Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailRole of interfacial transition zone in phase field modeling of fracture in layered heterogeneous structures
Nguyen, Thanh Tung UL; Waldmann, Danièle UL; Bui, T. Q.

in Journal of Computational Physics (in press)

Mechanical behavior of layered materials and structures greatly depends on the mechanical behavior of interfaces. In the past decades, the failure in such layered media has been studied by many ... [more ▼]

Mechanical behavior of layered materials and structures greatly depends on the mechanical behavior of interfaces. In the past decades, the failure in such layered media has been studied by many researchers due to their critical role in the mechanics and physics of solids. This study aims at investigating crack-interface interaction in two-dimensional (2-D) and three-dimensional (3-D) layered media by a phase field model. Our objectives are fourfold: (a) to better understand fracture behavior in layered heterogeneous systems under quasi-static load; (b) to introduce a new methodology for better describing interfaces by a regularized interfacial transition zone in the context of varia-tional phase field approach, exploring its important role; (c) to show the accuracy , performance and applicability of the present model in modeling material failure at the interfaces in both 2-D and 3-D bodies; and (d) to quantitatively validate computed crack path with respect to experimental data. Phase field models with both perfectly and cohesive bonded interfaces are thus derived. A regularized interfacial transition zone is introduced to capture characteristics of material mismatch at the interfaces. Numerical examples for 2-D and 3-D layered systems with experimental validation provide fundamentals of fracture behavior in layered structures. The obtained results shed light on the behavior of crack paths, which are drastically affected by the elastic modulus mismatch between two layers and interface types, and reveal the important role of the proposed interfacial transition zone in phase field modeling of crack interface interactions. [less ▲]

Detailed reference viewed: 83 (12 UL)
See detailLes conditions d'accueil des demandeurs de protection internationale
Silga, Janine UL

in Chaouche, Fatima; Gerkrath, Jörg; Silga, Janine (Eds.) et al Droit d'Asile au Grand-Duché de Luxembourg - Guide pratique (in press)

Detailed reference viewed: 15 (3 UL)
See detailLa détermination de l'âge des jeunes demandeurs de protection internationale
Silga, Janine UL; Anibaldi, Johnny

in Chaouche, Fatima; Gerkrath, Jörg; Silga, Janine (Eds.) et al Droit d'Asile au Grand-Duché de Luxembourg - Guide pratique (in press)

Detailed reference viewed: 11 (0 UL)
Full Text
See detailAktuelle Entwicklungen im Steuerrecht in der Informationstechnologie 2017/2018 - Teil 2
Schmittmann, Jens; Sinnig, Julia UL

in Kommunikation und Recht (in press)

Teil 2 des Beitrags knüpft an Teil 1 in K&R 2019, 88 ff. an und fasst die wesentlichen Entwicklungen in Legislative und Judikative im deutschen Steuerrecht zusammen, soweit sich Bezüge zum ... [more ▼]

Teil 2 des Beitrags knüpft an Teil 1 in K&R 2019, 88 ff. an und fasst die wesentlichen Entwicklungen in Legislative und Judikative im deutschen Steuerrecht zusammen, soweit sich Bezüge zum Informationstechnologierecht ergeben. Er knüpft an die Beiträge des Verfassers Prof. Dr. Jens M. Schmittmann in den Vorjahren sowie die Vorträge der Verfasser in Bochum anlässlich der DSRI Herbstakademie 2018 an. [less ▲]

Detailed reference viewed: 19 (0 UL)
Peer Reviewed
See detailBilan
Lejot, Eve UL

in Huemer, Birgit; Lejot, Eve; Deroey, Katrien (Eds.) Academic writing across languages: multilingual and contrastive approaches in higher education (in press)

Detailed reference viewed: 11 (2 UL)
Full Text
See detailThe Metamorphosis of the European Economic Constitution
Hofmann, Herwig UL; Pantazatou, Aikaterini UL; Zaccaroni, Giovanni

Book published by Elgar Publishing - 1st (in press)

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailTeaching Diverse Learners in Europe: Inspiring Practices and Lessons Learned from Germany, Iceland, Lithuania, Luxembourg, Spain and Sweden
Powell, Justin J W UL; Merz-Atalik, Kerstin; Ališauskienė, Stefanija et al

in Schuelka, Matthew; Johnstone, Christopher; Thomas, Gary (Eds.) et al SAGE Handbook of Inclusion and Diversity in Education (in press)

Teaching in inclusive settings may be considered a new, challenging task; however, successfully supporting diverse pupils in their learning process has always been at the heart of outstanding pedagogy ... [more ▼]

Teaching in inclusive settings may be considered a new, challenging task; however, successfully supporting diverse pupils in their learning process has always been at the heart of outstanding pedagogy. Vast differences both in the extent and the quality of inclusive schooling exist between and within European countries. Promoting comparison and cooperation among countries with long-institutionalized inclusive schooling and countries with less inclusive structures, cultures, and practices proves crucial in education research and reform. Building upon a multi-year collaboration, we synthesize lessons learned about inclusive education reforms and “inspiring practices“ in inclusive education in partner schools in Germany, Iceland, Lithuania, Luxembourg, Spain, and Sweden. Contemporary practices take the diversity of groups of learners into account, building upon diversity as a resource; this served as the framework for our collaboration. The TdiverS consortium—as an EU-funded Comenius Network Project “Teaching Diverse Learners in (School-)Subjects“ (TdiverS)—was built on the following principles and goals: (1) diversity in theory and practice, resulting from collaborations of practitioners and scientists exchanging knowledge about teaching in inclusive settings; (2) strengthening awareness of the diversity of frameworks, conditions, and determining factors of teaching inclusively in varying cultural contexts; and (3) inclusive education research uniting multilevel, multicultural, and multidisciplinary perspectives. We highlight the values of inclusive education, map its contemporary European geography, summarize contemporary country-level education reforms and the local development of inclusive practices in six countries, and discuss lessons learned across Northern, Eastern, Southern, and Western Europe. [less ▲]

Detailed reference viewed: 113 (12 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (in press)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding Electoral Violence through Complex Textual Data: OSCE Monitoring Missions in Different Contexts
Mochtak, Michal UL

in Studies in Conflict and Terrorism (in press)

The paper analyses more than 20 years of evidence on electoral violence as reported by OSCE monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating ... [more ▼]

The paper analyses more than 20 years of evidence on electoral violence as reported by OSCE monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating states in order to better understand how the phenomenon is understood and framed by leading international monitoring organizations in the region. The analysis utilizes a unique approach based on automated content analysis employing counting algorithms and latent semantic indexing. The results of the analysis show how electoral violence differs throughout the region while highlighting the qualitative variations in regional patterns of the reported incidents of election-related violence. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailProblematic video game use as an emotional coping strategy: Evidence from a sample of MMORPG gamers.
Blasi, Maria Di; Giardina, Alessandro; Giordano, Cecilia et al

in Journal of behavioral addictions (in press)

BACKGROUND: A positive relationship between problematic gaming and escapism motivation to play video games has been well established, suggesting that problematic gaming may result from attempts to deal ... [more ▼]

BACKGROUND: A positive relationship between problematic gaming and escapism motivation to play video games has been well established, suggesting that problematic gaming may result from attempts to deal with negative emotions. However, to date, no study has examined how emotion dysregulation affects both escapism motives and problematic gaming patterns. METHODS: Difficulties in emotion regulation, escapism, and problematic involvement with video games were assessed in a sample of 390 World of Warcraft players. A structural equation modeling framework was used to test the hypothesis that escapism mediates the relationship between emotion dysregulation and problematic gaming. RESULTS: Statistical analyses showed that difficulties in emotion regulation predicted both escapism motives and problematic gaming, and that escapism partially mediated this relationship. CONCLUSION: Our findings support the view that problematic players are likely to escape in online games as a maladaptive coping strategy for dealing with adverse emotional experiences. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on the Potential Usefulness of Domain Models for Completeness Checking of Requirements
Arora, Chetan UL; Sabetzadeh, Mehrdad UL; Briand, Lionel UL

in Empirical Software Engineering (in press)

[Context] Domain modeling is a common strategy for mitigating incompleteness in requirements. While the benefits of domain models for checking the completeness of requirements are anecdotally known, these ... [more ▼]

[Context] Domain modeling is a common strategy for mitigating incompleteness in requirements. While the benefits of domain models for checking the completeness of requirements are anecdotally known, these benefits have never been evaluated systematically. [Objective] We empirically examine the potential usefulness of domain models for detecting incompleteness in natural-language requirements. We focus on requirements written as “shall”- style statements and domain models captured using UML class diagrams. [Methods] Through a randomized simulation process, we analyze the sensitivity of domain models to omissions in requirements. Sensitivity is a measure of whether a domain model contains information that can lead to the discovery of requirements omissions. Our empirical research method is case study research in an industrial setting. [Results and Conclusions] We have experts construct domain models in three distinct industry domains. We then report on how sensitive the resulting models are to simulated omissions in requirements. We observe that domain models exhibit near-linear sensitivity to both unspecified (i.e., missing) and under-specified requirements (i.e., requirements whose details are incomplete). The level of sensitivity is more than four times higher for unspecified requirements than under-specified ones. These results provide empirical evidence that domain models provide useful cues for checking the completeness of natural-language requirements. Further studies remain necessary to ascertain whether analysts are able to effectively exploit these cues for incompleteness detection. [less ▲]

Detailed reference viewed: 40 (5 UL)
Full Text
Peer Reviewed
See detailA dual‐process exploration of binge drinking: Evidence through behavioral and electrophysiological findings
Lannoy, Séverine; Dormal, Valérie; Billieux, Joël UL et al

in Addiction Biology (in press)

The dual‐process model, describing addictive disorders as resulting from an imbalance between increased automatic approach behaviors towards the substance and reduced abilities to control these behaviors ... [more ▼]

The dual‐process model, describing addictive disorders as resulting from an imbalance between increased automatic approach behaviors towards the substance and reduced abilities to control these behaviors, constitutes a sound theoretical framework to understand alcohol‐use disorders. The present study aimed at exploring this imbalance at behavioral and cerebral levels in binge drinking, a pattern of excessive alcohol consumption frequently observed in youth, by assessing both reflective control abilities and automatic processing of alcohol‐related stimuli. For this purpose, 25 binge drinkers and 25 comparison participants performed a Go/No‐Go task during electrophysiological recording. Inhibition abilities were investigated during explicit (ie, distinguishing alcoholic versus nonalcoholic drinks) and implicit (ie, distinguishing sparkling versus nonsparkling drinks, independently of their alcohol content) processing of beverage cues. Binge drinkers presented poorer inhibition for the explicit processing of beverage cues, as well as reduced N200 amplitude for the specific processing of alcohol‐related stimuli. As a whole, these findings indicated inhibition impairments in binge drinkers, particularly for alcohol cues processing and at the attentional stage of the cognitive stream. In line with the dual‐process model, these results support that binge drinking is already characterized by an underactivation of the reflective system combined with an overactivation of the automatic system. Results also underlined the influence of explicit processing compared with implicit ones. At the clinical level, our findings reinforce the need to develop intervention methods focusing on the inhibition of approach behaviors towards alcohol‐related stimuli. [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailDissociation in Problematic Gaming: a Systematic Review
Guglielmucci, Fanny; Monti, Massimiliano; Franzoi, Isabella G. et al

in Current Addiction Reports (in press)

Purpose of Review The present article consists of a systematic review of recent (2007–2018) empirical studies addressing the relationship between problematic gaming and dissociation. Nineteen peer ... [more ▼]

Purpose of Review The present article consists of a systematic review of recent (2007–2018) empirical studies addressing the relationship between problematic gaming and dissociation. Nineteen peer-reviewed empirical studies that examined the relationship between problematic gaming and dissociation were identified. Recent Findings The findings suggest that excessive video game use is linked to a variety of dissociative phenomena (e.g. depersonalisation experiences, escapism, psychotic-like experiences, game transfer phenomena). Summary Dissociative experiences are associated with problematic gaming. The findings support the hypothesis that problematic video game use can represent a maladaptive coping strategy onwhich people can rely to escape from disturbing mental states, adverse emotions or real-life problems. In these circumstances, dissociative symptoms might represent the side effects of an alteration in consciousness that is generated by excessive video game use. However, further research (especially experimental and longitudinal) is required in order to establish a potential causal link between problematic gaming patterns and dissociation. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailElectoral Violence Under Different Contexts. Evidence from the Western Balkans
Mochtak, Michal UL

in Nations and Nationalism (in press)

The paper addresses the question of what settings are empirically relevant for the occurrence of electoral violence in the region of Western Balkans and what theoretical paths may cover their logic ... [more ▼]

The paper addresses the question of what settings are empirically relevant for the occurrence of electoral violence in the region of Western Balkans and what theoretical paths may cover their logic. Electoral violence has been part of the electoral arenas in the region for decades and although it has evolved and in some cases disappeared, a number of countries still experience it. The paper analyses original data on electoral violence collected from the OSCE monitoring reports covering 56 parliamentary elections organized between 1990 and 2015. Applying fuzzy‐set Qualitative Comparative Analysis (fsQCA), the paper identifies four sub-models under which electoral violence is observed. The conjunctural logic that defines each and every of the discussed paths within the sub-models shows that the scenarios of electoral violence in the Western Balkans are always complex and potentially relevant conditions are never sufficient for the outcome on their own. [less ▲]

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailA Polynomial Time Subsumption Algorithm for Nominal Safe $ELO_{\bot}$ under Rational Closure
Casini, Giovanni UL; Straccia, Umberto; Meyer, Thomas

in Information Sciences (in press)

Description Logics (DLs) under Rational Closure (RC) is a well-known framework for non-monotonic reasoning in DLs. In this paper, we address the concept subsumption decision problem under RC for nominal ... [more ▼]

Description Logics (DLs) under Rational Closure (RC) is a well-known framework for non-monotonic reasoning in DLs. In this paper, we address the concept subsumption decision problem under RC for nominal safe $ELO_{\bot}$, a notable and practically important DL representative of the OWL 2 profile OWL 2 EL. Our contribution here is to define a polynomial time subsumption procedure for nominal safe $ELO_{\bot}$ under RC that relies entirely on a series of classical, monotonic $EL_{\bot}$ subsumption tests. Therefore, any existing classical monotonic $EL_{\bot}$ reasoner can be used as a black box to implement our method. We then also adapt the method to one of the known extensions of RC for DLs, namely Defeasible Inheritance-based DLs without losing the computational tractability. [less ▲]

Detailed reference viewed: 33 (7 UL)
See detailEU Executive Discretion and the Limits of Law
Mendes, Joana UL

Book published by Oxford University Press (in press)

Detailed reference viewed: 51 (2 UL)
Full Text
Peer Reviewed
See detailLa vie formulaire - entre procédure judiciaire et dérive administrative du droit d’hier à aujourd’hui
Menetrey, Séverine UL

in Revue internationale de droit processuel (in press)

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailAttack-tolerant Control and Observer-based Trajectory Tracking for Cyber-Physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in European Journal of Control (in press)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber-Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bi-linear Matrix Inequality () approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose of using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. A detection/isolation scheme based on residual observers bank is also proposed. [less ▲]

Detailed reference viewed: 60 (2 UL)
Full Text
Peer Reviewed
See detailShifting Epistemologies for Discipline and Rigour in Educational Research: Challenges and Opportunities from Digital Humanities
Priem, Karin UL; Fendler, Lynn

in European Educational Research Journal (in press)

This paper historicizes “rigour”, discipline” and “systematic” as inventions of a certain rational spirit of Enlightenment that was radicalized during the 19th century. These terms acquired temporary ... [more ▼]

This paper historicizes “rigour”, discipline” and “systematic” as inventions of a certain rational spirit of Enlightenment that was radicalized during the 19th century. These terms acquired temporary value in a transition during the 19th century when a culture of research was established within a modern episteme. Beginning in the 20th century, this development was perceived as problematic, triggering criticism from philosophy and the arts, and even within the sciences. “Discipline”, “rigour” and “systematic” have changed meanings over time, and recent contributions from Digital Humanities are promising for a renewed critical debate about rigour in research. Both digital humanities and quantitative research deal with big data sets aimed at providing a large-scale analysis. However, unlike most quantitative research, digital humanities explore uncertainties as their main focus. Attention to the human-machine collaboration has led to more expansive thinking in scientific research. Digital humanities go further by advancing a metaperspective that deals with the material hermeneutics of data accumulation itself. [less ▲]

Detailed reference viewed: 75 (28 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 43 (0 UL)