Amorphous and optically homogeneous substrates like glass enable coupling AFM with advanced imaging techniques2 Heights of SecYEG Potential Applications Raw glass vs. KOH treated glass References Acknowledgements This work was supported by the National Science Foundation (CAREER Award #:1054832), the Burroughs Wellcome Fund (Career Award at the Scientific Interface) and the MU Research Board. We thank the JILA Scientific Communications Office for artwork. High Resolution Images of SecYEG Bacteriorhodopsin on Glass and Mica Evaluating Different Cleaning Treatments Sec-translocase >30% of proteins are transported from the site of synthesis into or through a membrane5 In E. coli, the Sec system orchestrates the translocation of polypeptides across membrane before they acquire stable tertiary structure and SecYEG provides the path way5,6 SecA and SecB act as chaperones to maintain newly synthesized polypeptides in a state compatible with transport6 Numerous questions remain regarding the mechanistic details of translocation Novel AFM modalities could measure molecular “fly fishing”6 Map trajectories of protein domains in 3D Dynamic Loops of SecYEG, linking transmembrane helices 6-7 and 8-9, play a vital role in capturing SecA and in translocation Probing translocation of precursor through Sec- translocase 1. Binnig, G.; Quate, C. F.; Gerber, Ch. (1986). "Atomic Force Microscope". Physical Review Letters. 56 (9): 930–933 2. Chada, N., Sigdel, K., Gari, R. et al. Glass is a Viable Substrate for Precision Force Microscopy of Membrane Proteins. Sci Rep 5, 12550 (2015). https://doi.org/10.1038/srep12550 3. Chada, Nagaraju. "Growth and Characterization of Transition Metal Oxides for Chemical Sensor Applications: Setting up Initiated Hot Wire Chemical Vapor Deposition System." | non_poster |
Poster STI 2022 Conference Proceedings Proceedings of the 26th International Conference on Science and Technology Indicators All papers published in this conference proceedings have been peer reviewed through a peer review process administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a conference proceedings. Proceeding Editors Nicolas Robinson-Garcia Daniel Torres-Salinas Wenceslao Arroyo-Machado Citation: Wang, H., Chen, H., Meng, F., & Bu, Y. (2022). Towards "rich clubs" in scientific publications: A preliminary exploration. In N. Robinson-Garcia, D. Torres-Salinas, & W. Arroyo- Machado (Eds.), 26th International Conference on Science and Technology Indicators, STI 2022 (sti22117). https://doi.org/10.5281/zenodo.6951730 Copyright: © 2022 the authors, © 2022 Faculty of Communication and Documentation, University of Granada, Spain. This is an open access article distributed under the terms of the Creative Commons Attribution License. Collection: https://zenodo.org/communities/sti2022grx/ | non_poster |
Colección de ESMOS 1 Infografía Infografía sobre la α-Galactosidasa A Carlos Antonio Hernández Rivas* iD Licenciatura en Biotecnología, Facultad de Ciencias Biológicas, Benemérita Universidad Autónoma de Puebla, Puebla, México. *Email: carlos.hernandez.rivas@hotmail.com 06 de Febrero de 2023 DOI: http://doi.org/10.5281/zenodo.7613508 Editado por: Yolanda Elizabeth Morales-García (Facultad de Ciencias Biológicas, Benemérita Universidad Autónoma de Puebla. Revisado por: Jesús Muñoz-Rojas (Instituto de Ciencias, Benemérita Universidad Autónoma de Puebla). Colección de ESMOS Resumen La α-Galactosidasa A (α-D-Galactosidasa Galactohidrolasa) o α- Galactosidasa humana, es una enzima de tipo glucosidasa lisosomal, la cual se encarga de hidrolizar los enlaces galactosídicos dentro de los glicolípidos, es decir, degradarlos [1]. La enzima se encuentra activa dentro de los lisosomas, en las que procesa y recicla componentes celulares de los que se hace uso. La función específica de la enzima es la | non_poster |
Efeitos adversos Dor no local da aplicação Febre Mal-estar Mialgia (dor muscular) Linfadenopatia Dor Vermelhidão Ardência Coceira no local de aplicação Manchas vermelhas por todo o corpo acompanhadas ou não de coceira Febre de 39,50C ou mais. Surge normalmente no quinto dia após a vacinação e dura no máximo cinco dias. Leve vermelhidão Inchaço e dor no local da injeção Dor de cabeça Mal-estar Fraqueza e dores musculares Febre baixa Antirrábica: Tríplice viral: Febre amarela: UNIVERSIDADE FEDERAL FLUMINENSE ESCOLA DE ENFERMAGEM AURORA DE AFONSO COSTA DEPARTAMENTO DE FUNDAMENTOS DE ENFERMAGEM E ADMINISTRAÇÃO O que fazer em caso de eventos adversos? DOCENTE: PROFA. DRA. ALESSANDRA CAMACHO DISCENTE: ISABELLE DE FREITAS LOPES 10.5281/ZENODO.7686440 FOLDER EDUCATIVO SOBRE VACINAS INTRAMUSCULARES E SUBCUTÂNEAS 2020 - Procurar uma unidade de saúde caso o evento esperado ocorra de maneira mais intensa, demore muito a passar, ou se surgir qualquer outro sinal ou sintoma - Receber orientação profissional e ter seu caso notificado - Ser encaminhado, se necessário, para tratamento específico do evento adverso apresentado, em ambulatório ou unidade de saúde de maior nível de complexidade Referências VIGILÂNCIA dos Eventos Adversos Pós-Vacinação: cartilha para trabalhadores de sala de vacinação. [S. l.: s. n.], 2003. Disponível em: https://bvsms.saude.gov.br/bvs/publicacoes/cartilha_eadv_nivel _medio1.pdf. COMO FUNCIONAM AS VACINAS?. [S. l.], 3 fev. 2015. Disponível em: http://www.farmacia.pe.gov.br/noticia/como-funcionam- vacinas#:~:text=As%20vacinas%20agem%20estimulando%20o,g ermes%2C%20principalmente%20bact%C3%A9rias%20e%20v% C3%ADrus. A IMPORTÂNCIA da vacinação para a prevenção e controle de doenças. [S. l.], 10 jun. 2020. Disponível em: https://vidasaudavel.einstein.br/importancia-da-vacinacao/. CONHEÇA os possíveis efeitos colaterais da vacina contra a gripe. [S. l.], 23 mar. 2020. Disponível em: https://www.unimedlestepaulista.com.br/noticias/conheca-os- possiveis-efeitos-colaterais--da-vacina-contra-a-gripe. VACINA Antitetânica: reações adversas, validade e quando tomar. [S. l.], 18 jun. 2020. Disponível em: https://vacinas.com.br/blog/vacina-antitetanica-reacoes- adversas-validade-e-quando- tomar/#:~:text=Efeitos%20colaterais%20e%20rea%C3%A7%C3% A3o%20da%20vacina%20antitet%C3%A2nica&text=Febre%3B,C ansa%C3%A7o. REAÇÃO Vacinal - Febre Amarela. [S. l.], 29 jul. 2019. Disponível em: https://www.drakeillafreitas.com.br/reacao-vacinal-febre- amarela/. CUIDADOS APÓS RECEBER DOSE DE VACINA SÃO IMPORTANTES PARA GARANTIR PROTEÇÃO EFICAZ. [S. l.], 21 mar. 2019. Disponível em: http://www.campogrande.ms.gov.br/cgnoticias/noticias/cuidado s-apos-receber-dose-de-vacina-sao-importantes-para-garantir- protecao-eficaz/. | non_poster |
Dust attenuation in NGC 7793 Héctor Salas Olave | non_poster |
Background Environmental star formation quenching is the suppression of star formation in high-density regions. !1 Environment Density Stellar Mass Red Fraction Peng et al. 2010, ApJ, 721, 193 Spatial Resolving Galaxy Environmental Quenching in The SAMI Galaxy Survey SAMI IFU data Distribution of SF in the galaxies >>>>> SF quenching happened inside- out or outside-in in galaxies. Where and how quickly is SF quenching happen vs the environment >>>>>>>>>>>>>>>>> galaxy evolution. Presented by Di Wang SIFA Supervisor: Scott Croom Julia Bryant Spatial Resolving Galaxy Environmental Quenching in The SAMI Galaxy Survey | non_poster |
Using Tolkien's Calendar as a resource in science classes. Javier Vaquero-Martínez Methodology After 2000 years: Gregorian has counted +15 h; hobbit only -9 h! Results and Conclusions Drawbacks of the hobbit calendar: More variability: the period of 1000 year make differences fluctuate more Two leap years (end and beginning of millenia) in a row. Introduction The hobbit Calendar (same for every year!) Advantages of the hobbit calendar: Better coincidence in mean year duration. Same weekdays every year! Gregorian calendar - Years of 365 days - Every 4th year: leap year - Every 100th year: no leap year - Every 400th year: leap year again Hobbit calendar - Years of 365 days - Every 4th year: leap year - Every 100th year: no leap year - 1st and last year in a millenium: leap year again Calendar comparison Calendars: - Fundamental for societies - A measurement of time based on a pattern: a periodic event - Periodic event: position of the Sun (tropical year). - They are full of astronomy! Tolkien legendarium: - Tolkien created a realistic world, with geography, languages...and calendars! - Tolkien created different calendars. We focus on the hobbit calendar (described in LOTR Appendix). - Motivation for students: fantasy by Tolkien is specially popular since Peter Jackson films, and lately thanks to “The Rings of Power” TV show. Results Conclusions A way to increase curiosity about: ●- The solar system. ●- The difficulties of creating a calendar. ●- The difference between tropical and sidereal year. Think about the physical meaning of solstices, equinoxes and their importance in our lives (seasons, climate, agriculture,...) COULD WE IMPROVE THE HOBBIT AND GREGORIAN CALENDAR IN CLASS? | non_poster |
A Model and Image based Investigation of Xylella fastidiosa Dynamics Nancy Walker1 (N.C.Walker@soton.ac.uk), Kathryn Rankin2, Siul Ruiz1, Daniel McKay Fletcher1, Katherine Williams1, Chiara Petroselli1, Pasquale Salderelli3, Maria Saponari3, Steven White4, and Tiina Roose1 1 Bioengineering Sciences Research Group, Department of Mechanical Engineering, School of Engineering, Faculty of Engineering and Physical Sciences, University of Southampton, UK 2 µ-VIS X-ray Imaging Centre, Faculty of Engineering and Physical Sciences, University of Southampton, UK 3 Istituto per la Protezione Sostenibile delle Piante, CNR, Bari, Italy 4 UK Centre for Ecology & Hydrology, Maclean Building, Benson Lane, Crowmarsh Gifford, Wallingford, Oxfordshire, UK | non_poster |
Caracterización estudiantes con discapacidad matriculados en la Escuela Normal Superior 2022 | non_poster |
The Language Diversity of Computing Or, how to talk with a computer. Jeremy Yang (Mgr., Systems & Programming) Translational Informatics Div. Dept. of Internal Medicine University of New Mexico BioMISS -- Thursday, Oct 15, 2015 1 | non_poster |
XXVI Congresso Brasileiro de Física Médica IX Congresso Latino Americano de Física Médica Fortaleza – Brasil 07 a 11 de junho de 2022 Aplicação de algoritmo de registro rígido de imagens 3D/2D no Software RT Connect Pedro Argolo Piedade1,3,4, Carlos Queiroz3, Juliana Campos de Freitas2, Gilney Matias3,Thiago Fontana Schmeling4,Charlene Silva1 1Programa de Pós-Graduação em Tecnologias Radiológicas, IFSC, Florianópolis-SC, Brasil 2Programa de Pós-graduação em Biometria, UNESP, Botucatu-SP, Brasil 3RT Medical Systems LTDA, Florianópolis-SC, Brasil 4Radioterapia São Sebastião, Liga Catarinense de Combate ao Câncer, Florianópolis-SC, Brasil Resumo: O objetivo do estudo é descrever a aplicação do algoritmo de registro rígido desenvolvido em um microsserviço no software RT Connect por meio de um experimento com um phantom pélvico. Foi realizada uma tomografia computadorizada do phantom e criado um deslocamento nominal de +30mm nas direções lateral, vertical e longitudinal. O registro entre as imagens de radiografias digitalmente reconstruídas (DRR) e as imagens radiografia computadorizada (CR) resultou em valores de deslocamento do CR (medido) em relação ao DRR (nominal) menor que 1 mm. Os resultados mostraram-se promissores, mas uma investigação aprofundada é necessária para avaliar todo o potencial do método. Palavras-chave: radioterapia; registro de imagem; microsserviço; software. Abstract: The objective of the study is to describe the application of the image registration algorithm developed in a microservice in the RT Connect software. The experiment was performed using a pelvic phantom.A computed tomography scan of the phantom was performed and a nominal displacement of +30mm was created in the lateral, vertical and longitudinal directions. The registration between the digitally reconstructed radiography (DRR) images and the computed radiography (CR) images resulted in values of displacement of the CR (measured) in relation to the DRR (nominal) of less than 1 mm. The results were promising, but an in-depth investigation is needed to evaluate the full potential of the method. Keywords: radiotherapy; image registration; microservice; software. Introdução: O registro de imagens determina a transformação geométrica que relaciona pontos idênticos em duas séries de imagem (móvel e fixa), por isso, é uma etapa fundamental no processo de fusão. O registro rígido preserva a distância entre todos os pontos da imagem1,2. Nas aplicações de radioterapia, os registros de imagem são eficazes no monitoramento do deslocamento do paciente2. Para garantir a reprodutibilidade, podem ser utilizadas ferramentas que possibilitem a fusão de imagens tridimensionais (3D) com bidimensionais (2D), como propõe o software comercial RT Connect que possui um sistema para gestão das informações clínicas, cálculo de dose para verificação do planejamento, e visualização dos planos. O objetivo do estudo é descrever a aplicação do algoritmo de registro rígido desenvolvido em um microsserviço no software RT Connect por meio de um experimento com um phantom pélvico. Métodos: Para avaliar o método proposto, foram utilizadas imagens de um phantom pélvico da marca Brainlab o qual foi tomografado e posteriormente foram adquiridas imagens de radiografia computadorizada (CR) do mesmo utilizando um acelerador linear da marca Siemens modelo Primus nas angulações 0 e 270 graus. O conjunto de dados de teste foram produzidos fixando os valores de deslocamento nas direções: lateral, vertical e longitudinal, com os valores de deslocamento nominais de +30mm, +30mm e +30mm. Exemplos dessas imagens e do setup são mostrados na Figura 1. A imagem de tomografia é carregada no microsserviço que realiza a reconstrução da série de imagens 3D em duas radiografias digitalmente reconstruídas (DRR's) nos ângulos 0° e 270° na dimensão 2D utilizando o método proposto por Dong et al.3 A imagem CR é re-escalada para a mesma dimensão do DRR e são corrigidas as rotações provenientes de erros | non_poster |
Today, we keep too much information on our devices which is very important for our life with this there is possibility that our device has been stolen. A mobile device is very important in investigation making mobile forensics very important for court proceedings and criminal investigations. Important: mobile forensics, mobile devices, tools ANDROID VS iOS PHONE FORENSICS: TOOLS AND TECHNIQUES Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers. Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS, and MMS messages. Smartphones may additionally contain video, email, web browsing information, location information, and social networking messages and contacts. Growing need for mobile forensics due to several reasons Use of mobile phones to store and transmit personal and corporate information Use of mobile phones in online transactions Law enforcement, criminal, and mobile phone devices Marina DODEVSKA, Elissa MOLLAKUQE, Jovana DOBREVA, Vesna DIMITROVA | non_poster |
Searching for primordial black holes with SKA Daniele Gaggero Flic-en-Flac, Mauritius May 3rd, 2017 | non_poster |
Poster STI 2022 Conference Proceedings Proceedings of the 26th International Conference on Science and Technology Indicators All papers published in this conference proceedings have been peer reviewed through a peer review process administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a conference proceedings. Proceeding Editors Nicolas Robinson-Garcia Daniel Torres-Salinas Wenceslao Arroyo-Machado Citation: Hook, D.W., & McIntosh, L.D. (2022). Addicted to Attention. In N. Robinson-Garcia, D. Torres-Salinas, & W. Arroyo-Machado (Eds.), 26th International Conference on Science and Technology Indicators, STI 2022 (sti22200). https://doi.org/10.5281/zenodo.6937816 Copyright: © 2022 the authors, © 2022 Faculty of Communication and Documentation, University of Granada, Spain. This is an open access article distributed under the terms of the Creative Commons Attribution License. Collection: https://zenodo.org/communities/sti2022grx/ | non_poster |
EVENTO CIENTÍFICO PERSPECTIVAS DE LA CALIDAD DE VIDA, UNA MIRADA DESDE LA ESFERA EDUCATIVA Y LA ESFERA DE LA SALUD. ESTUDIANTES DEL SEMILLERO DE INVESTIGACIÓN TROPUS DEL PROGRAMA DE PSICOLOGÍA DE LA FUNDACIÓN UNIVERSITARIA DE POPAYÁN. | non_poster |
UNIVERSIDADE FEDERAL DO TRIÂNGULO MINEIRO III SEMINÁRIO MINEIRO DE EDUCAÇÃO INTEGRAL 11 A 13 DE AGOSTO DE 2020 -ANAIS- EDUCAÇÃO INTEGRAL E O TERRITÓRIO: DIÁLOGOS POSSÍVEIS | non_poster |
Poster: Systematic Elicitation of Common Security Design Flaws Stef Verreydt imec-DistriNet KU Leuven Heverlee, Belgium stef.verreydt@kuleuven.be Koen Yskout imec-DistriNet KU Leuven Heverlee, Belgium koen.yskout@kuleuven.be Laurens Sion imec-DistriNet KU Leuven Heverlee, Belgium laurens.sion@kuleuven.be Wouter Joosen imec-DistriNet KU Leuven Heverlee, Belgium wouter.joosen@kuleuven.be Abstract—Threat modeling allows potential security threats to be identified and mitigated at design time. Countermea- sures in current threat modeling approaches are mostly modeled as a boolean: either they are implemented, or they are not. This does not allow to take into account potential design flaws for the countermeasure itself. A considerable number of security issues is, however, related to the wrong or incomplete application of common security tactics. For example, the effectiveness of audit logs drops if the data written to the logs is not sanitized. In this paper, we describe our novel approach which aims to systematically and automatically identify common security design flaws. Index Terms—Threat modeling, CWE, Security-by-design 1. Introduction Security and privacy by design principles are becom- ing increasingly important to develop secure software systems. Indeed, insecure design is one of the most critical software risks according to the OWASP Top 10 2021 [1], and adhering to security and privacy by design principles is even obligated by regulations such as the General Data Protection Regulation (GDPR) [2]. Threat modeling provides a systematic approach to analyze the security and privacy of a software design, thereby allowing potential threats to be identified early on in the development lifecycle. The first step of a threat modeling exercise involves creating a model of the system being analyzed, usually as a Data Flow Diagram (DFD). The DFD notation comprises just five elements, namely processes, data stores, external entities, data flows and trust boundaries. That model can then be analyzed to identify potential security threats. Tool support for auto- matic threat elicitation based on machine-readable system models is widespread, and new techniques are being de- veloped rapidly [3]. Common threat elicitation methods used by these tools are based on STRIDE (an acronym for spoofing, tampering, information disclosure, denial of service and elevation of privilege), but more specific types of threats or attacks such as CAPEC, CWE or CVE entries are also identified by some [4]. The next step of a threat modeling exercise is to miti- gate the identified threats by introducing countermeasures. This often involves standard tactics, for example using logging to mitigate repudiation threats [5]. Applying such tactics in a design requires careful consideration of their precise requirements and assumptions. For example, data written to audit logs should be sanitized (CWE-1171), and should not contain sensitive information such as creden- tials (CWE-5322). Ideally, design flaws which violate such requirements should be flagged automatically. One of the underlying issues which prevents this type of analyses is that most threat modeling tools [6] only allow to capture the effect of a countermeasure, and not how countermeasures are included in a design or which el- ements are involved [7]. For example, a repudiation threat could be marked as mitigated in the Microsoft Threat Modeling Tool [6], but there is no support to explicitly capture the countermeasure which mitigates the threat. To allow tracing back why and how threats are mitigated, Sion et al. [7] extended the DFD notation with a first-class representation for countermeasures. For example, a log- ging countermeasure can be explicitly added to the system model, allowing tool support to automatically mark certain repudiation threats as mitigated. In our novel approach, we leverage this explicit countermeasure information to automatically identify flaws rooted in the design of the count | non_poster |
08/12/2020 AGU - iPosterSessions.com https://agu2020fallmeeting-agu.ipostersessions.com/Default.aspx?s=60-7D-00-85-FA-E6-95-DA-27-0D-B6-4B-91-DC-05-C1&pdfprint=true&guestview=true 1/13 Making advanced predictions in the Arctic and beyond: Developments and results of the APPLICATE project The APPLICATE consortium www.applicate.eu PRESENTED AT: | non_poster |
— 712 717 Celebration & Contemplation, 10th International Conference on Design & Emotion 27 — 30 September 2016, Amsterdam Abstract In collaboration with the Italian design company Serralunga, this project was developed as a research on new expressive qualities for plastics. The goal was to convey a feeling of impermanence through the surface of plastics, thus reducing the perception of a timeless perfection. Among synthetic materials, plastics are characterized by an unnatural aging, which can occur in two ways. They can be immune to traces, resulting as unrealistic and ‘always-perfect’. Alternatively, they can crack, break, and sallow, often degrading their aesthetic value. The inability to mature gracefully contributes to the overall association of plastic artifacts to cheap and disposable products. Thus, plastic artifacts are scarcely the targets of users’ affective attachment, ultimately shortening their lifespans. The point of departure of this project was then the possibility to make plastics grow traces of time and usage. The resulting concepts aim at increasing users’ emotional attachment to artifacts, linking our stories to theirs. By undertaking a collaborative process, the designer, together with company experts, explored different design directions, to achieve several outcomes that are depicted in this pictorial. Keywords Emotional durability, Aging, Traces, Imperfection, Materials Exploring alternative expressive qualities for the aging of plastics – The case of ‘timelapse’ experimental project - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Serena Camere1 serena.camere@polimi.it Barbara Del Curto1 barbara.delcurto@polimi.it Raffaella Mangiarotti1 raffaella.mangiarotti@polimi.it 1Polytechnic University of Milan, Italy | non_poster |
Danaus erippus Taygetis mermeria Heliconius sara Blepolenis batea Pseudodebis celia Hypothyris ninonia Actinote pyrrha Vanessa braziliensis Hamadryas fornax Dismorphia crisia Vettius umbrata Pereute swainsoni Fountainea ryphea Carminda paeon Zaretis strigosus Parides agavus Pseudodebis euptychidia Spicauda procne Heliopetes ochroleuca Morpho helenor Temenis laothoe Forsterinaria pronophila Heliopetes americanus Phoebis philea Rhetus periander Theagenes dichrous Doxocopa laurentia Diaethria eluina Catonephele numilia DIVERSIDADE DE BORBOLETAS PARQUE ESTADUAL INTERVALES A barrinha preta em cada borboleta corresponde a 1 cm. Quanto menor a barra, maior a borboleta! Myscelia orsis Eurema albula Callithomia lenea Adelpha syma Dryas iulia Memphis appias Criação e imagens: Leila Teruko Shirai Mariana Alves Stanton 2021 | non_poster |
NEWSLETTER www.eenvest.eu EEnvest project has reached month 18 and a lot of developments and accomplishments which have been shared during the 3rd Project Meeting in December 2020. Among these accomplishments, the risk calculation process has been tested, the structure of the financial risk model based on the Monte Carlo simulation and the financial risk evaluation framework have been defined. This issue of EEnvest newsletter will give you an overview of what is happening within the project. If you want to be updated on some of the latest news, including insights from project partners, participation in events, communication and dissemination materials, go on reading and enjoy! Dear Readers, INSIDE Interview to Energinvest - 2 Interview to IES - 3 Workshop at Sustainable Places 2020 - 4 3rd General Assembly - 5 Activities 2020/2021 - 6 /eenvest @eenvest_eu Risk Reduction For Building Energy Efficiency Investment December 2020 - Third Issue Promotional material - Brochure and poster are available on EEnvest website here! | non_poster |
Open Schools Journal for Open Science Vol. 3, 2020 Nanoparticle tracking analysis Peneder H. BG/BRG Schloss Wagrain Punz E. BG/BRG Schloss Wagrain Joubert I.A. Dept. Biosciences, University of Salzburg Geppert M. Dept. Biosciences, University of Salzburg Himly M. Dept. Biosciences, University of Salzburg https://doi.org/10.12681/osj.22598 Copyright © 2020 H. Peneder, E. Punz, I.A. Joubert, M. Geppert, M. Himly To cite this article: Peneder, H., Punz, E., Joubert, I., Geppert, M., & Himly, M. (2020). Nanoparticle tracking analysis. Open Schools Journal for Open Science, 3(2). doi:https://doi.org/10.12681/osj.22598 http://epublishing.ekt.gr | e-Publisher: EKT | Downloaded at 02/03/2021 02:16:41 | | non_poster |
Wednesday, May 24, 2023 02:46 PM Page 1 Project: seq.sqd Contig 4 Trace Majority 10 20 30 40 50 60 A A T A C G A A A G G G A C C T A A T A T T G T A G G A C C T T A T G G C C T C C T T C A A C C T A T T G C T G A T G C C G A A T A C G A A A G G G A C C T A A T A T T G T A G G A C C T T A T G G C C T C C T T C A A C C T A T T G C T G A T G C C G JFF2R2_JFF2-1_TSS20230310-027-(15>975) A A T A C G A A A G G G A C C T A A T A T T G T A G G A C C T T A T G G C C T C C T T C A A C C T A T T G C T G A T G C C G JFF2R2_JFF2-1_TSS20230310-027-(15>975) Trace Majority 70 80 90 100 110 120 T A A A A C T C T T T A T T A A A G A A C C C T T A C G C C C A T T A A C A T C T T C A G T C T C T A T A T T T A T T A C C A C A T C T T C A G T C T C T A T A T T T A T T A C C JFF2R2_BRR2_TSS20230310-027-043(50>913) T A A A A C T C T T T A T T A A A G A A C C C T T A C G C C C A T T A A C A T C T T C A G T C T C T A T A T T T A T T A C C JFF2R2_JFF2-1_TSS20230310-027-(15>975) A C A T C T T C A G T C T C T A T A T T T A T T a C C JFF2R2_BRR2_TSS20230310-027-043(50>913) T A A A A C T C T T T A T T A A A G A A C C C T T A C G C C C A T T A A C A T C T T C A G T C T C T A T A T T T A T T A C C JFF2R2_JFF2-1_TSS20230310-027-(15>975) | non_poster |
Detection of recombination events in Xylella fastidiosa genomes of different Spanish strains Luis F. Arias-Giraldo¹, Neha Potnis², Leonardo De La Fuente², Eduardo Moralejo³, E. Marco-Noales , María ⁴ P. Velasco-Amo¹, M. Román-Écija¹, Juan Imperial , Blanca B. Landa¹. ⁵ Affiliation: ¹Institute for Sustainable Agriculture, Consejo Superior de Investigaciones Científicas (CSIC), Córdoba, Spain ²Department of Entomology and Plant Pathology, Auburn University, Auburn, Alabama, USA ³Tragsa, Empresa de Transformación Agraria, Delegación de Baleares, 07005 Palma de Mallorca, Spain ⁴Valencian Institute for Agricultural Research (Instituto Valenciano de Investigaciones Agrarias, IVIA), Valencia, Spain ⁵Institute of Agricultural Sciences, CSIC, Madrid, Spain Funded by Projects XF-ACTORS (H2020-UE) and E-RTA2017-00004-C06-02 from AEI-INIA Spain, the Spanish Olive Oil Interprofessional and the COST Action CA16107 EuroXanth supported by European Cooperation in Science and Technology | non_poster |
9/13/23, 11:56 AM Start file:///G:/Start.html 1/1 ОСМИ КОНГРЕС ПО ФАРМАЦИЯ С МЕЖДУНАРОДНО УЧАСТИЕ Български език English language ISBN 978-954-8137-16-4 | non_poster |
Lustige Sprüche: Ein umfassender Leitfaden für Humorvolle Zitate ### **Einführung in Lustige Sprüche** Lustige Sprüche, oder auf Deutsch "lustige Sprüche", sind kurze, humorvolle Aussagen, die dazu dienen, Freude zu verbreiten, zum Lachen zu bringen oder eine humorvolle Perspektive auf verschiedene Lebenssituationen zu bieten. Sie sind in der heutigen Zeit weit verbreitet und finden sich in sozialen Medien, auf Grußkarten, in Gesprächen und vielen anderen Bereichen des täglichen Lebens wieder. #### **Warum sind Lustige Sprüche so beliebt?** - **Stressabbau:** Humor hilft, Stress abzubauen und die Stimmung zu heben. - **Soziale Verbindung:** Lustige Sprüche fördern Lachen und schaffen eine positive Verbindung zwischen Menschen. - **Einfache Kommunikation:** Kurze und prägnante Aussagen sind leicht zu teilen und zu merken. --- ### **Kategorien von Lustigen Sprüchen** 1. **Alltagswitze:** - Sprüche, die humorvolle Beobachtungen des täglichen Lebens widerspiegeln. - Beispiel: "Ich bin nicht faul, ich bin im Energiesparmodus." 2. **Selbstironie:** - Aussagen, die sich selbst auf humorvolle Weise darstellen. - Beispiel: "Ich bin nicht perfekt, aber meine Haare sind es zumindest." 3. **Beziehungshumor:** - Sprüche, die humorvolle Aspekte von Beziehungen beleuchten. - Beispiel: "Liebe ist, wenn dein Lieblingsmensch nervt, aber du ihn trotzdem liebst." 4. **Arbeitsplatzwitze:** - Humorvolle Aussagen über das Arbeitsleben. - Beispiel: "Ich liebe meinen Job – nur nicht jeden Tag." 5. **Tierhumor:** - Lustige Sprüche über Tiere und deren Verhalten. - Beispiel: "Warum bellen Hunde, wenn sie nicht sprechen können? Einfach, um gehört zu werden!" 6. **Wortspiele:** | non_poster |
• Discovery and analysis of only the third Lyman-limit system, LLS1723, in which a high-quality resolution HIRES spectrum reveals no metal absorption lines at z = 4.4, implying a metallicity less than1/10000 solar. • Such a low metallicity raises the question of LLS1723's origin and enrichment history. ADS: http://adsabs.harvard.edu/doi/10.1093/mnras/sty3287 | non_poster |
What is ‘circular economy’? Circular economy aims at circulating and recirculating resources, minimizing waste and enhancing resource efficiency. BREAKING DOWN THE CIRCULAR ECONOMY 2 1 In a circular system resource input and waste, emission, and energy leakage are minimized by closing energy and material loops. This can be achieved through: long lasting design, maintenance, repair, reuse, remanufacturing, refurbishing, recycling and converting outputs into inputs.[1] This regenerative approach is in contrast to the traditional linear economy, which has a 'take, make, dispose' model of production.[2] 3 One early mention was by Kenneth Boulding in 1966 when he raised awareness of what he called a “spaceship economy” or a "closed economy", in which resources remain as long as possible a part of the economy, as compared with the conventional "open economy" with assumed unlimited resources.[3] [1] Geissdoerfer, Martin; Savaget, Paulo; Bocken, Nancy M. P.; Hultink, Erik Jan. "The Circular Economy – A new sustainability paradigm?". Journal of Cleaner Production, 2017, 143, 757–768. doi:10.1016/j.jclepro.2016.12.048. [2] Towards the Circular Economy: an economic and business rationale for an accelerated transition. Ellen MacArthur Foundation, 2012. [3] Boulding, Kenneth E. "The Economics of the Coming Spaceship Earth". In H. Jarrett (ed.) Environmental Quality in a Growing Economy, Resources for the Future, Johns Hopkins University Press, Baltimore, 1966. Grant Agreement No. 816336 | non_poster |
Pulseshapediscrimination for reductionof alphabackground in HPGedetectors Krzysztof Szczepaniec Tomasz Mróz Grzegorz Zuzel | non_poster |
— 744 753 Celebration & Contemplation, 10th International Conference on Design & Emotion 27 — 30 September 2016, Amsterdam Project structure Thinking Keeping is structured in 5 phases: Phase 1 Collection of packaging and related objects Phase 2 Collecting submissions of preloved objects Phase 3 Concept development Phase 4 Making and experimenting Phase 5 Exhibition inviting participation and discussion. Data collection. The project is in progress, and phases 4 and 5 will be completed before the deadline for camera ready submissions on 1st May 2016. Cultural context and related research Our investigation is especially pertinent given the proliferation of unboxing videos on social media over the last decade. Unboxing videos record the act of taking a new product out of its packaging for the first time, to show the material reality of its features and functions, undistorted by the product’s marketing. The videos make a ceremony out of breaking into a sealed package, and invite an online audience to enjoy the material sensuality of the ‘reveal’. The videos emphasise the anticipation and newness of the product, a little like opening a Christmas gift. By focusing on re-packaging used goods, we relate our research to other projects exploring methods of encouraging consumers to embrace acquiring pre-used products. Post notably this includes the work carried out by Traid (Traid 2016), a charity actively working to challenge perceptions of second hand clothing, and ToTem (Speed and MacDonald, 2013), an academic project which included work with Oxfam to explore methods for transferring the narrative and meaning of a pre-owned product from one user to the next. A third example, from the commercial sector, is Poundland’s “Replay” scheme, which refreshes, re-packages and re-sells pre-owned music discs (see Figure 1). Abstract Thinking Keeping is a creative, practice-based enquiry into the irreversible act of ‘breaking in’ to a sealed package. Breaking open a product’s packaging structures the user’s first experiences of owning the product, and reinforces perceptions of the product’s newness, perfection and desirability. It is a pivotal stage in the emotional lifetime of a product. Through creative methods we are subverting the experience of ‘breaking the seal’, by applying it to products that have already been owned and used. Our enquiry raises questions about the potential of packaging to overcome barriers to reuse, to help construct meaningful lasting relationships with products, and to challenge the desire for newness. We intend to expose contradictions in how consumers value, keep and destroy packaging. The research brings a new angle to research relating design to practices of keeping things and sustainable consumption (e.g. Chapman 2005, Fisher and Shipton 2010, Schifferstein et al 2008). Design can play a key role in influencing consumers’ relationships to their possessions, and designers are in a position to propose powerful ways of rethinking the relationship through creative, practice-based approaches. Our explorations are structured around sketching, prototyping, and data collection via exhibition. Working without the constraints of a commercial brief means that we can develop concepts that subvert expectations, and whose ambiguity prompts reflection and speculation. Thinking Keeping is a collaboration between a product designer, a packaging designer, and a jewellery designer. Keywords Packaging design, Value, Emotion, Practice-based research, Reuse Thinking Keeping: A practice- led research project which focuses on the act of opening or breaking in to product packaging - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Julia Keyte1 j.keyte@bathspa.ac.uk Richard Evans2 r.evans@shu.ac.uk Peter MacQueen1 p.macqueen@shu.ac.uk 1Sheffield Hallam University, United Kingdom 2Bath Spa University, United Kingdom | non_poster |
Lessons from the South Iain Chambers When mass protests and regime changes swept across North Africa in the Spring of 2011, and subsequently triggered turbulence in Bahrain and a bloody civil war presently being waged in Syria, Occidental journalism and political commentary was initially taken by surprise. The status quo – and not only for Arab dictators – had seemingly crumbled overnight. The situation was eventually brought into perspective and under Western eyes through a series of explanatory frames – educated unemployed youth, the new social media, state oppression and the lack of democracy – that responded to Occidental criteria of analysis. Of course, in the contemporary conditions of planetary modernity all is somehow connected, nothing takes place in a vacuum, and the languages, technologies and ideologies of the West clearly played a significant role. However, rather than measure such events – their perceived achievements and failures – against a presumed Occidental template it is perhaps politically and historically more significant to register the emergence of a series of interrogations that invest both the protagonists and those of us observing from afar. It is also important at this point to register that the processes and procedures under discussion are still very much in progress: the question of rights and liberties – social, political, human – remain open, the subject of discussion, debate and continuing struggle. A previous political landscape, which had been thoroughly endorsed by Western powers and diplomacy, is clearly in ruins. The assumption that only the Occidental ‘we’ has the right to define ‘freedom’ and ‘democracy’ has clearly been rendered vulnerable to unsuspected historical operations and cultural forces. What emerge from this picture are critical prospects that criss-cross the Mediterranean, rendering proximate its northern and southern shores, shredding the confines between Occident and Orient. When the terms of political, historical and cultural freedom are exposed – for whom, where, when and how? – a whole critical lexicon comes under review. The assumed temporality of political and historical progress, the accumulative power of its linear development, is skewed into another space in which modernity is neither mono-dimensional nor homogeneous. The downfall of Mubarak, the daily protests in Tahrir Square, were not simply Egyptian matters. Their resonance was not restricted merely to the Arab world. A political lexicon that many consider to be complete and fully achieved in the governing bodies and institutional authorities of the West has been reopened and newly researched, traversed and translated. Understandings of the individual, the public sphere, political agency, religion, secularism and the state, suddenly become vulnerable to renegotiation in events that rudely punctuate flawless abstractions. As we, too, are learning, nothing is guaranteed. Rights and freedoms can be rolled back. In the name of security, driven by the imperatives of governance, there can always occur a turn in the screw. In a world that increasingly does not recognise human beings, only citizens and subjects, the categories that supposedly secure the polis are always open to unsuspected interpretation, redefinition, contestation and ideological spin. Our conceptual securities become the agonistic sites of historical processes and cultural struggle that do not necessarily mirror the critical and political imperatives of the West. What is presently occurring in North Africa and the eastern Mediterranean – in Egypt, Israel or Syria – throws an interrogating light across the West that in multiple ways is responsible for the powers and possibilities in play. Not | non_poster |
Poster STI 2022 Conference Proceedings Proceedings of the 26th International Conference on Science and Technology Indicators All papers published in this conference proceedings have been peer reviewed through a peer review process administered by the proceedings Editors. Reviews were conducted by expert referees to the professional and scientific standards expected of a conference proceedings. Proceeding Editors Nicolas Robinson-Garcia Daniel Torres-Salinas Wenceslao Arroyo-Machado Citation: Pandiella-Dominique, A., & Bautista- Puig, N. (2022). OSDG Community Platform: a citizen science initiative towards the development goals. In N. Robinson-Garcia, D. Torres-Salinas, & W. Arroyo-Machado (Eds.), 26th International Conference on Science and Technology Indicators, STI 2022 (sti22190). https://doi.org/10.5281/zenodo.6935897 Copyright: © 2022 the authors, © 2022 Faculty of Communication and Documentation, University of Granada, Spain. This is an open access article distributed under the terms of the Creative Commons Attribution License. Collection: https://zenodo.org/communities/sti2022grx/ | non_poster |
L e a t h e r b a c k Identifying the 7 marine turtle species L o g g e r H e a d 5 Plates along shell edge 2 Claws on front flippers Large head Reddish Brown Colour K e m p ' s R i d l e y 5 Plates along shell edge 1 claw on front flippers 1-2 claws on back Narrow Jaw & Curved Beak 2 Claws on front flippers 4 pairs Overlapping plates on shell O l i v e R i d l e y Olive green colour 6-9 plates along shell edge almost circular shell 1-2 claws all flippers F l a t b a c k Round & Flat shell thin shell edge covered by waxy cuticle 1 claw on each flipper 4 plates on edge of shell 4 plates along shell edge (no overlapping) 1 claw on front flippers Pair of scales at front of head 5 ridges along back (no scales) no claws Smooth leather like skin tooth-like notch on upper jaw Black to dark blue colour grey to light olive green colour H a wk sb il l Dark greenish Brown colour Olive grey colour G r e e n Brownish Colour (Green in name refers to green fat) by paige Strudwick for ICrs reefbites ref: fisheries.noaa.gov | non_poster |
EVALUATIONS OF INSECTICIDES TO REDUCE TRANSMISSION OF XYLELLA FASTIDIOSA IN OLIVES Cavalieri V.1, Fumarola G.2, Zigrino M.2, Di Carolo M.2 , Palmisano F.2, Silletti M.R.2, Palmisano V.2, Dongiovanni C.2 1Institute for Sustainable Plant Protection, National research Concil, Italy, 2Centro di Ricerca, Sperimentazione e Formazione in Agricoltura “Basile Caramia, Italy | non_poster |
Properties and evolution of Active Galactic Nuclei in clusters Elias Koulouridis National Observatory of Athens E. Drigga, A. Gkini + the XXL survey + the Hyper Suprime Cam (HSC) collaboration A journey through galactic environments - 25-29 September 2023, Porto Ercole, Italy | non_poster |
Poster: The impact of data sampling in the anonymization pipeline Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens imec-DistriNet KU Leuven Ghent, Belgium firsname.lastname@kuleuven.be Abstract—An increasing number of companies are selling data as an additional source of revenue, or acquire data from other parties to optimize their business. In many cases, the shared data contains sensitive personal records. According to the GDPR regulation, personal data should be anonymized before it is released to third parties. A frequently applied technique is the k-anonymity metric, which ensures that every record in the dataset becomes indistinguishable from K other records through data generalization. This work combines generalization techniques with sampling. By adding a sampling step in the anonymization pipeline, additional uncertainty is introduced towards a potential attacker. As attackers can no longer be sure that an in- dividual is in the sampled dataset, the re-identification risk is mitigated. This work proposes and evaluates multiple sam- pling techniques. Both the privacy and the utility properties of the anonymized datasets are embraced. The utility of the anonymized datasets is further evaluated in a machine learning use-case. Index Terms—anonymization, sampling, privacy, utility 1. Introduction Data collection and processing have become aspects of increasing importance in the daily operation of many businesses and organizations. Amongst others, data is employed for optimizing production processes and to in- crease the effectiveness of marketing campaigns. Hence, sharing (or trading) data can be very lucrative, and might even bootstrap cooperation between organizations. While data sharing exposes great opportunities for companies, caution should be taken. First, the European GDPR regu- lation states that datasets containing personal information should be anonymized before they are released. This means that a record in the shared dataset can no longer be linked to an individual afterwards. Second, thoughtless release can undermine the competitiveness of companies. Anonymization techniques can be applied to mitigate these threats. An often cited and applied strategy for data anonymization relies on privacy metrics such as k- anonymity [1]. The goal of this metric is to generalize attribute values in such a way that each individual be- comes indistinguishable from at least k −1 other indi- viduals in the dataset. However, constructing a feasible anonymized dataset is no sinecure for most organizations. Some information is inevitably lost during anonymization caused by generalization. Hence, companies often struggle to find a satisfactory balance between the privacy and the utility of an anonymized dataset. Moreover, solely applying k-anonymity does not always protect against attackers with membership knowledge, a key assumption in the prosecutor attacker model [2]. This work argues that the aforementioned risk is mitigated by applying an additional sampling step in the anonymization pipeline. An attacker can no longer be sure that the target is in the dataset, making it harder to re-identify individuals. The prosecutor becomes a journalist, corresponding to the also well-known but less powerful journalist attacker model. Contributions. This paper presents preliminary results of our research on combining traditional anonymization tech- niques (i.e. k-anonymity) and sampling. Three different sampling strategies are presented, implemented and as- sessed. The impact of each strategy on both the utility and the privacy properties of the remaining data is evaluated in a practical machine-learning use-case. The remainder of this work is structured as follows. Section 2 points to related work. Section 3 describes different sampling strategies. Thereafter, Section 4 details the evaluation methodology. Lastly, Section 5 outlines the conclusions and points to future work. 2. Related work Sampling has been t | non_poster |
CONSORTIUM BINAURAL TOOLS FOR THE CREATIVE INDUSTRIES www.binci.eu | non_poster |
1 Complementary approaches in characterization of secondary raw materials: A case study of H2-reduced bauxite residue Ahmad Hassanzadeh 1, 2, *, Stefanie Lode 1, Ganesh Pilla 3, Jostein Røstad 1, Przemyslaw B. Kowalczuk 1 1 Department of Geoscience and Petroleum, Faculty of Engineering, Norwegian University of Science and Technology, 7031 Trondheim, Norway 2 Maelgwyn Mineral Services Ltd, Ty Maelgwyn, 1A Gower Road, Cathays, Cardiff, CF24 4PA, United Kingdom 3 Department of Materials Engineering, KU Leuven, Kasteelpark Arenberg 44, 3001 Leuven, Belgium * Corresponding author: Ahmad Hassanzadeh (E-Mail: ahmad.hassanzadeh@ntnu.no and ahassanzadeh@Maelgwyn.com) Abstract Applying commonly used characterization techniques for secondary-type materials is generally challenging because of pre-processed treatments and particle surface contaminations. For this reason, the current work aims at presenting combination of micro-computed tomography (µCT), thermomagnetic analysis (TMA) and X-ray powder diffraction (XRD) as a supplementary approach for the SEM-based automated mineralogy (AM). To this end, an H2- reduced bauxite residue was characterized in this research work to identify its complex compositions. Further, the sample was subjected to different magnetic (Slon®, Davis Tube) and gravity (Mozley Table) separators feasibly examine iron recoverability from the H2-reduced sample. The qualitative results obtained from µCT showed that the reduced bauxite residue (red mud) was composed of only magnetite disseminated in fine grain sizes. It was well correlated with the AM outcomes. Further, coupled information of TMA, XRD and µ-CT provided complementary results for the secondary type materials, which was very useful for downstream processes (i.e., magnetic and gravity separations). The experimental results obtained for the applied separators disclosed that the Mozley Table could potentially increase the Fe content from 21-23% to 31%, with the mass recovery of 52%. Test results using the Slon® at 1000 G displayed almost similar Fe content (33%) with the maximum mass recovery of 80%. Applying the single stage Davis Tube at a lower magnetic intensity of 2500 G showed around 18% improvement in the Fe grade (from 22 to 40%), while the mass recovery was the lowest (22%) among all the equipment tested. It was finally highlighted that multi-stage medium magnetic separation followed with one-two scavenging and cleaning stages can potentially elevate the grade and recovery of iron. Keywords: H2-reduced bauxite residue, red mud, thermomagnetic analysis (TMA), micro-computed tomography (µCT), automated mineralogy. 1. Introduction Over the last few decades, extraction of valuable elements from secondary resources has been always attractive for many industries. Through this, not only a massive amount of waste material can be | non_poster |
AMERICAN JOURNAL OF MULTIDISCIPLINARY BULLETIN ISSN: 2996-511X (online) | ResearchBib (IF) = 9.512 IMPACT FACTOR Volume-2| Issue-4| 2024 Published: |30-11-2024| 218 PECULIARITIES OF INCLUSIVE ARTS EDUCATION FOR STUDENTS WITH HEARING IMPAIRMENTS https://doi.org/10.5281/zenodo.14212803 Khamraeva Umida Madrimovna Artist, psychologist, teacher National Institute of Arts and Design named after Kamoliddin Bekhzod, Tashkent, 100128, Uzbekistan ORCID ID 0009-0009-6716-7175 umi-dochka@mail.ru Abstrakt: The purpose of the research: This article describes the process and results of a survey of recognition of terms of fine art among students with hearing impairments studying at the National Institute of Arts and Design named after Kamoliddin Bekhzod, as well as at the Tashkent State Pedagogical University named after Nizami. Research methods: The following research methods were used: analysis, synthesis, comparison, observation and statistics. Research results: During the study, methods were developed to effectively improve the quality of art education through the study of terminology. Keywords Hearing impairment, students, fine arts, applied arts, design Background: According to statistics provided by the Society of the Deaf of Uzbekistan, as of 2022, there are 19,454 people with complete hearing loss in the Republic, and 5,568 people with partial hearing loss. Total – 25022 people. Among the registered members of the Deaf Society of Uzbekistan are: Since 2018, in our Republic, more and more young people with special educational needs are becoming students of higher educational institutions. NIHD named after Kamoliddin Bekhzod and TDPU named after Nizami are the leading universities in Uzbekistan in the field of training artists of fine and applied arts, design and art history, artist-teachers, specialists in the field of “Professional education”. Methods: Based on the results of collecting statistical data on the number and categories of students with special educational needs in both universities, we found that at the faculty of “Professional Pedagogy” - the department of “Fine Arts” of the Nizami National Democratic Pedagogical University, the number of students with hearing impairments as a percentage of all students with special needs educational needs is 56%. At the Faculty of Fine Arts of the Kamoliddin Bekhzod | non_poster |
Engineering, Technology & Applied Science Research Vol. 6, No. 4, 2016, 1102-1107 1102 www.etasr.com Dragan et al.: A Comparative Analysis Between Optimized and Baseline High Pressure Compressor Stages A Comparative Analysis Between Optimized and Baseline High Pressure Compressor Stages Using Tridimensional Computational Fluid Dynamics Valeriu Dragan Computational Fluid Dynamics Department NRDI Comoti Bucharest, Romania valeriu.dragan@comoti.ro Ion Malael Computational Fluid Dynamics Department NRDI Comoti Bucharest, Romania ion.malael@comoti.ro Bogdan Gherman Computational Fluid Dynamics Department NRDI Comoti Bucharest, Romania bogdan.gherman@comoti.ro Abstract—Re-vamping of industrial turbo-machinery is commonplace in the oil and gas industry in applications where subterranean combustion is used for oil extraction. The current case study refers to such an industrial compressor re-vamping, using a state of the art 3D fully viscous CFD methodology coupled with artificial neural networks (ANNs) and genetic algorithms (GA). The ANN is used to establish correlations within a database of CFD simulations of geometrical variations of the original rotor and the GA uses those correlations to estimate an optimum. The estimate is then tested with the same CFD method and the results are fed back into the database, increasing the accuracy of the ANN correlations. The process is reiterated until the optimum estimated by the GA is confirmed with the CFD simulations. The resulting geometry is superior to the original in terms of efficiency and pressure ratio as well as the range of stabile operation, as confirmed by the successful implementation in the field. In this paper we present an analysis of why the optimized geometry achieves superior performances to the original one. Further work will present comparison between the detailed experimental data and CFD. Keywords-optimization; CFD; turbomachinery; centrifugal compressor; artifficial neural network; genetic algorithm I. INTRODUCTION Current competiveness requirements in the turbo-machinery industry call for increased operational qualities of the final product. Using modern CFD methods, a tailored made solution, which considers more than one criteria, can be obtained and solution customization can be obtained. This paper presents a re-vamping, optimization case study for a high pressure compressor stage used in the petrol industry. The design theme demanded for a 10 percent increase in mass flow as well as an increase in the isentropic efficiency while maintaining the same outlet diameter, height and rotor aspect ratio. From the start this will imply that the flow coefficient will be increased and that the specific wheel speed is decreased, making it less optimal according to traditional design theories. Since neither the slip factor nor the jet-wake paradigms allow the design of such a stage, unless the models incorporate more elaborate stochastic models, the case study must be carried out using fully viscous numerical simulations. In this particular case, the optimization study was carried out in two steps, firstly using an in-house goal driven method and finally the Numeca Design 3D commercial package. In the first re-vamping stage, both the rotor and stator were reshaped using conventional 2D methods coupled with the in- house stochastic correlations. This process of the stage re- design also incorporates a primary optimization of the two blade rows. Version 15 (V15) represents the preliminary result of the re -vamping with the Euler in-house code [1]. Intuitively, in designing V15 two key aspects were targeted, namely maintaining the specific speed at the highest possible value while preventing flow separation and, secondly, diminishing the machine Mach number – which was thought as a source of loss. Both those targets were proven to be misguided since V25 actually has a higher machine Mach number and a lower specific speed. Paradoxically it seems that minimizing and maximizing isol | non_poster |
Poster: MaSTer: (Practically) Maliciously Secure Truncation for Replicated Secret Sharing Martin Zbudila Erik Pohle Aysajan Abidin Bart Preneel imec-COSIC, KU Leuven Belgium firstname.lastname@esat.kuleuven.be Abstract—Secure multi-party computation (MPC) in a three-party honest majority scenario is cur- rently the state-of-the-art for running machine learning algorithms in a privacy-preserving man- ner. For efficiency reasons, fixed-point arithmetic is widely used to approximate computation over decimal numbers. In this poster we present a work- in-progress efficient three-party maliciously secure truncation protocol without pre-processing, thereby improving on the current state-of-the-art in MPC over rings using replicated secret sharing (RSS). 1. Introduction Machine learning (ML) and AI dominate the world of data processing, and the need to preserve the privacy of both the model owners’ and users’ data becomes an important objective. Numerous works on privacy-preserving machine learning use advanced cryptographic techniques such as secure multi-party computation (MPC) [2]–[4] to enable confidential training and inference of various machine learning models. In MPC, the state-of-the-art is computation in the three-party setting with honest majority. A key component in evaluating ML algo- rithms over MPC is the efficient computation on secret-shared decimal numbers. Since true float- ing point arithmetic is expensive, an approxima- tion, namely fixed-point arithmetic, is employed. Here, the decimal number is encoded with fixed precision as an integer where the integer size is chosen to accommodate the expected range. Multiplication of two fixed-point integers doubles the length of the fractional part and thus requires efficient truncation afterwards to retain the origi- nal precision. For efficient secret sharing in MPC, the integer is represented in a ring. SecureML [3] first proposed a technique allowing truncation by local operations on the shares in a two-party setting in semi-honest security. The current state- of-the-art three-party maliciously secure trunca- tion was proposed by ABY3 [2], and adopted by follow up works such as Falcon [4]. In the online phase, this truncation requires only one round of communication and only one ring element sent per party. However, the pre-processing phase in- volves a costly evaluation of subtraction circuits, resulting in lower combined throughput. In this poster, we report on a work-in-progress protocol that computes the truncation of fixed- point numbers without pre-processing securely in the presence of one malicious adversary in the three-party setting. Our protocol achieves an overall low cost of two rounds of communication and one ring element sent per party. Idea. Our protocol is based on the two-party trun- cation from SecureML [3]. We first run a semi- honest truncation in the first round and repeat the semi-honest truncation a second time but with a different subset of parties. Finally, the output of the second round is used to verify that no malicious behaviour tampered the result obtained in the first round. In the following, we briefly present necessary preliminaries in Sect. 2 and describe our protocol for truncation in Sect. 3. 2. Preliminaries We begin by presenting the notation used throughout this poster, and discuss related work. 2.1. Notation Given a fixed-point encoded secret x ∈ (−2ℓx, 2ℓx), we define z to be the encoding of | non_poster |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.