References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailRigor or rhetoric: Public philosopher and public in dialogue
Burks, Deven UL

in Perspectives: international postgraduate journal of philosophy (in press), 9

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but ... [more ▼]

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but only sophisticated method, they nevertheless fail to realize that said method does not resonate with the very public whom they purport to help. For, with the second, that method does not engage the emotivist and tribalist cast of contemporary public discourse: emotivist because a person’s moral and political beliefs are a function of emotional attitudes or affective responses for which she adduces reasons post hoc; tribalist because the person tracks not the inferential relation between beliefs but her similarity with interlocutors. In order to understand the full extent of this critique, it is necessary, first, to parse strands of public philosophy, distinct discursive sites, and pictures of philosophical practice and, then, to probe the critique’s empirical groundedness and intended scope. These elements in place, it is then possible to sketch public philosophy reconceived along Leiter’s lines as equal part rigor and rhetoric. That sketch may be somewhat filled out through two tactics employed in Jeffrey Stout’s (2004, 2010) work. These form part of a toolkit for philosophical dialogue whereby philosophers get a discursive grip on non-discursive factors underlying public discourse and push back on Leiter's dilemma. [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailLightning Network: A Comparative Review of Transaction Fees and Data Analysis
Khan, Nida UL; State, Radu UL

in Springer International Congress on Blockchain and Applications (in press)

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and ... [more ▼]

Blockchain is a revolutionary, immutable database disrupting the finance industry with a potential to provide payments in a secure environment, unhindered by intermediaries. However, scalability and throughput issues plague the technology and prevent it's mass scale adoption. The paper focusses on Lightning Network, the off-chain, scalable and high throughput payment solution from Bitcoin. A comparison is conducted to highlight the fee incurred for payment transactions through Lightning Network, Raiden, Stellar, Bitcoin and conventional payment systems to assess its viability as a blockchain-based payment sys-tem. The paper also provides an analysis of the data of Lightning Network, to give a global overview of its usage and reachability. [less ▲]

Detailed reference viewed: 82 (20 UL)
Full Text
Peer Reviewed
See detailBlockchain-based Micropayment Systems: Economic Impact
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium (in press)

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology ... [more ▼]

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology includes the divisible nature of a cryptocurrency, that can facilitate payments in fractions of a cent, enabling micropayments through the blockchain. Micropayments are a critical tool to enable financial inclusion and to aid in global poverty alleviation. The paper conducts a study on the economic impact of blockchain-based micropayment systems, emphasizing their significance for socioeconomic benefit and financial inclusion. The paper also highlights the contribution of blockchain-based micropayments to the cybercrime economy, indicating the critical need of economic regulations to curtail the growing threat posed by the digital payment mechanism. [less ▲]

Detailed reference viewed: 45 (2 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 114 (9 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the International Institute of Space Law (in press)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailTogether or Alone: The Price of Privacy in Collaborative Learinig
Pejo, Balazs UL; Tang, Qiang; Biczók, Gergely

in Proceedings on Privacy Enhancing Technologies (2019, July)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have the necessary data to train a reasonably accurate model. For such organizations, a realistic solution is to train their machine learning models based on their joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, by focusing on a two-player setting, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. Using recommendation systems as our main use case, we demonstrate how two players can make practical use of the proposed theoretical framework, including setting up the parameters and approximating the non-trivial Nash Equilibrium. [less ▲]

Detailed reference viewed: 40 (1 UL)
Full Text
Peer Reviewed
See detailComparison of boundary treatments in thermal Lattice Boltzmann simulations of moving particles in fluids
Rosemann, T; Kravets, B; Kruggel-Emden, H et al

in Particle Technology Series (2019, April 09)

Various numerical schemes have been developed in recent years to simulate particle-laden flows. The Lattice Boltzmann method (LBM) has emerged as an efficient tool for direct numerical simulations in ... [more ▼]

Various numerical schemes have been developed in recent years to simulate particle-laden flows. The Lattice Boltzmann method (LBM) has emerged as an efficient tool for direct numerical simulations in which the flow field around the particles can be fully resolved. In the thermal Lattice Boltzmann method not only the flow field but also the temperature field is calculated by using one distribution function for the fluid density and one for the fluid temperature. The treatment of curved solid-fluid boundaries is crucial for the simulation of particulate flows with this method. While several aspects of moving boundaries have been discussed in previous studies for the non-thermal LBM, it remains unknown to what extend these findings are transferable to the thermal LBM. In this work, we consider a 3D thermal LBM with a multiple-relaxation-time (MRT) collision operator and compare different techniques that can be applied to handle the moving boundary. There are three key aspects in the LBM that need to be considered at the boundary: the momentum exchange method calculating the drag force acting upon particles, the bounce-back scheme determining the bounce-back of density distribution functions at a boundary, and the refilling algorithm assigning a value to the unknown density distribution functions at lattice nodes uncovered by the particle. First, we demonstrate how the choice of the technique to address these problems in the flow field impacts the results for the temperature field in the thermal LBM. In a second step, we focus on the thermal side where similar techniques need to be applied. We compare different refilling strategies and bounce-back schemes for the temperature distribution functions and assess heat transfer calculation methods for the particle surface. The performance of these implementations is evaluated by comparing the simulation results in terms of accuracy and stability for a moving particle in a channel flow with a Galilean invariant reference system in which the particle’s position is fixed. We conduct this analysis for various Reynolds and Prandtl numbers to test the applicability of the individual techniques to varying flow conditions. Moreover, we demonstrate the potential of the implementation found to be superior by considering a more complex flow field in a particle packing. Our findings serve as a guideline for choosing suitable moving boundary treatments in thermal LBM simulations of particle-laden flows. [less ▲]

Detailed reference viewed: 54 (15 UL)
Full Text
Peer Reviewed
See detailAn interface resolved immersed boundary method in XDEM for particulate flow simulations
Wu, Mingqiu UL; Peters, Bernhard UL; Rosemann, Tony et al

in International Congress on Particle Technology (2019, April 09)

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart ... [more ▼]

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart. Later it has been extended for a different range of applications. The advantages of IBM over the body-fitted method is that it substantially simplified grid generation for immersed geometries, and it is easier to handle moving boundary situations. IBM even allows the use of a stationary and non-deformation background mesh, as well as it reduces the cost of computation by avoiding generation of a body-fitted mesh for each time step. However, the IBM approach is not straightforward to implement and it requires special techniques for cut-off boundary cells as well as special techniques for data point interpolations. Generally, the IBM is classified into two approaches based on the methods of imposing the boundary condition in the immersed body. The first approach is called fictitious domain method with continuous forcing scheme which employs a distributed forcing function to impose a rigidity boundary condition in the solid particle domain. The second one is the discrete forcing approach, which enables a sharp interface to represent the immersed surface. The IBM discussed in this work is a combination of these above two approaches: we first employ the continuous forcing scheme to get a first-step approximation of the immersed body, then use an interpolation polynomial to impose a desired accurate physical boundary for each immersed boundary point based on a least square interpolation reconstruction scheme. Particle motions can be calculated and tracked by solving Newton’s equations of motions using the extended discrete element method (XDEM) while the data of fluid flow properties are obtained by solving the Navier-Stokes equations which govern the fluid phase. Combined this leads to the basic concept of DEM-CFD coupling. Therefore, a particle interface resolved simulation solver is developed by coupling the XDEM and IBM approaches together. Consequently, this solver is then used to handle both static and dynamic particle problems as well as particle packed bed simulations. The validation of the solver can be performed by setting one static sphere in a channel and evaluate the drag coefficients and Strouhal number (when shedding occurs) at various Reynolds [less ▲]

Detailed reference viewed: 71 (20 UL)
Full Text
Peer Reviewed
See detailSecurity – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
Distler, Verena UL; Zollinger, Marie-Laure UL; Lallemand, Carine UL et al

in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to ... [more ▼]

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on user experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using standardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX and need fulfilment. Qualitative analysis of the interviews gives further insights into factors impacting perceived security. Our study adds to existing research suggesting a conceptual shift from usability to UX and discusses implications for designing and evaluating secure systems. [less ▲]

Detailed reference viewed: 202 (31 UL)
Full Text
Peer Reviewed
See detailFunctional Interpretation of Single Amino Acid Substitutions in 1,330 Disease-Associated Genes
Iqbal, Sumaiya; Jespersen, Jakob Berg; Perez-Palma, Eduardo et al

in Biophysical Journal (2019, February 15), 116(3), 420-421

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can ... [more ▼]

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can characterize patient missense variants across different protein classes with similar molecular level activities. The identified disease-associated features can advance our understanding of how a single amino acid substitution can lead to the etiology of monogenic disorders. For 1,330 disease-associated genes (>80%, 1,077/1,330 implicated in Mendelian disorders), we collected missense variants from the general population (gnomAD database, N=164,915) and patients (ClinVar and HGMD databases, N=32,923). We in silico mapped the variant positions onto >14k human protein 3D structures. We annotated the protein positions of variants with 40 structural, physiochemical, and functional features. We then grouped the genes into 24 protein classes based on their molecular functions and performed statistical association analyses with the features of population and patient variants. We identified 18 (out of 40) features that are associated with patient variants in general. Specifically, patient variants are less exposed to solvent (p<1.0e-100), enriched on b-sheets (p<2.37e-39), frequently mutate aromatic residues (p<1.0e-100), occur in ligand binding sites (p<1.0e-100) and are spatially close to phosphorylation sites (p<1.0e-100). We also observed differential protein-class-specific features. For three protein classes (signaling molecules, proteases and hydrolases), patient variants significantly perturb the disulfide bonds (p<1.0e-100). Only in immunity proteins, patient variants are enriched in flexible coils (p<1.65e-06). Kinases and cell junction proteins exhibit enrichment of patient variants around SUMOylation (p<1.0e-100) and methylation sites (p<9.29e-11), respectively. In summary, we studied shared and unique features associated with patient variants on protein structure across 24 protein classes, providing novel mechanistic insights. We generated an online resource that contains amino-acid-wise feature annotation-track for 1,330 genes, summarizes the patient-variant-associated features on residue level, and can guide variant interpretation. [less ▲]

Detailed reference viewed: 61 (0 UL)
Full Text
Peer Reviewed
See detailHow to Assess the Usability Metrics of E-Voting Schemes
Marky, Karola; Zollinger, Marie-Laure UL; Funk, Markus et al

in Lecture Notes in Computer Science (2019, February)

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailSC2Share: Smart Contract for Secure Car Sharing
Akash, Madhusudan; Symeonidis, Iraklis UL; A. Mustafa, Mustafa et al

in International Conference on Information Systems Security and Privacy (ICISSP) (2019, January 24)

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized ... [more ▼]

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized manner, annulling the need of an intermediary. Our solution, named SC2Share, leverages smart contracts and uses them to carry out secure and private car booking and payments. Our experiments on SC2Share on the Ethereum testnet guarantee high security and privacy to its users and confirm that our system is cost-efficient and ready for practical use. [less ▲]

Detailed reference viewed: 98 (3 UL)
Full Text
Peer Reviewed
See detailNovel Opportunities by Laser Welding of Dissimilar Materials
Schiry, Marc UL; Plapper, Peter UL

in Proceeding: International Conference on Competitive Manufacturing COMA'19 (2019, January)

The Laser Technology Competence Centre (LTCC) of the University of Luxembourg provides skills in joining material combinations, which are considered being non-weld able with traditional methods or at ... [more ▼]

The Laser Technology Competence Centre (LTCC) of the University of Luxembourg provides skills in joining material combinations, which are considered being non-weld able with traditional methods or at least challenging to join (e.g. Copper and Aluminium, Aluminium and Polyamide (PA), Titanium and PEEK, steel and tungsten hard alloy). Related accomplishments include minimal intermetallic compounds, convincing mechanical and superior electrical properties of the laser-welded specimen. With defined spatial and temporal modulation of the laser beam, an accurately defined temperature profile is created on the lower side of the upper material in the two dimensional directions, which enable joining of dissimilar materials in overlap configurations, despite challenging thermal properties. To weld butt-joint geometries with minimal heat affected volume, the temperature profiles were expanded in the third dimension, which can be achieved through controlled laser energy guidance. The scientific methods to accomplish these convincing results are explained, with selected industrial use cases ranging from automotive industry, energy storage, and medical implants. An outlook with unsolved challenges is intended to ignite discussions about upcoming research topics. [less ▲]

Detailed reference viewed: 23 (2 UL)
Full Text
See detailMethodological Aspects of Software Engineering, Assurance, Quality, and Reliability Engineering (MAS/AQR) 2019 Welcome from the Minitrack Co-Chairs
Tenbergen, Bastian; Ries, Benoît UL

in Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS) (2019, January)

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailElucidation of influencing parameters of the laser butt welding process of dissimilar steel to tungsten alloy sheets
Schiry, Marc UL; Plapper, Peter UL

in Proceedings: International Conference on Competitive Manufacturing COMA'19 (2019, January)

Laser welding of steel - tungsten alloy joints requires deep understanding of the impact of the laser parameters on the welding process. Due to the dissimilar thermal and metallurgical properties of both ... [more ▼]

Laser welding of steel - tungsten alloy joints requires deep understanding of the impact of the laser parameters on the welding process. Due to the dissimilar thermal and metallurgical properties of both materials, a defined heat input and a precise temperature control in the weld interface is required. In the presented work, the influence of different laser parameter (e.g. laser power, focal position, scanner speed etc.) on the joint quality of laser welded steel / tungsten alloy butt-joints were investigated. By using statistical methods, the influencing process parameters were defined and optimized. It is shown that the horizontal focal position is the main parameter for the welding process in a butt-joint configuration. Additionally, manipulation of the heat input leads to modifications of the weld bead profile. By obtaining vertical seam boundaries in the sheet metal, a homogenous temperature profile at the interface of the materials to be welded was achieved. Due to the complete bonding and low amount of intermetallic phases, high shear strength accompanied with a low variance were the result. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailRule-Based Supervisory Control-Extension for Automated Manufacturing Processes
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in International Journal of Mechanical Engineering and Robotics Research (2019)

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This ... [more ▼]

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This first step is ignored in most suggested automation concepts. Although their performance is satisfactory for the general process thanks to adaptive position- and force-/torque-control algorithms, they are unable to address specific problematic cases as often encountered in practice because of variations in workpiece-dimensions or -positioning. In this work, a human mimicking element is developed to overcome this limitation of current control concepts and to translate human expertise to the robotic manipulator. A rule-based system is designed where human knowledge is encoded as if-then rules. This system is integrated with a previously suggested control strategy in a hierarchical manner. The developed concept is experimentally validated on a KUKA LWR 4+-robotic manipulator. [less ▲]

Detailed reference viewed: 32 (4 UL)
Full Text
Peer Reviewed
See detailFRET Characterization of Hollow Plasmonic Nanoantennas
Maccaferri, Nicolò UL; Ponzellini, Paolo; Giovannini, Giorgia et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10894

We fabricated hollow nanoantennas with varying inner channels sizes on a gold-covered silicon nitride membrane. Our fabrication technique allowed us to narrow the size of the inner channels down to 15nm ... [more ▼]

We fabricated hollow nanoantennas with varying inner channels sizes on a gold-covered silicon nitride membrane. Our fabrication technique allowed us to narrow the size of the inner channels down to 15nm. We managed to exclusively decorate the tips of the antennas with thiol-conjugated dyes by creating a concentration gradient through the nanoantennas. Finally, we characterized the antennas in terms of their effect on the lifetime of dyes. We used Atto 520 and Atto 590 for the experiments. We carried out experiments with the antennas decorated with Atto 520, with Atto 590 as well as with the two Atto dyes at the same time. The experiments carried out with the antennas decorated with Atto 520 only and Atto 590 only yielded a lifetime reduction with respect to the confocal case. Interestingly, their lifetime reductions were significantly different. Then, we decorated the antennas with the two dyes at the same time. Even though we could not control the distance between the two dyes, FRET effects were clearly observed. The FRET effects were found to be dependent on the size of the inner channel. We believe that our tip decorated hollow nanoantennas could find application in FRET-based single molecule nanopore technologies. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailPlasmonic Nanopore Prepared on MoS2 Membrane - Hybrid Nanostructures Based on Site Selective Deposition
Mosconi, Dario; Miele, Ermanno; Giovannini, Giovannini et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10894

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple ... [more ▼]

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple metallic flat nanostructures and to complex 3D metallic structures comprising nanoholes. The deposition methods allow the decoration of large ordered arrays of plasmonic structures with single or few layers of MoS2. We show that the plasmonic field generated by the nanohole can interact significantly with the 2D layer, thus representing an ideal system for hybrid 2DMaterial/ Plasmonic investigation. The controlled/ordered integration of 2D materials on plasmonic nanostructures opens a pathway towards new investigation of the following: enhanced light emission; strong coupling from plasmonic hybrid structures; hot electron generation; and sensors in general based on 2D materials. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
See detailReductions of elliptic curves
Perucca, Antonella UL

in Proceedings of the Roman Number Theory Association (2019), 4

Detailed reference viewed: 59 (4 UL)
Full Text
Peer Reviewed
See detailFabrication and Optical Characterization of Hyperbolic Nanoparticles on a Transparent Substrate
Iarossi, Marzia; Darvill, Daniel; Isoniemi, Tommi et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10927

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and ... [more ▼]

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and near-infrared frequency ranges. The presented architecture opens the pathway towards novel routes to exploit the light to energy conversion channels beyond what is offered by current plasmon-based nanostructures, possibly enabling applications spanning from thermal emission manipulation, theragnostic nano-devices, optical trapping and nano-manipulation, non-linear optical properties, plasmonenhanced molecular spectroscopy, photovoltaics and solar-water treatments, as well as heat-assisted ultra-dense and ultrafast magnetic recording. [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
See detailConcrete-Filled Steel Tubular (CFTS) Columns Subjected to Eccentric Compressive Load
KEDZIORA, SLAWOMIR UL; Anwaar, Muhammad Omer

in AIP Conference Proceedings (2018, November 15)

Concrete-steel composite structures are very efficient in carrying high loads as they combine benefits of both materials concrete and steel. The combination of them can significantly improve the strength ... [more ▼]

Concrete-steel composite structures are very efficient in carrying high loads as they combine benefits of both materials concrete and steel. The combination of them can significantly improve the strength of the composite structure by taking advantage of high compression resistance of concrete and high strength of steel in tension. Recently, there has been renewed interest in the composite structures used in different forms, as beams, slabs, sandwich structures and columns and many methods of structural analyses were utilised. However, none of them was able to eliminate concrete material when it fractured. The presented work concerns circular composite columns CFST under eccentric compression. The principal objective of the project was to investigate a straightforward method based on a finite element analysis employed to estimate the load carrying capacity of columns. This study has also been set out to determine whether the Drucker-Prager material model of concrete without a crack capability could be used for analyses of the CFST columns with the additional elimination of the concrete material when concrete is damaged. The elaborated finite element model was verified with existing test data from the literature. The findings show that the correlation between the test results and the numerical analysis was excellent confirming the feasibility of usage of the proposed method for the assessment of complex cases of the CFST columns. A new part of the work is the employment of a death element feature to eliminate concrete material, which theoretically is not taking any load after reaching its tensile strength. A criterion to eliminate elements from the model is the maximum principal stress greater than tensile strength. The obtained results are excellent; the established goal was met entirely. [less ▲]

Detailed reference viewed: 77 (21 UL)
Full Text
Peer Reviewed
See detailFAST: A MapReduce Consensus for High Performance Blockchains
Khan, Nida UL

in ACM BlockSys@SenSys - BlockSys'18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (2018, November 04)

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their ... [more ▼]

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their throughput in terms of processed transactions, limit their applicability in such environments in a decentralized way as the underlying network is unable to sustain high workloads. In this paper a fully decentralized high performance consensus mechanism, named FAST, is proposed for a public blockchain. FAST is based on mapreduce paradigm for aggregating and adding transactions on blockchain blocks. FAST was implemented and evaluated in a basic blockchain prototype. A light client for FAST using IPFS, was developed to bring about a reduction in the data stored locally. The obtained results from tests conducted on the prototype depict that FAST exceeds the performance of not just other existing blockchain platforms but comes very close to the throughput of traditional electronic payment networks such as Visa. [less ▲]

Detailed reference viewed: 47 (8 UL)
Full Text
See detailA survey: The usage of Augmented Reality in Industry
Gallala, Abir UL; Hichri, Bassem UL; Plapper, Peter UL

in Robotix-Academy Conference for Industrial Robotics 2018 (2018, November 01)

Human-Robot-Interaction technologies in industry 4.0 and modern manufacturing are more and more growing. Using off-line robot programming methods such as Augmented Reality (AR) could gain time and money ... [more ▼]

Human-Robot-Interaction technologies in industry 4.0 and modern manufacturing are more and more growing. Using off-line robot programming methods such as Augmented Reality (AR) could gain time and money as well as improve programming and repair tasks. This paper is a study of the use of AR in smart factories. [less ▲]

Detailed reference viewed: 47 (6 UL)
Full Text
Peer Reviewed
See detailReflecting on teachers' practices as multimodally co-constructed in spatial reality
Arend, Béatrice UL

in Proceedings of ICERI2018 (2018, November)

Detailed reference viewed: 26 (3 UL)
Full Text
Peer Reviewed
See detailAssociations of wealth with frailty and memory impairment across the course of aging
Leist, Anja UL

in Innovation in Aging (2018, November), 2(S1), 906

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailDeterminants of cognitive decline in a large cross-national study using machine learning
Leist, Anja UL

in Innovation in Aging (2018, November), 2(S1), 244

Detailed reference viewed: 57 (8 UL)
Full Text
Peer Reviewed
See detailAre mutants really natural? A study on how “naturalness” helps mutant selection
Jimenez, Matthieu UL; Titcheu Chekam, Thierry UL; Cordy, Maxime UL et al

in Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling ... [more ▼]

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling techniques. Such models promise to capture the program semantics and identify source code parts that `smell', i.e., they are strange, badly written and are generally error-prone (likely to be defective). Aims: We investigate the use of natural language modelling techniques in mutation testing (a testing technique that uses artificial faults). We thus, seek to identify how well artificial faults simulate real ones and ultimately understand how natural the artificial faults can be. %We investigate this question in a fault revelation perspective. Our intuition is that natural mutants, i.e., mutants that are predictable (follow the implicit coding norms of developers), are semantically useful and generally valuable (to testers). We also expect that mutants located on unnatural code locations (which are generally linked with error-proneness) to be of higher value than those located on natural code locations. Method: Based on this idea, we propose mutant selection strategies that rank mutants according to a) their naturalness (naturalness of the mutated code), b) the naturalness of their locations (naturalness of the original program statements) and c) their impact on the naturalness of the code that they apply to (naturalness differences between original and mutated statements). We empirically evaluate these issues on a benchmark set of 5 open-source projects, involving more than 100k mutants and 230 real faults. Based on the fault set we estimate the utility (i.e. capability to reveal faults) of mutants selected on the basis of their naturalness, and compare it against the utility of randomly selected mutants. Results: Our analysis shows that there is no link between naturalness and the fault revelation utility of mutants. We also demonstrate that the naturalness-based mutant selection performs similar (slightly worse) to the random mutant selection. Conclusions: Our findings are negative but we consider them interesting as they confute a strong intuition, i.e., fault revelation is independent of the mutants' naturalness. [less ▲]

Detailed reference viewed: 75 (12 UL)
Full Text
Peer Reviewed
See detailThe Levodopa Response Trial and the Parkinson Disease Digital Biomarker Challenge: Monitoring symptoms of Parkinson’s disease in the lab and home using wearable sensors
Daneault, J.; Vergara-Diaz, G.; Costante, G. et al

in Movement Disorders : Official Journal of the Movement Disorder Society (2018, October 03), 33(S2), 525

Objective: To leverage a community of researchers and shared wearable data to develop algorithms to estimate the severity of PD specific symptoms. Background: People with Parkinson’s disease (PwPD) often ... [more ▼]

Objective: To leverage a community of researchers and shared wearable data to develop algorithms to estimate the severity of PD specific symptoms. Background: People with Parkinson’s disease (PwPD) often experience fluctuations in motor symptom severity. Wearable sensors have the potential to help clinicians monitor symptoms over time, outside the clinic. However, to gather accurate and clinically-relevant measures, there is a need to develop robust algorithms based on clinically- labelled data. Methods: The Levodopa Response Trial captured three-axis acceleration from two wrist-worn sensors and a smartphone located at the waist from 29 PwPD continuously over 4 days. On day 1, in an in-clinic visit, participants performed clinical assessments and motor tasks on their regular medication regimen. During these visits, a clinician also provided symptom severity scores for tremor, bradykinesia, and dyskinesia. On days 2 & 3, sensor data was collected while participants were at home. On day 4, participants returned to the clinic for the same assessments as day 1, but arrived without having taken their medication for at least 10 hours. Leveraging this dataset, Sage Bionetworks, the Michael J Fox Foundation and the Robert Wood Johnson Foundation launched the PD Digital Biomarker DREAM Challenge which made a subset of the data available to researchers to develop robust and accurate algorithms for the estimation of specific symptoms’ severity. Results: Teams participating in the challenge used several technical approaches, from signal processing to deep learning. 35 submissions were received for the estimation of action tremor severity. Teams achieved an area under the precision-recall curve (AUPR) of 0.444 to 0.75. As for dyskinesia during movement, 37 submissions were received and the teams achieved an AUPR of 0.175 to 0.477. Finally, 39 submissions were received for the estimation of bradykinesia and the teams achieved an AUPR of 0.413 to 0.95. Null expectations for the testing datasets were 0.432, 0.195, and 0.266, respectively. Conclusions: Making datasets available to the community leverages the creativity of different groups to develop robust and accurate algorithms for the estimation of PD symptom severity. This will lead to better quality and interpretability of data collected in unsupervised settings within the community. [less ▲]

Detailed reference viewed: 116 (4 UL)
Full Text
Peer Reviewed
See detailA17044 Community health workers for non-communicable disease interventions in the digital age
Mishra, Shiva Raj; Lygidakis, Charilaos UL; Neupane, Dinesh et al

in Journal of Hypertension (2018, October)

Objectives: In this study, we review the evidence and discuss how the digitalization affects the CHWs programs for tackling non-communicable diseases (NCDs) in low-and-middle income countries (LMICs ... [more ▼]

Objectives: In this study, we review the evidence and discuss how the digitalization affects the CHWs programs for tackling non-communicable diseases (NCDs) in low-and-middle income countries (LMICs). Methods: We conducted a review of literature covering two databases: PubMED and Embase. A total of 97 articles were abstracted for full text review of which 21 are included in the analysis. Existing theories were used to construct a conceptual framework for understanding how digitalization affects the prospects of CHW programs for NCDs. Results: We identified three benefits and three challenges of digitalization. Firstly, it will help improve the access and quality of services, notwithstanding its higher establishment and maintenance costs. Secondly, it will add efficiency in training and personnel management. Thirdly, it will leverage the use of data generated across grass-roots platforms to further research and evaluation. The challenges posed are related to funding, health literacy of CHWs, and systemic challenges related to motivating CHWs. More than 60 digital platforms were identified, including mobile based networking devices (used for behavioral change communication), Web-applications (used for contact tracking, reminder system, adherence tracing, data collection, and decision support), videoconference (used for decision support) and mobile applications (used for reminder system, supervision, patients’ management, hearing screening, and tele-consultation). Conclusion: The digitalization efforts of CHW programs are afflicted by many challenges, yet the rapid technological penetration and acceptability coupled with the gradual fall in costs constitute encouraging signals for the LMICs. Both CHWs interventions and digital technologies are not inexpensive, but they may provide better value for the money. [less ▲]

Detailed reference viewed: 45 (0 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 140 (17 UL)
Full Text
Peer Reviewed
See detailVisual emulation for Ethereum's virtual machine
Norvill, Robert UL; Fiz Pontiveros, Beltran UL; State, Radu UL et al

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018, July 09)

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we ... [more ▼]

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we are able to display the program's control flow graph, opcodes and stack for each step of contract execution. This tool is designed to aid the user's understanding of the Etheruem Virtual Machine as well as aid the analysis of any given smart contract. As such, it functions as both an analysis and a learning tool. It allows the user to view the code in each block of a smart contract and follow possible control flow branches. It is able to detect loops and suggest optimisation candidates. It is possible to step through a contract one opcode at a time. E-EVM achieved an average of 85.6% code coverage when tested. [less ▲]

Detailed reference viewed: 29 (4 UL)
Full Text
Peer Reviewed
See detailAssessing the performance of coordinated predictive control strategies on urban-motorway networks
Rinaldi, Marco UL; Viti, Francesco UL

in IFAC-PapersOnLine (2018, July), 51(9), 285-290

Coordination and integration of different traffic control policies have been of considerable interest in research in the last decades and, recently, have been object of large scale implementation trials ... [more ▼]

Coordination and integration of different traffic control policies have been of considerable interest in research in the last decades and, recently, have been object of large scale implementation trials. In the setting of peri-urban motorway systems, coordination of various kinds of controllers must however be accompanied by accurate prediction of both propagation of flows and queues in the network, as well as the users’ response in terms of route choice. In this paper, we showcase through a real-life case study how coordination and prediction are both essential when performing hybrid urban-motorway control. Simulation results of a Model Predictive Control application are compared to simpler local control approaches, and the impact of coordinated intersection control and, additionally, Ramp Metering is evaluated. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailA Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs
Bezzaoucha, Souad UL; Voos, Holger UL; Davila, Jorge et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea ... [more ▼]

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea consists in defining a state and unknown input transformations in order to divide the state vector into two parts, a measurable part and an observable one (decoupled from the unknown input). A classical Luenberger observer to estimate the unmeasurable part is then designed and given in terms of Linear Matrix Inequalities (LMIs) conditions. A numerical example is also presented in order to illustrate the proposed approach. [less ▲]

Detailed reference viewed: 85 (4 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 144 (7 UL)
Full Text
Peer Reviewed
See detailGene x Environment Interaction on Developmental Outcomes in Germany: What is the Environment that matters?
Gottschling, Juliana UL; Hahn, Elisabeth; Spinath, Frank M.

in Behavior Genetics (2018, June)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailIntrusion-Tolerant Autonomous Driving
Volp, Marcus UL; Verissimo, Paulo UL

in Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (2018, May 29)

Fully autonomous driving is one if not the killer application for the upcoming decade of real-time systems. However, in the presence of increasingly sophisticated attacks by highly skilled and well ... [more ▼]

Fully autonomous driving is one if not the killer application for the upcoming decade of real-time systems. However, in the presence of increasingly sophisticated attacks by highly skilled and well equipped adversarial teams, autonomous driving must not only guarantee timeliness and hence safety. It must also consider the dependability of the software concerning these properties while the system is facing attacks. For distributed systems, fault-and-intrusion tolerance toolboxes already offer a few solutions to tolerate partial compromise of the system behind a majority of healthy components operating in consensus. In this paper, we present a concept of an intrusion-tolerant architecture for autonomous driving. In such a scenario, predictability and recovery challenges arise from the inclusion of increasingly more complex software on increasingly less predictable hardware. We highlight how an intrusion tolerant design can help solve these issues by allowing timeliness to emerge from a majority of complex components being fast enough, often enough while preserving safety under attack through pre-computed fail safes. [less ▲]

Detailed reference viewed: 39 (7 UL)
Full Text
Peer Reviewed
See detailAcceptability and Acceptance of Autonomous Mobility on Demand: The Impact of an Immersive Experience
Distler, Verena UL; Lallemand, Carine UL; Thierry, Bellet

in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (2018, April)

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging ... [more ▼]

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging mode of public transportation [7], Autonomous mobility on demand (AMoD) is of particular interest in this context. The aim of the present study is to identify the main components of acceptability (before first use) and acceptance (after first use) of AMoD, following a user experience (UX) framework. To address this goal, we conducted three workshops (N=14) involving open discussions and a ride in an experimental autonomous shuttle. Using a mixed-methods approach, we measured pre-immersion acceptability before immersing the participants in an on-demand transport scenario, and eventually measured post-immersion acceptance of AMoD. Results show that participants were reassured about safety concerns, however they perceived the AMoD experience as ineffective. Our findings highlight key factors to be taken into account when designing AMoD experiences. [less ▲]

Detailed reference viewed: 60 (12 UL)
Full Text
Peer Reviewed
See detailA UX Approach to Privacy and Security: the Impact of User, Contextual and System-Related Factors
Distler, Verena UL; Lallemand, Carine UL; Koenig, Vincent UL

in CHI Workshop Exploring Individual Diffferences in Privacy (2018, April)

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We ... [more ▼]

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We advocate using UX design methods in order to study interindividual differences, system-related and contextual factors involved in privacy and security attitudes and behaviors. These results will contribute to user-tailored and personalized privacy initiatives and guide the design of future technologies. [less ▲]

Detailed reference viewed: 153 (11 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (2018, March 18), 113

Detailed reference viewed: 206 (15 UL)
Full Text
Peer Reviewed
See detailInvestigating Siri as a virtual assistant in a learning context
Arend, Béatrice UL

in Proceedings of 12th annual International Technology, Education and Development Conference 2018 (2018, March)

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailAdvancing flexible volatile compound sensors using liquid crystals encapsulated in polymer fibers
Reyes, Catherine UL; Lagerwall, Jan UL

in Proceedings of SPIE : The International Society for Optical Engineering (2018, February 08), 10555(105550O),

Until recently, organic vapor sensors using liquid crystals (LCs) have employed rigid glass substrates for confining the LC, and bulky equipment for vapor detection. Previously, we demonstrated that ... [more ▼]

Until recently, organic vapor sensors using liquid crystals (LCs) have employed rigid glass substrates for confining the LC, and bulky equipment for vapor detection. Previously, we demonstrated that coaxially electrospinning nematic LC within the core of polymer fibers provides an alternative and improved form factor for confinement. This enables ppm level sensitivity to harmful industrial organics, such as toluene, while giving the flexibility of textile-like sheets (imparted by polymer encapsulation). Moreover, toluene vapor responses of the [less ▲]

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailIdentification and Characterization of Variant Intolerant Sites across Human Protein 3-Dimensional Structures
Iqbal, Sumaiya; Berg Jespersen, Jakob; Perez-Palma, Eduardo et al

in Biophysical Journal (2018, February 02), 114(3, Suppl. 1), 664

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish ... [more ▼]

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish pathogenic variants from benign rare variants. This lack of statistical and bioinformatics analyses, accompanied by an ever-increasing number of identified variants in biomedical research and clinical applications, has become a major challenge. Established methods to predict the functional effect of genetic variation use the degree of amino acid conservation across species in linear protein sequence alignment. More recent methods include the spatial distribution pattern of known patient and control variants. Here, we propose to combine the linear conservation and spatial constrained based scores to devise a novel score that incorporates 3-dimensional structural properties of amino acid residues, such as the solvent-accessible surface area, degree of flexibility, secondary structure propensity and binding tendency, to quantify the effect of amino acid substitutions. For this study, we develop a framework for large-scale mapping of established linear sequence-based paralog and ortholog conservation scores onto the tertiary structures of human proteins. This framework can be utilized to map the spatial distribution of mutations on solved protein structures as well as homology models. As a proof of concept, using a homology model of the human Nav1.2 voltage-gated sodium channel structure, we observe spatial clustering in distinct domains of mutations, associated with Autism Spectrum Disorder (>20 variants) and Epilepsy (>100 variants), that exert opposing effects on channel function. We are currently characterizing all variants (>300k individuals) found in ClinVar, the largest disease variant database, as well as variants identified in >140k individuals from general population. The variant mapping framework and our score, informed with structural information, will be useful in identifying structural motifs of proteins associated with disease risk. [less ▲]

Detailed reference viewed: 62 (2 UL)
Full Text
Peer Reviewed
See detailRecycling Smart Contracts: Compression of the Ethereum Blockchain.
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018 (2018, February)

Detailed reference viewed: 61 (7 UL)
Full Text
See detailLe droit commun et l'avenir du droit luxembourgeois
Kinsch, Patrick UL

in Actes de la Section des sciences morales et politiques (2018), XXI

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit ... [more ▼]

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit du Code civil ; au-delà du droit civil, il existe du droit commun dans toutes les branches du droit, même en droit fiscal. Ne sous-estimons pas le droit commun ; il est précieux. Mais a-t-il un véritable avenir au Luxembourg ? Il a quelques alliés, il est vrai : le contrôle de la constitutionnalité des lois, et le contrôle des clauses abusives dans les contrats. Deux puissants facteurs jouent cependant contre lui : 1° le manque, paradoxal mais réel, de ressources qui permettraient de faire évoluer le droit commun, en particulier sur le plan législatif ; 2° le souhait de le remplacer par du droit dérogatoire (et compétitif dans le marché international des normes), qui n’a aucune des caractéristiques, rappelées ci-dessus, du droit commun. [less ▲]

Detailed reference viewed: 66 (9 UL)
Full Text
Peer Reviewed
See detailJames Bond's Most Secret Weapon
Leprévost, Franck UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (2018)

This conference presents in a non-conventional way secret-key and public-key cryptology from its origins to the present days.

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailCognitive biases in pain: current challenges, future directions and treatment opportunities
Van Ryckeghem, Dimitri UL

in Canadian Journal of Pain (2018)

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that ... [more ▼]

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that children and adults with pain show cognitive biases for pain-related information, i.e. they selectively attend to pain-related information at the cost of other information (attentional bias), interpret ambiguous stimuli as pain-related (interpretation bias) or have biased memories for painful events (memory bias), has been particularly influential in this context. Notwithstanding the considerable progress made in the understanding of cognitive biases related to pain and threat, a number of questions remains unanswered and future challenges linger. A first challenge is to further delineate the characteristics of cognitive biases, including their content specificity and dynamics. A second challenge relates to the understanding of how cognitive biases interrelate with each other and possibly reinforce one another. A third challenge relates to the translation of findings on cognitive biases for pain into clear strategies and recommendations to optimize and evaluate pain treatment programs. Presenters in this symposium will address each of the above-mentioned lingering challenges by both critically reviewing the available evidence on cognitive biases in children and/ or adults experiencing pain and presenting novel research using innovative study set-ups and unique methods for assessing and modifying cognitive biases in children and adults experiencing pain. [less ▲]

Detailed reference viewed: 30 (9 UL)
Full Text
See detailUnderstanding human need fulfilment to support the design of secure experiences
Distler, Verena UL

in Proceedings of NordiCHI' 18 Doctoral Consortium (2018)

Detailed reference viewed: 28 (11 UL)
See detailTombeaux monumentaux d’Arlon/Orolaunum vicus
Ruppert, Christine UL

in Signa (2018), 7

Detailed reference viewed: 19 (2 UL)
Full Text
Peer Reviewed
See detailDirectionality of Attacks in Natural Language Argumentation
Cramer, Marcos UL; Guillaume, Mathieu UL

in CEUR Workshop Proceedings (2018)

In formal (abstract and structured) argumentation theory, a central notion is that of an attack between a counterargument and the argument that it is challenging. Unlike the notion of an inconsistency ... [more ▼]

In formal (abstract and structured) argumentation theory, a central notion is that of an attack between a counterargument and the argument that it is challenging. Unlike the notion of an inconsistency between two statements in classical logic, this notion of an attack between arguments can be asymmetric, i.e. an argument A can attack an argument B without B attacking A. While this property of the formal systems studied by argumentation theorist has been motivated by considerations about the human practice of argumentation in natural language, there have not been any systematic studies on the connection between the directionality of attacks in argumentation-theoretic formalisms and the way humans actually interpret conflicts between arguments in a non-symmetric way. In this paper, we report on the result of two empirical cognitive studies that aim at filling this gap, one study with ordinary adults (undergraduate students) and one study with adult experts in formal argumentation theory. We interpret the results in light of the notions and distinctions defined in the ASPIC+ framework for structured argumentation, and discuss the relevance of our findings to past and future empirical studies about the link between human argumentation and formal argumentation theory. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailElliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations
Leprévost, Franck UL; Bernard, Nicolas UL; Bouvry, Pascal UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018) (2018)

These notes summarize some computations conducted around the Elliptic Curves Discrete Logarithm Problem (ECDLP) over a finite field Fp.

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailEmpirical Cognitive Study on Abstract Argumentation Semantics
Cramer, Marcos UL; Guillaume, Mathieu UL

in Frontiers in Artificial Intelligence and Applications (2018)

In abstract argumentation theory, multiple argumentation semantics have been proposed that allow to select sets of jointly acceptable arguments from a given set of arguments based on the attack relation ... [more ▼]

In abstract argumentation theory, multiple argumentation semantics have been proposed that allow to select sets of jointly acceptable arguments from a given set of arguments based on the attack relation between arguments. The existence of multiple argumentation semantics raises the question which of these semantics predicts best how humans evaluate arguments, possibly depending on the thematic con- text of the arguments. In this study we report on an empirical cognitive study in which we tested how humans evaluate sets of arguments de- pending on the abstract structure of the attack relation between them. Two pilot studies were performed to validate the intended link between argumentation frameworks and sets of natural language arguments. The main experiment involved a group deliberation phase and made use of three different thematic contexts of the argument sets involved. The data strongly suggest that independently of the thematic contexts that we have considered, strong acceptance and strong rejection according to the CF2 and preferred semantics are a better predictor for human argument acceptance than the grounded semantics (which is identical to strong acceptance/rejection with respect to complete semantics). Furthermore, the data suggest that CF2 semantics predicts human argument acceptance better than preferred semantics, but the data for this comparison is limited to a single thematic context. [less ▲]

Detailed reference viewed: 14 (2 UL)
Peer Reviewed
See detailHelical light emission from plasmonic vortices via magnetic tapered tip
Maccaferri, Nicolò UL; Gorodetski, Yuri; Garoli, Denis

in Journal of Physics. Conference Series (2018), 961

We investigate an architecture where a plasmonic vortex excited in a gold surface propagates on an adiabatically tapered magnetic tip and detaches to the far-field while carrying a well-defined optical ... [more ▼]

We investigate an architecture where a plasmonic vortex excited in a gold surface propagates on an adiabatically tapered magnetic tip and detaches to the far-field while carrying a well-defined optical angular momentum. We analyze the out-coming light and show that, despite generally high losses of flat magnetic surface, our 3D structure exhibits high energy throughput. Moreover, we show that once a magneto-optical activity is activated inside the magnetic tip a modulation of the total power transmittance is possible. [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
See detailBinge-watching engagement as determined by motivations, impulsivity and emotional reactivity: A cluster analytic approach.
Flayelle, Maèva UL; Maurage, Pierre; Vögele, Claus UL et al

in Alcoholism: Clinical & Experimental Research (2018), 42 (Suppl. 2)

Detailed reference viewed: 22 (3 UL)
Full Text
Peer Reviewed
See detailEditionsphilologie und inszenierende Typographie: eine praxeologische Perspektive auf die 'Mein-Kampf'-Edition des Instituts für Zeitgeschichte
Busch, Christopher UL; Ahrens, Moritz

in Editio : Internationales Jahrbuch für Editionswissenschaft = International Yearbook of Textual Criticism and Editorial Science] (2018), 32

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailA Model for Regulating of Ethical Preferences in Machine Ethics
Baniasadi, Zohreh UL; Parent, Xavier UL; Max, Charles UL et al

in Proceedings of International Conference on Human-Computer Interaction (2018)

Detailed reference viewed: 127 (36 UL)
Full Text
Peer Reviewed
See detailAssessing binge-watching behaviors: Development of the « Watching TV Series Motives » and the « Binge-Watching Engagement » questionnaires
Flayelle, Maèva UL; Canale, Natale; Maurage, Pierre et al

in Journal of Behavioral Addictions (2018), 7 (Suppl.1)

Detailed reference viewed: 17 (0 UL)
Full Text
See detailLocally-confined electrodeposition of Cu(In,Ga)Se2micro islands for micro-concentrator solar cells.
Correa, David; Siopa, Daniel UL; Salomé, Pedro M.P. et al

in IEEE (2018)

Detailed reference viewed: 42 (1 UL)
Full Text
Peer Reviewed
See detailA Parallel Multiscale DEM-VOF Method For Large-Scale Simulations Of Three-Phase Flows
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in Proceedings of ECCM-ECFD 2018 (2018)

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between ... [more ▼]

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between granular phases and complex fluid flows. Nevertheless, previous studies did not focus on the parallel performance of such a coupling and were, therefore, limited to relatively small applications. In this contribution, we propose an insight into the performance of the dual-grid multiscale DEM-VOF method for three- phase flows when operated in parallel. In particular,we focus on a famous benchmark case for three-phase flows and assess the influence of the partitioning algorithm on the scalability of the dual-grid algorithm. [less ▲]

Detailed reference viewed: 56 (20 UL)
Full Text
Peer Reviewed
See detailThe low-dimensional algebraic cohomology of the Witt and the Virasoro algebra
Ecker, Jill Marie-Anne UL; Schlichenmaier, Martin UL

in Journal of Physics. Conference Series (2018)

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailMonitoring the transaction selection policy of Bitcoin mining pools
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining ... [more ▼]

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining pools distribute amongst the workers the task of finding a block so that each worker works on a different subset of the candidate solutions. In most mining pools the selection of transactions to be part of the next block is performed by the pool manager and thus becomes more centralized. A mining Pool is expected to give priority to the most lucrative transactions in order to increase the block reward however changes to the transaction policy done without notification of workers would be difficult to detect. In this paper we treat the transaction selection policy performed by miners as a classification problem; for each block we create a dataset, separate them by mining pool and apply feature selection techniques to extract a vector of importance for each feature. We then track variations in feature importance as new blocks arrive and show using a generated scenario how a change in policy by a mining pool could be detected. [less ▲]

Detailed reference viewed: 43 (5 UL)
Full Text
Peer Reviewed
See detailComparison of Several RANS Modelling for the Pavia TRIGA Mark II Research Reactor
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in Journal of Nuclear Engineering and Radiation Science (2018)

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the ... [more ▼]

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the channel thermal-hydraulics of the TRIGA Mark II reactor. Only the steady state behaviour (i.e. the full power stationary operational conditions) of the reactor has been considered. To this end, the RAS (Reynolds-Averaged Simulation) models available in the open source CFD software OpenFOAM have been applied to the most internal channel of the TRIGA and assessed against a Large Eddy Simulation (LES) model. The results of the latter approach, expressed in terms of axial velocity, turbulent viscosity, turbulent kinetic energy, and temperature have been compared with the results obtained by the RAS models available in OpenFOAM (k − ε, k − ω and Reynolds Stress Transport). Heat transfer is taken into account as well by means of the turbulent energy diffusivity parameter. The simulation results demonstrate how, amongst the RAS models, the k − ω SST is the one whose results are closer to the LES simulation. This model seems to be the best one for the treatment of turbulent flow within the TRIGA subchannel, offering a good compromise between accuracy and computational requirements. Since it is much less expensive than an LES model, it can be applied even to full core calculation, in order to obtain accurate results with less computational effort. [less ▲]

Detailed reference viewed: 83 (7 UL)
Full Text
Peer Reviewed
See detailAre we post-justification? Stout's case for self-knowledge, political justification and public philosophy
Burks, Deven UL

in Ethics, Politics & Society (2018), 1

Must the participant to public discourse have knowledge of her beliefs, attitudes and reasons as well as belief-formation processes to have justified political belief? In this paper, we test this question ... [more ▼]

Must the participant to public discourse have knowledge of her beliefs, attitudes and reasons as well as belief-formation processes to have justified political belief? In this paper, we test this question with reference to Jeffrey Stout’s (2004) approach to public discourse and public philosophy. After defining self- knowledge and justification along the lines of James Pryor (2004), we map thereon Stout’s view of public discourse and public philosophy as democratic piety, earnest storytelling and Brandomian expressive rationality. We then lay out Brian Leiter’s (2016) naturalistic critique of public philosophy as “discursive hygiene” to see whether Stoutian public philosophy survives the former’s emotivist-tribalist gauntlet. Lastly, we find that Leiter’s critique proves less radical than it may appear and requires the moderating influence of a public philosophy like Stout’s. All in all, Stoutian public discourse and public philosophy powerfully illustrates a strong, necessary connection between self-knowledge and political justification. Post-truth is not post-justification. [less ▲]

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailLegal Design Patterns for Privacy
Haapio, Helena; Hagan, Margaret; Palmirani, Monica et al

in Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy communication is no exception, especially for those who seek to effectively inform individuals about the ... [more ▼]

Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy communication is no exception, especially for those who seek to effectively inform individuals about the use of their data. Lawyers across countries and industries are facing recurring problems when (re)writing privacy notices and terms. Visual and interactive design patterns have been suggested as the solution, yet our analysis shows that they are lacking on most privacy policies. This indicates the need for standardization and an actionable pattern library, which we propose in this paper. [less ▲]

Detailed reference viewed: 36 (3 UL)
Full Text
See detailModellierung eines PVT-basierten Wärmepumpensystems auf der Basis von CO2 Direktverdampfung
Rullof, Johannes UL; Lambers, Klaus Jürgen; Blieske, Ulf et al

in Proceedings of Deutsche Kälte- und Klimatagung DKV 2018 (2018)

Die Systemkombination aus Wärmepumpe und solarthermischen Absorber, basierend auf freier Konvektion und Strahlung, und Photovoltaik (PV) in einem Modul (PVT-Modul) kann aufgrund der Reduzierung des ... [more ▼]

Die Systemkombination aus Wärmepumpe und solarthermischen Absorber, basierend auf freier Konvektion und Strahlung, und Photovoltaik (PV) in einem Modul (PVT-Modul) kann aufgrund der Reduzierung des Heizwärmebedarfs von Gebäuden und des verstärkten Betriebs von Wärmepumpen während der Niedrigstrompreiszeiten am Tage und dem damit verbundenen höheren Strahlungsanteil der Umweltwärme zukünftig eine Alternative zu zwangskonvektions-basierten Luft-Wärmepumpen sein. Der Beitrag beschäftigt sich mit einem CO2-Wärmepumpensystem, bestehend aus einem neuartigen Solar-Hybridmodul, welches einen mikrokanal-basierten Verdampfer einer CO2-Wärmepumpe mit einem PV-Modul vereint (PVT-direkt). Um die Machbarkeit des neuartigen PVT-direkt-Wärmepumpensystems zu demonstrieren, wird im Rahmen eines Forschungsprojekts ein funktionsfähiges PVT-direkt-Modul konstruiert und schließlich als Teil eines CO2-Wärmepumpensystems getestet und modelliert. Die Besonderheit der Kombination eines thermischen Absorbers mit einer Wärmepumpe liegt in der Erschließung der Solarenergie und Umgebungsenergie als Energiequelle. Hierbei ist die Kenntnis über die thermische Leistung des PVT-Moduls unter anderem durch den konvektiven Wärmeübergang zwischen dem PVT-Modul und der Umgebung relevant. Sowohl der Modulneigungswinkel (Anströmwinkel) und die Windrichtung (Azimutwinkel) haben einen nicht zu vernachlässigenden Einfluss auf den resultierenden Wärmeübergangskoeffi-zienten der erzwungenen Konvektion. Da im Rahmen einer Literaturrecherche keine für das PVT-Modul direkt zu übertragenden experimentelle Untersuchungen und Berechnungsgrundlagen zur Bestimmung des konvektiven Wärmeübergangs gefunden werden konnten, wurde mit Hilfe der Software ANSYS Fluent eine CFD-Simulation zum konvektiven Wärmeübergang am PVT-Modul durchgeführt, deren Ergebnisse in dieser Arbeit präsentiert werden. [less ▲]

Detailed reference viewed: 17 (5 UL)
Full Text
Peer Reviewed
See detailDevelopment of a Control Strategy for a PVT-based CO2 Heat Pump
Rullof, Johannes UL; Lambers, Klaus Jürgen; Blieske, Ulf et al

in Proceedings of 7th International Energy and Sustainability Conference (IESC) (2018)

In recent years, the possibility of combining photovoltaics (PV) and solar thermal collectors into one solar hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and ... [more ▼]

In recent years, the possibility of combining photovoltaics (PV) and solar thermal collectors into one solar hybrid module (PVT-module) has been increasingly investigated. PVT-modules produce thermal and electrical energy at the same time. Since the efficiency of a photovoltaic module decreases with increasing temperature, the temperature of the heat transfer media is often limited to about 30 °C and the PVT-module is combined with a heat pump, which increases the temperature on the “warm side”. A common approach is to integrate the PVT-module directly as an evaporator in a heat pump system (PVT-direct). This paper presents the development of a control strategy for a PVT-based CO2 heat pump that takes into account solar radiation, ambient temperature, wind speed, evaporator temperature and compressor power. The developed control strategy provides different operating modes depending on the solar radiation supply as well as the ambient temperature. [less ▲]

Detailed reference viewed: 20 (2 UL)
Full Text
See detailChancen und Barrieren Inklusiver Bildung im Vergleich: Lernen von Anderen
Powell, Justin J W UL

in Schriftenreihe Eine für Alle — Die inklusive Schule für die Demokratie (2018), 3

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird ... [more ▼]

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird global, national, regional und lokal von verschiedensten Akteur*innen hervorgehoben und medial sehr breit rezipiert—und zunehmend auch wissenschaftlich multidisziplinär diskutiert. Durch Initiativen wie „Education for All“ (UNESCO, 2015), die Konvention über die Rechte von Menschen mit Behinderung der Vereinten Nationen (UN-BRK, seit 2006), welche inklusive Bildung als Menschenrecht verankert, oder die UN Millennium Development Goals (www.un.org/millenniumgoals) wird das Thema Inklusion verstärkt in Bildungspolitik und -praxis aufgegriffen. Innerhalb einer Dekade haben über 170 Länder die UN-BRK ratifiziert (United Nations, 2017). Artikel 24 definiert Inklusive Bildung als Menschenrecht: „Die Vertragsstaaten (sichern)... den Zugang zu einem inklusiven, hochwertigen und unentgeltlichen Unterricht“ (Art. 24, UN-BRK). Damit wird inklusive Bildung zur globalen Norm und zum einklagbaren Recht entlang des Lebenslaufs. In diesem Beitrag wird anhand ausgewählter Vergleiche aufgezeigt, wie sich die Expansion und Persistenz der schulischen Segregation anstatt der Ausweitung der Inklusion vollzieht. Dabei wurde ein langsamer Wandel statt Transformation dieser komplexen Bildungssysteme konstatiert. Im Ländervergleich wurden immer wieder markante Divergenzen festgestellt, wonach die unterschiedlichen „institutionellen Logiken“ dieser Systeme sichtbar wurden. Abschließend lässt sich festhalten, dass die Förderquote wohl weiter steigen wird wegen größerem Bedarf (oder wahrgenommenen Förderbedarfs), erhöhter Standards und gesteigerter Rechenschaftspflicht als Teile der Governance von Bildung. Sonderpädagogische Förderung nimmt seit Jahrzehnten weltweit zu, oft in Sonderschulen oder -klassen. Es mag paradox erscheinen, dass gleichzeitig sowohl segregierende als auch inklusive Lernumwelten expandieren. Der Grund: Die Verflechtung und Wechselwirkungen zwischen sonderpädagogischen Fördersystemen, allgemeiner Bildung und anderen Institutionen sowie die Interessen der beteiligten Professionen verhindern die Transformation hin zur schulischen Inklusion für alle. Gleichzeitig schreitet dennoch auch in den Bildungssystemen, die hochgradig selektiv und segregiert sind, Inklusive Bildung voran. Vergleichende Forschung verdeutlicht vielfältige Grenzen, aber auch Facilitatoren der Inklusion auf unterschiedlichen Ebenen. Die Ratifizierung der UN-BRK in Deutschland hat die Notwendigkeit unterstrichen, die Bildungssysteme auf Länder- und lokaler Ebene umzubauen und den Wandel zu erforschen. Die UN-BRK stärkt Advokaten der Inklusiven Bildung nachhaltig. Auch aufgrund des Bil- dungsföderalismus wird die Implementierung weiterhin ein schrittweiser, pfadabhängiger Prozess und keine fundamentale Transformation sein. Gerade in föderalen Ländern wie Deutschland und den USA gibt es eine Persistenz einzelstaatlicher Disparitäten trotz (inter-)nationaler Ziele, Normen und völkerrechtlicher Verträge, die es weiter zu untersuchen und zu implementieren gilt. Die Chance, die solche Systeme bieten, ist die Kontrastierung der diversen Pfade hin zur Inklusiven Bildung und die Chance zur Politik der Vielfalt, die zu einer Schule für alle und zur Pädagogik der Vielfalt passt. [less ▲]

Detailed reference viewed: 131 (6 UL)
Full Text
Peer Reviewed
See detailTowards a Management Plane for Smart Contracts: Ethereum Case Study
Khan, Nida UL; Lahmadi, Abdelkader; Francois, Jerome et al

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are ... [more ▼]

Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are monitoring and management of blockchain-based decentralized applications. In this paper, we design, implement and evaluate a novel system to enable management operations in smart contracts. A key aspect of our system is that it facilitates the integration of these operations through dedicated ’managing’ smart contracts to provide data filtering as per the role of the smart contract-based application user. We evaluate the overhead costs of such data filtering operations after post-deployment analyses of five categories of smart contracts on the Ethereum public testnet, Rinkeby. We also build a monitoring tool to display public blockchain data using a dashboard coupled with a notification mechanism of any changes in private data to the administrator of the monitored decentralized application. [less ▲]

Detailed reference viewed: 50 (4 UL)
Full Text
Peer Reviewed
See detailDevelopment of a Data-Driven Approach based on Kalman filtering for CFD Reactor Analysis
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in PHYSOR 2018 (2018)

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most ... [more ▼]

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most cases are able to provide fairly accurate results while maintaining a low computational cost. However, for complex systems such as nuclear reactors, more detailed models are required for the in-depth analysis of the problem at hand, due for example to the complex geometries of the physical domain. Nevertheless, such models are affected by potentially critical uncertainties and inaccuracies. In this context, the use of data assimilation methods such as the Kalman filter to integrate local experimental data witihin the numerical model looks very promising as a high-fidelity analysis tool. In this work, the focus is the application of such methods to the problem of fluid-dynamics analysis of the reactor. Indeed, in terms of nuclear reactor investigation, a detailed characterization of the coolant behaviour within the reactor core is of manda- tory importance in order to understand, among others, the operating conditions of the system, and the potential occurrence of accident scenarios. In this context, the use of data assimilation methods allows the extraction of information of the thermo-dynamics state of the system in a benchmarked transitory in order to increase the fidelity of the com- putational model. Conversely to the current application of control-oriented black-box in the nuclear energy community, in this work the integration of the data-driven paradigm into the numerical formulation of the CFD problem is proposed. In particular, the al- gorithm outlined embeds the Kalman filter into a segregated predictor-corrector formu- lation, commonly adopted for CFD analysis. Due to the construction of the developed method, one of the main challenges achieved is the preservation of mass-conservation for the thermo-dynamics state during each time instant. As a preliminary verification, the proposed methodology is validated on a benchmark of the lid-driven cavity. The obtained results highlight the efficiency of the proposed method with respect to the state-of-art low fidelity approach. [less ▲]

Detailed reference viewed: 72 (1 UL)
Full Text
Peer Reviewed
See detailDiscovery and pathogenicity assessment of neuropathology-associated gene variants
Neupert, Lisa-Marie; May, Patrick UL; Kobow, Katja et al

in Epilepsia (2017, December 08), 58(Suppl.5), 174

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term ... [more ▼]

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term epilepsy associated tumors (LEAT). However, evaluation of identified neuropathology associated variants in genetic screens is complex since not all observed variants contribute to the etiology of neuropathologies not even in genuinely disease-associated genes. Here, we critically reevaluated the pathogenicity of 12 previously published disease-related genes and of 79 neuropathology-associated missense variants listed in the PubMed and ClinVar databases. We (1) assessed the evolutionary gene constraint using the pLI and the missense z score, (2) used the latest American College of Medical Genetics and Genomics (ACMG) guidelines, and (3) performed bioinformatic variant pathogenicity prediction analyses using PolyPhen-2, CADD and GERP. Constraint analysis classified only seven out of 12 genes to be likely disease-associated. Furthermore, 78 (89%) of 88 neuropathology-associated missense variants were classified as being of unknown significance (VUS) and only 10 (11%) as being likely pathogenic (LPII). Pathogenicity prediction yielded a discrimination between LPII variants and a discrimination for VUS compared with rare variant scores from individuals present in the Genome Aggregation Database (gnomAD). In summary, our results demonstrate that interpretation of variants associated with neuropathologies is complex while the application of current ACMG guidelines including bioinformatic pathogenicity prediction can help improving variant evaluation. Furthermore, we will augment this set of literature-identified variants at the conference by results from our variant screen using self-generated deep sequencing data in >150 candidate genes in >50 patients not yet analyzed. [less ▲]

Detailed reference viewed: 66 (2 UL)
Full Text
Peer Reviewed
See detailBlockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem
Lacasse, Richard-Marc; Lambert, Berthe; Khan, Nida UL

in Journal of Business and Economics (2017, December 05)

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors ... [more ▼]

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors mandate intermediaries (agents) to transfer their contributions to social causes according to the Shariah; in principle, Islamic financial institutions must create value for their stakeholders by offering Shariah-compliant products and services. An underlying assumption of agency theory is that agents attempt to maximize their personal welfare and compensation, but such behaviour may not always be in the best interests of other stakeholders, and an analysis of the agent’s agenda can help explain how agents can fall off the pedestal of altruism. Relationships between Islamic banks and three key stakeholders (contributors, beneficiaries and regulators) are also explored via a complexity-aware monitoring process. Contributors provide funds to an Islamic bank (agent), and in return, the agent should be accountable to the contributors, but the form and degree of accountability can vary depending on the organization’s mission. There are many unanswered questions regarding the monitoring process. One objective of the article is to consider whether agents act in the best interests of the stakeholders. Finally, the authors explore the following question: Can blockchain technology and smart contracts support and enhance the transparency feature, which is the core underlying principle of all transactions in the Islamic Finance industry? A qualitative research framework was adopted because of the constraints of the enigmatic, secretive Islamic Finance culture. [less ▲]

Detailed reference viewed: 570 (17 UL)
Full Text
Peer Reviewed
See detailContinuous Improvement of Complex Process Flows by Means of StreaM as the “Standardized Cross-Enterprise Value Stream Management Method”
Oberhausen, Christof UL; Minoufekr, Meysam UL; Plapper, Peter UL

in Proceedings of 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2017, December)

In numerous sectors and industries worldwide, there is a trend towards an intercompany and often international division of value creation and related work tasks. To overcome the challenges of complex ... [more ▼]

In numerous sectors and industries worldwide, there is a trend towards an intercompany and often international division of value creation and related work tasks. To overcome the challenges of complex cross-enterprise supply chain networks, innovative approaches to visualize, assess and enhance value streams are sought. The StreaM method, which is described in this paper, enables a comprehensive analysis, design and planning of cross-company product and information flows on different levels of value stream detail. At the same time, the entire methodology is based on a common understanding of key symbols, parameters and calculation procedures. In addition, the use of the developed StreaM method and the associated model in a case study proves its practical applicability in an industrial setting. In further validation projects, the transfer of the “Standardized cross-enterprise Value Stream Management Method” to other industry sectors is envisaged to continuously improve energy, trade or service processes. [less ▲]

Detailed reference viewed: 75 (11 UL)
Full Text
Peer Reviewed
See detailCache-Assisted Hybrid Satellite-Terrestrial Backhauling for 5G Cellular Networks
Kalantari, Ashkan; Fittipaldi, Marilena; Chatzinotas, Symeon UL et al

in Proceedings of IEEE Global Communications Conference (2017, December)

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a ... [more ▼]

Fast growth of Internet content and availability of electronic devices such as smart phones and laptops has created an explosive content demand. As one of the 5G technology enablers, caching is a promising technique to off-load the network backhaul and reduce the content delivery delay. Satellite communications provides immense area coverage and high data rate, hence, it can be used for large-scale content placement in the caches. In this work, we propose using hybrid mono/multi-beam satellite-terrestrial backhaul network for off-line edge caching of cellular base stations in order to reduce the traffic of terrestrial network. The off-line caching approach is comprised of content placement and content delivery phases. The content placement phase is performed based on local and global content popularities assuming that the content popularity follows Zipf-like distribution. In addition, we propose an approach to generate local content popularities based on a reference Zipf-like distribution to keep the correlation of content popularity. Simulation results show that the hybrid satellite-terrestrial architecture considerably reduces the content placement time while sustaining the cache hit ratio quite close to the upper-bound compared to the satellite-only method. [less ▲]

Detailed reference viewed: 115 (4 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Abstract book of the 20th International Conference on Intelligent Transportation Systems (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 221 (17 UL)
Full Text
Peer Reviewed
See detailComputationally Efficient Symbol-Level Precoding Communications Demonstrator
Merlano Duncan, Juan Carlos UL; Krivochiza, Jevgenij UL; Andrenacci, Stefano UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2017, October)

We present a precoded multi-user communication test-bed to demonstrate forward link interference mitigation techniques in a multi-beam satellite system scenario which will enable a full frequency reuse ... [more ▼]

We present a precoded multi-user communication test-bed to demonstrate forward link interference mitigation techniques in a multi-beam satellite system scenario which will enable a full frequency reuse scheme. The developed test-bed provides an end-to-end precoding demonstration, which includes a transmitter, a multi-beam satellite channel emulator and user receivers. Each of these parts can be reconfigured accordingly to the desired test scenario. Precoded communications allow full frequency reuse in multiple-input multiple-output (MIMO) channel environments, where several coordinated antennas simultaneously transmit to a number of independent receivers. The developed real-time transmission test-bed assist in demonstrating, designing and benchmarking of the new Symbol-Level Precoding (SLP) techniques, where the data information is used, along with the channel state information, in order to exploit the multi-user interference and transform it into useful power at the receiver side. The demonstrated SLP techniques are designed in order to be computationally efficient, and can be generalized to others multi-channel interference scenarios. [less ▲]

Detailed reference viewed: 112 (25 UL)
Full Text
Peer Reviewed
See detailHow Could an Intranet be Like a Friend to Me?: Why Standardized UX Scales Don't Always Fit
Lallemand, Carine UL; Koenig, Vincent UL

in Proceedings of the European Conference on Cognitive Ergonomics 2017 (2017, October)

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study ... [more ▼]

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study. Unfortunately, the survey was no joke, rather a well-constructed and validated standardized UX scale. This paper critically reflects on the use and relevance of standardized UX scales for the evaluation of UX in business contexts. We report on a real-world use case where the meCUE questionnaire has been used to assess employees' experience (N=263) with their organization's intranet. Strong users' reactions to the survey's items and statistical analyses both suggest that the scale is unsuitable for the evaluation of business-oriented systems. Drawing on the description of this inadequacy, we discuss the quality of academic UX tools, calling into question the relevance for practice of academic methods. [less ▲]

Detailed reference viewed: 107 (12 UL)
Full Text
Peer Reviewed
See detailDiscretisation and Model Selection for Interface Problems in Mechanics
Bordas, Stéphane UL

in International Journal of Computational Methods (2017, August 04)

Detailed reference viewed: 68 (7 UL)
Full Text
Peer Reviewed
See detailQuery-able Kafka: An agile data analytics pipeline for mobile wireless networks
Falk, Eric UL; Gurbani, Vijay K.; State, Radu UL

in Proceedings of the 43rd International Conference on Very Large Data Bases 2017 (2017, August), 10

Due to their promise of delivering real-time network insights, today's streaming analytics platforms are increasingly being used in the communications networks where the impact of the insights go beyond ... [more ▼]

Due to their promise of delivering real-time network insights, today's streaming analytics platforms are increasingly being used in the communications networks where the impact of the insights go beyond sentiment and trend analysis to include real-time detection of security attacks and prediction of network state (i.e., is the network transitioning towards an outage). Current streaming analytics platforms operate under the assumption that arriving traffic is to the order of kilobytes produced at very high frequencies. However, communications networks, especially the telecommunication networks, challenge this assumption because some of the arriving traffic in these networks is to the order of gigabytes, but produced at medium to low velocities. Furthermore, these large datasets may need to be ingested in their entirety to render network insights in real-time. Our interest is to subject today's streaming analytics platforms --- constructed from state-of-the art software components (Kafka, Spark, HDFS, ElasticSearch) --- to traffic densities observed in such communications networks. We find that filtering on such large datasets is best done in a common upstream point instead of being pushed to, and repeated, in downstream components. To demonstrate the advantages of such an approach, we modify Apache Kafka to perform limited \emph{native} data transformation and filtering, relieving the downstream Spark application from doing this. Our approach outperforms four prevalent analytics pipeline architectures with negligible overhead compared to standard Kafka. [less ▲]

Detailed reference viewed: 61 (7 UL)
Full Text
Peer Reviewed
See detailMulti-antenna based one-bit spatio-temporal wideband sensing for cognitive radio networks
Merlano Duncan, Juan Carlos UL; Krishna Sharma, Shree; Chatzinotas, Symeon UL et al

in Proceedings of IEEE International Conference on Communications (ICC) 2017 (2017, July 31)

Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling ... [more ▼]

Cognitive Radio (CR) communication has been considered as one of the promising technologies to enable dynamic spectrum sharing in the next generation of wireless networks. Among several possible enabling techniques, Spectrum Sensing (SS) is one of the key aspects for enabling opportunistic spectrum access in CR Networks (CRN). From practical perspectives, it is important to design low-complexity wideband CR receiver having low resolution Analog to Digital Converter (ADC) working at a reasonable sampling rate. In this context, this paper proposes a novel spatio-temporal wideband SS technique by employing multiple antennas and one-bit quantization at the CR node, which subsequently enables the use of a reasonable sampling rate. In our analysis, we show that for the same sensing performance requirements, the proposed wideband receiver can have lower power consumption than the conventional CR receiver equipped with a single-antenna and a high-resolution ADC. Furthermore, the proposed technique exploits the spatial dimension by estimating the direction of arrival of Primary User (PU) signals, which is not possible by the conventional SS methods and can be of a significant benefit in a CRN. Moreover, we evaluate the performance of the proposed technique and analyze the effects of one-bit quantization with the help of numerical results. [less ▲]

Detailed reference viewed: 59 (7 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial?
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in Proceedings of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) (2017, July)

Detailed reference viewed: 102 (18 UL)
Full Text
Peer Reviewed
See detailOn the Unknown Input Functional Observer Design via Polytopic Lyapunov Function: Application to a Quadrotor Aerial Robots Landing
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in IFAC-PapersOnLine (2017, July)

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems ... [more ▼]

In this paper, a constructive procedure to design functional unknown input observer for nonlinear continuous time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems) is proposed. Applying the Lyapunov theory, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A comparative study between single and Polytopic Lyapunov function is made in order to prove the relaxation effect of the Multiple functions. A solver based solution is then proposed. It will be shown through applicative example (a Quadrotor Aerial Robots Landing) that even if the proposed LMIs solver based solution may look conservative, an adequate choice of the solver makes it suitable for the application of the proposed approach. [less ▲]

Detailed reference viewed: 41 (7 UL)
Full Text
Peer Reviewed
See detailEffectiveness of the Two-Step Dynamic Demand Estimation model on large networks
Cantelmo, Guido UL; Viti, Francesco UL; Derrmann, Thierry UL

in Proceedings of 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS) (2017, June 28)

In this paper, the authors present a Two-Step approach that sequentially adjusts generation and distribution values of the (dynamic) OD matrix. While the proposed methodology already provided excellent ... [more ▼]

In this paper, the authors present a Two-Step approach that sequentially adjusts generation and distribution values of the (dynamic) OD matrix. While the proposed methodology already provided excellent results for updating demand flows on a motorway, the aim of this paper is to validate this conclusion on a real network: Luxembourg City. This network represents the typical middle-sized European city in terms of network dimension. Moreover, Luxembourg City has the typical structure of a metropolitan area, composed of a city centre, ring, and suburb areas. An innovative element of this paper is to use mobile network data to create a time-dependent profile of the generated demand inside and outside the ring. To support the claim that the model is ready for practical implementation, it is interfaced with PTV Visum, one of the most widely adopted software tools for traffic analysis. Results of these experiments provide a solid empirical ground in order to further develop this model and to understand if its assumptions hold for urban scenarios. [less ▲]

Detailed reference viewed: 88 (12 UL)
Full Text
Peer Reviewed
See detailRare variant analysis of the PPMI dataset to uncover the complex genetic architecture of Parkinson’s disease
Bobbili, Dheeraj Reddy UL; May, Patrick UL; Krüger, Rejko UL

in Movement Disorders : Official Journal of the Movement Disorder Society (2017, June 02), 322(Supplement S2), 405

Objective: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). Background: Parkinson’s ... [more ▼]

Objective: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). Background: Parkinson’s disease (PD) is a complex disease. Besides variants in high-risk genes such as LRRK2 and PARK2, multiple genes associated to sporadic PD were discovered via genome-wide association studies. Yet, there is a large number of genetic factors that need to be deciphered. Methods: To unravel the genetic factors that play a role in PD we used the whole exome sequencing data available as a part of Parkinson Progression Markers Initiative (PPMI). The dataset comprised of 435 PD cases and 162 ethnically matched controls, respectively. We performed burden tests at single variant, gene and geneset levels on common and rare exonic and splice-variants. We also looked for severity of rare highly deleterious variants (CADD phred score>30) using the CADD score as well as singleton (variants seen in only one individual across cases and controls) rare variants. Additionally, we performed the functional enrichment analysis with the genes harboring rare highly deleterious variants (case uniq genes) that are only present in cases. Results: We observed an increased mutational burden of singleton variants in PD cases compared to the controls in nonsynonymous+LOF variants (empirical P-value 0.005) but not in the synonymous variants (empirical P-value 0.09). We observed a higher significant burden (P-value 0.028) as well as higher significant severity (empirical P-value 0.027) of rare, highly deleterious nonsynonymous variants, but not in the synonymous variants of the candidate genes (P-value 0.686, empirical P-value 0.556 for burden and severity respectively). The network analysis of genes having deleterious variants only present in cases (Case uniq) showed a significant increase in connectivity compared to random networks (P-value 0.0002). Pathway analysis of those genes showed a significant enrichment of pathways and biological process implicated in the nervous system functioning and the etiology of PD. Conclusions: Our study supports the complex disease notion of PD by highlighting the convoluted architecture of PD where case uniq genes including LRRK2 are implicated in several biological processes and pathways related to PD. The main finding of this study is to discover the complex genetics of PD at an exome wide level. [less ▲]

Detailed reference viewed: 194 (29 UL)
Full Text
Peer Reviewed
See detailSpectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity
Vu, Thang Xuan UL; Trinh, Anh Vu; Chatzinotas, Symeon UL et al

in IEEE international Conference on Communications (2017, May)

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailOn the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE International Conference on Communications (2017, May)

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailUnknown Input Functional Observers Design for Polytopic Discrete Time Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohemed

in Proceedings of 6th IEEE International Conference on Systems and Control (ICSC) 2017 (2017, May)

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models ... [more ▼]

In this paper, a step by step algorithm is given to design functional unknown input observer for nonlinear discrete time systems under the Polytopic Takagi-Sugeno framework (also known as multiple models systems). Applying the Lyapunov theory and the L2 attenuation, Linear Matrix Inequalities (LMI)s conditions are deduced which are solved for feasibility to obtain observer design matrices. To reject the effect of unknown input, classical approach of decoupling the unknown input for the linear case is used. A solver based solution is proposed. The novelty of the proposed approach consists in solving simultaneously both structural constraints and LMIs, which ensure a mean for the efficient design of the gains of the observers. To illustrate the proposed theoretical results, an application example of model reference tracking control applied to an electro-mechanical model of a motor with a time varying parameter is discussed. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailAutomatically Locating Malicious Packages in Piggybacked Android Apps
Li, Li UL; Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL et al

in Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017) (2017, May)

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ... [more ▼]

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth set of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy of 83.6% in verifying the top five reported items. [less ▲]

Detailed reference viewed: 204 (22 UL)
Full Text
Peer Reviewed
See detailA contribution to Cyber-Security of Networked Control Systems: an Event-based Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in Proceedings of 2017 3rd International Conference on Event-Based Control, Communication and Signal Processing (EBCCSP 2017) (2017, May)

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection ... [more ▼]

In the present paper, a networked control system under both cyber and physical attacks is considered. An adapted formulation of the problem under physical attacks, data deception and false data injection attacks, is used for controller synthesis. Based on the classical fault tolerant detection (FTD) tools, a residual generator for attack/fault detection based on observers is proposed. An event-triggered and Bilinear Matrix Inequality (BMI) implementation is proposed in order to achieve novel and better security strategy. The purpose in using this implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. It is important to note that the main contribution of this paper is to establish the adequate event-triggered and BMI-based methodology so that the particular structure of the mixed attacked/faulty structure can be re-formulated within the classical FTD paradigm. Experimental results are given to illustrate the developed approach efficiency on a pilot three-tank system. The plant model is presented and the proposed control design is applied to the system. [less ▲]

Detailed reference viewed: 77 (4 UL)
Full Text
Peer Reviewed
See detailDevice-based assessment through a mobile application in the Luxembourg Parkinson Cohort
Stallinger, Christian; Satagopam, Venkata; Banda, Peter UL et al

in Basal Ganglia (2017, May), 8

Introduction: The project focuses on the integration device-based assessment (DBA) with a mobile application (mPower) into the longitudinal deeply-phenotyped HELP-PD (Health in the Elderly Luxembourgish ... [more ▼]

Introduction: The project focuses on the integration device-based assessment (DBA) with a mobile application (mPower) into the longitudinal deeply-phenotyped HELP-PD (Health in the Elderly Luxembourgish Population with a focus on Parkinson’s disease) cohort for patients with Parkinsonism in Luxembourg and the Greater Region to monitor frequency and degree of variation in symptoms of Parkinsonism, to identify potential sources and modulators of variation and to evaluate how symptoms are correlated with these modulators across patients. Methods: We integrate for the first time the mPower iOS app into a deeply phenotyped cohort. mPower is one of the first apps to use Apple’s Research Kit framework and combines a traditional survey-based approach with more granular and precise data gained from a person’s iPhone related to sensor- (e.g. step count, GPS-tracking) or task-based assessments (e.g. finger tapping, tremor detection, sustained phonation, simple gait analysis, memory test). Anonymized longitudinal data is sent to a repository, then retrieved, matched, and correlated with conventional HELP-PD data from a total of 47 screening instruments for motor and non-motor functions in Parkinsonism obtained from annual visits of study participants. 14 patients with clinically confirmed IPD are currently included in the pilot phase. Results/Discussion: We modified the mPower app and successfully integrated it into HELP-PD’s novel database infrastructure, allowing for a wide variety of analyses. The reporting system is able to handle multiple DBAs, with the implementation of an in-depth gait analysis system currently pending. Considerable attention was given to data protection. The system is currently fully functional with the pilot phase having started in June 2016. First correlations with traditional clinical data are planned for early 2017. [less ▲]

Detailed reference viewed: 52 (4 UL)
Full Text
Peer Reviewed
See detailDetecting the "Big Red Spot" of age-period excess mortality in 25 countries: Age-period-cohort residual analysis
Chauvel, Louis UL; Leist, Anja UL; Smith, Herbert

in PAA Server (2017, April 28)

In times of wide availability of yearly mortality information of age and period groups all over the world, we lack in tools that detect and graph fine-grained deviations from mortality trends. We provide ... [more ▼]

In times of wide availability of yearly mortality information of age and period groups all over the world, we lack in tools that detect and graph fine-grained deviations from mortality trends. We provide a new age-period-cohort based methodology, combining information from age-period (AP) and APC-Detrended (APCD) analyses to detect all-cause mortality increases. Plotting the resulting AP coefficients and APCD residuals in equilateral Lexis diagrams, mortality patterns can easily be distinguished as age, period, or cohort trends and fluctuations. Additionally, we detect abnormalities as interactions of age and period (‘big red spots’). We then investigate the ‘red spots’ of mortality of young-adult cohorts in the early 1990s in Spain, other southern European countries and the U.S. to delineate their simultaneously occurring public health crises. Additional analyses with WHO mortality data show that mortality increases are mostly due to increased HIV/AIDS mortality. We discuss possible applications of the new method. [less ▲]

Detailed reference viewed: 158 (10 UL)
Full Text
Peer Reviewed
See detailToward an in-depth understanding of binge-watching behavior: a qualitative approach with focus group
Flayelle, Maèva UL; Maurage, Pierre; Billieux, Joël

in Journal of behavioral addictions (2017, March), 6 (Suppl.1)

Detailed reference viewed: 133 (7 UL)
Full Text
Peer Reviewed
See detailCoping with turn-taking:Investigating breakdowns in human-robot interaction from a Conversation Analysis (CA) perspective
Arend, Béatrice UL; Sunnen, Patrick UL

in Proceedings: The 8th International Conference on Society and Information Technologies (2017, March)

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailOn characterizing the relationship between route choice behavior and optimal traffic control solution space
Rinaldi, Marco UL; Tampère, C. M. J.; Viti, Francesco UL

in Transportation Research Procedia (2017), 23

Explicitly including the dynamics of users' route choice behaviour in optimal traffic control applications has been of interest for researchers in the last five decades. This has been recognized as a very ... [more ▼]

Explicitly including the dynamics of users' route choice behaviour in optimal traffic control applications has been of interest for researchers in the last five decades. This has been recognized as a very challenging problem, due to the added layer of complexity and the considerable non-convexity of the resulting problem, even when dealing with simple static assignment and analytical link cost functions. In this work we establish a direct behavioural connection between the different shapes and structures emerging in the solution space of such problems and the underlying route choice behaviour. We specifically investigate how changes in the active equilibrium route set exert direct influence on the solution space's structure and behaviour. Based on this result, we then formulate and validate a constrained version of the original problem, yielding desirable properties in terms of solution space regularity. © 2017 The Authors. [less ▲]

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailEntwicklung einer Regelungsstrategie eines PVT-basierten Wärmepumpensystems auf der Basis von CO2 Direktverdampfung
Rullof, Johannes UL; Lambers, Klaus Jürgen; Blieske, Ulf et al

in Proceedings of Deutsche Kälte- und Klimatagung (DKV) (2017)

Bereits Ende der 1970iger Jahre wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen kombinierten Strahlungs-Umweltwärme-Absorber als Verdampfer entwickelt, welche sich im Vergleich zu ... [more ▼]

Bereits Ende der 1970iger Jahre wurden Wärmepumpen in Kombination mit glykolbasierten großflächigen kombinierten Strahlungs-Umweltwärme-Absorber als Verdampfer entwickelt, welche sich im Vergleich zu zwangskonvektions-basierten Luft-Wärmepumpen nicht nur die Umgebungsenergie, sondern auch die Solar-energie als Energiequelle zu Nutze machen. Aufgrund der nach der Ölkrise fallenden Ölpreise, der meist noch nicht wirtschaftlichen Anlagentechnik und der benötigten großen Absorberflächen konnten sich diese Anlagen nicht durchsetzen. Durch die starke Reduzierung des Heizwärmebedarfs eines Neubaus werden heutzutage deutlich kleinere Absorberflächen in Kombination mit einer Wärmepumpe benötigt, was die Systemkombination aus Wärmepumpe und Absorber aktuell wieder interessant werden lässt. Vor allem die Kombination aus thermi-schem Absorber, basierend auf freier Konvektion und Strahlung, und Photovoltaik (PV) in einem Modul (PVT-Modul) kann aufgrund der Reduzierung des Heizwärmebedarfs von Gebäuden und des verstärkten Betriebs von Wärmepumpen während der solarstrombedingten Niedrigstrompreiszeiten am Tage und dem damit verbunde-nen höheren Strahlungsanteil der Umweltwärme zukünftig eine Alternative zu zwangskonvektions-basierten Luft-Wärmepumpen sein. Der Beitrag beschäftigt sich mit einem CO2-Wärmepumpensystem, bestehend aus einem neuartigen PVT-Modul, welches einen mikrokanal-basierten Verdampfer einer CO2-Wärmepumpe mit einem PV-Modul vereint (PVT-direkt). Um die Machbarkeit des neuartigen PVT-direkt-Wärmepumpensystems zu demonstrieren, wird im Rah-men eines Forschungsprojekts ein funktionsfähiges PVT-direkt-Modul konstruiert und schließlich als Teil eines CO2-Wärmepumpensystems getestet und modelliert. Die Leistung eines PVT-basierten Wärmepumpensystems ist stark von klimatischen Randbedingungen abhängig. Im Rahmen dieser Arbeit wird die Entwicklung einer Regelungsstrategie eines PVT-basierten Wärmepumpensys-tems präsentiert, welche die Solarstrahlung, Umgebungstemperatur, Windgeschwindigkeit, Verdampfungstem-peratur und Verdichterleistung berücksichtigt. Zusätzlich werden die reale Antriebsleistung und der optimale Betriebspunkt des Verdichters einschließlich des optimalen Hochdruckes berücksichtigt. Die entwickelte Rege-lungsstrategie der PVT-basierten Wärmepumpe sieht verschiedene Betriebsmodi in Abhängigkeit von dem So-larstrahlungsangebot sowie der Umgebungstemperatur vor. Der Betrieb der Wärmepumpe erfolgt zwischen Deckung des Heizbedarfs in der Heizperiode und möglichst hoher Effizienz in Zeiten hoher Einstrahlungswerte und hoher Umgebungstemperaturen. [less ▲]

Detailed reference viewed: 73 (6 UL)
Full Text
Peer Reviewed
See detailFast and optimal countermeasure selection for attack defence trees
Muller, Steve UL; Harpes, Carlo; Muller, Cédric

in Lecture Notes in Computer Science (2017), 10224 LNCS

Risk treatment is an important part of risk management, and deals with the question which security controls shall be implemented in order to mitigate risk. Indeed, most notably when the mitigated risk is ... [more ▼]

Risk treatment is an important part of risk management, and deals with the question which security controls shall be implemented in order to mitigate risk. Indeed, most notably when the mitigated risk is low, the costs engendered by the implementation of a security control may exceed its benefits. The question becomes particularly interesting if there are several countermeasures to choose from. A promising candidate for modeling the effect of defensive mechanisms on a risk scenario are attack–defence trees. Such trees allow one to compute the risk of a scenario before and after the implementation of a security control, and thus to weigh its benefits against its costs. A naive approach for finding an optimal set of security controls is to try out all possible combinations. However, such a procedure quickly reaches its limits already for a small number of defences. This paper presents a novel branch-and-bound algorithm, which skips a large part of the combinations that cannot lead to an optimal solution. The performance is thereby increased by several orders of magnitude compared to the pure brute–force version. © 2017, Springer International Publishing AG. [less ▲]

Detailed reference viewed: 36 (9 UL)
Full Text
Peer Reviewed
See detailLES-VOF SIMULATIONS OF A PURE WATER JET DEVELOPING INSIDE AN AWJC NOZZLE: PRELIMINARY OBSERVATIONS AND GUIDELINES
Pozzetti, Gabriele UL; Peters, Bernhard UL

in Proceedings of 2017 WJTA-IMCA (2017)

In this work, a numerical approach to predict the behavior of a pure water jet developing inside a nozzle for Abrasive Water Jet Cutting (AWJC) is investigated. In a standard AWJC configuration, the water ... [more ▼]

In this work, a numerical approach to predict the behavior of a pure water jet developing inside a nozzle for Abrasive Water Jet Cutting (AWJC) is investigated. In a standard AWJC configuration, the water jet carries the major energy content of the entire system, and is responsible for accelerating abrasive particles that will perform the cutting action of hard materials. Therefore an accurate simulation of a pure water jet can bring significant insight on the overall AWJC process. Capturing the behavior of a multiphase high-speed flow in a complex geometry is however particularly challenging. In this work, we adopt a combined approach based on the Volume of Fluid (VOF) and Large Eddy Simulation (LES) techniques in order to respectively capture the water/air interface and to model turbulent structures of the flow. The aim of this contribution is to investigate how the two techniques apply to the specific problem, and to offer general guidelines for practitioners willing to adopt them. Costs considerations will be then presented with particular reference to the usage of the OpenFOAM® environment. The reported results are meant to provide guidance for AWJ applications and future developments of AWJ nozzles. [less ▲]

Detailed reference viewed: 65 (9 UL)
Peer Reviewed
See detailNanoporous gold decorated with silver nanoparticles as large area efficient SERS substrate
Ardini, Matteo; Huang, Jian-An; Sanchez-Sanchez, Carlos et al

in Proceedings of SPIE : The International Society for Optical Engineering (2017), 10346

Nanoporous gold is a very promising material platform for several plasmonic applications. Nanoporous gold can be formed by dealloying Au–Ag alloys, previously grown by means of Ag-Au co-sputtering. The ... [more ▼]

Nanoporous gold is a very promising material platform for several plasmonic applications. Nanoporous gold can be formed by dealloying Au–Ag alloys, previously grown by means of Ag-Au co-sputtering. The optical response is completely determined by the nanostructured film features, that only depend on the initial alloy composition. It has been extensively used as SERS substrate both as thin film and nanofabricated fancy designs. Here we explore the potential application of nanoporous gold as SERS substrate as it is coupled and decorated with Ag nanoparticles. Significant enhancement has been observed in comparison with bare nanoporous film. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailSimiDroid: Identifying and Explaining Similarities in Android Apps
Li, Li UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2017)

App updates and repackaging are recurrent in the Android ecosystem, filling markets with similar apps that must be identified and analysed to accelerate user adoption, improve development efforts, and ... [more ▼]

App updates and repackaging are recurrent in the Android ecosystem, filling markets with similar apps that must be identified and analysed to accelerate user adoption, improve development efforts, and prevent malware spreading. Despite the existence of several approaches to improve the scalability of detecting repackaged/cloned apps, researchers and practitioners are eventually faced with the need for a comprehensive pairwise comparison to understand and validate the similarities among apps. This paper describes the design of SimiDroid, a framework for multi-level comparison of Android apps. SimiDroid is built with the aim to support the understanding of similarities/changes among app versions and among repackaged apps. In particular, we demonstrate the need and usefulness of such a framework based on different case studies implementing different analysing scenarios for revealing various insights on how repackaged apps are built. We further show that the similarity comparison plugins implemented in SimiDroid yield more accurate results than the state-of-the-art. [less ▲]

Detailed reference viewed: 147 (7 UL)
Full Text
Peer Reviewed
See detailBoard Game Prototyping to Co-Design a Better Location-Based Digital Game
Jones, Catherine UL; Liapis; Lykourentzou, Ioanna et al

in Abstract book of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA '17 (2017)

In this case study we describe the iterative process of paper prototyping, using a board game, to co-design a location-based mobile application. The end goal of the application is to motivate reflection ... [more ▼]

In this case study we describe the iterative process of paper prototyping, using a board game, to co-design a location-based mobile application. The end goal of the application is to motivate reflection on historical topics about migration. The board game serves to capture the core concerns of this application by simulating movement through the city. Three play tests highlighted the users' interest and issues with the historical content, the way this content is represented, and the players' responses to the interactions and motivating mechanisms of the application. Results show that the board game helped capture important design preferences and problems, ensuring the improvement of our scenario. This feedback can help reduce development effort and implement a future technology prototype closer to the needs of our end users. [less ▲]

Detailed reference viewed: 54 (4 UL)