Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailToo good to be cautious: High implicit self-esteem predicts self-reported dangerous mobile phone use
Lannoy, Séverine; Chatard, Armand; Selimbegovic, Leila et al

in Computers in Human Behavior (2020), 103

Mobile phone use and misuse have become a pressing challenge in today's society. Dangerous mobile phone use, such as the use of a mobile phone while driving, is widely practiced, though banned in several ... [more ▼]

Mobile phone use and misuse have become a pressing challenge in today's society. Dangerous mobile phone use, such as the use of a mobile phone while driving, is widely practiced, though banned in several jurisdictions. Research aiming at unfolding the psychological predictors of dangerous mobile phone use have so far been scarce. Especially, researchers have never taken the role of self-esteem into account, which is unfortunate given prior research linking self-esteem to addictive mobile phone use. In the present study, we evaluated the associations between both explicit and implicit self-esteem and dangerous mobile phone use, with a particular focus on phoning while driving. To do so, we assessed implicit self-esteem among 95 participants (89 females) via the Implicit Association Test and explicit self-esteem via a self-reported measure. Problematic mobile phone use and demographic data were assessed with self-reported measures. Implicit self-esteem predicted dangerous mobile phone use, even after we controlled for demographic data and mobile phone dependence. Explicit self-esteem, however, was related to neither dependence nor dangerous use of the mobile phone, thereby supporting the importance of distinguishing between explicit and implicit self-esteem. Our results set the scene for new research avenues regarding mobile phone use while driving. [less ▲]

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailCVH Malach – Centrum vizuální historie Konference a workshop o novém přístupu a využití video databáze Fortunoff
Bronec, Jakub UL

in Marginalia Historica (2020)

On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional ... [more ▼]

On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional association provides local access to the extensive digital archives of the USC Shoah Foundation - the Institute for Visual history and Education (USC), the Refugee Voices archive of the Association of Jewish Refugees and the testimony collection of the Jewish Holocaust Centre in Melbourne. Nevertheless, the workshop focused on the newly incorporated Fortunoff Video Archive (FVA) that belongs to the category of long-awaited ingestion, and the path to get a licence was more than difficult. The archive represents a new source for all scholars including me, but in this short comment, I would like to critically point out to several minor drawbacks. [less ▲]

Detailed reference viewed: 36 (3 UL)
Full Text
Peer Reviewed
See detailExperimental and analytical analysis of the load-bearing capacity Pu of improved dry-stacked masonry
Chewe Ngapeya, Gelen Gael UL; Waldmann, Danièle UL

in Journal of Building Engineering (2020), 27

Dry-Stacked Masonry (DSM) as structural load-bearing element is still unexploited because of many factors including the early face-shell cracking, the impacts of the block imperfections on the wall load ... [more ▼]

Dry-Stacked Masonry (DSM) as structural load-bearing element is still unexploited because of many factors including the early face-shell cracking, the impacts of the block imperfections on the wall load-bearing capacity (Pu) and the lack of design code safely predicting Pu. Through experimental tests, this paper investigates a strategy for improving Pu of DSM by placing an additional horizontal contact layer on the top face of raw DSM blocks. The effect of four mixtures used to improve the raw DSM blocks has been investigated. Further, a mathematical model predicting Pu is proposed which takes into account the effects of the block imperfections. In the course of the investigation, 20 DSM wallets and 25 DSM prisms built with raw and improved DSM blocks were tested to failure under axial compression. In the former, the face-shell cracking load (Pcrack) and the load-bearing capacity (Pu) were recorded, while in the latter, the actual contact area was recorded in hundred full bed-joints using Prescale Fujifilm strips. The results showed that a contact layer of well-defined properties increased the actual contact area from 23% to 55% and improved Pu by 31,9%. The mathematical model for the raw DSM blocks predicts Pu with a mean accuracy of 93% and a standard deviation of 12% where the standards EN 1996-1-1 for mortared masonry exhibited a mean accuracy of 137% and a standard deviation of about 29%. Concerning the improved DSM blocks, the proposed model predicts Pu with a mean accuracy of 106% and a standard deviation of 10%, whereas the standards EN 1996-1-1 presents a mean accuracy of 124% and a standard deviation of 9%. [less ▲]

Detailed reference viewed: 77 (25 UL)
Peer Reviewed
See detailTranslanguaging practices in early childhood education in Luxembourg
Kirsch, Claudine UL

in Kirsch, Claudine; Duarte, Joana (Eds.) Multilingual approaches for teaching and learning. From acknowledging to capitalizing on multilingualism in European mainstream education. (2020)

Calls for multilingual pedagogies have reached early childhood education and some programmes have been implemented in Europe. However, their focus frequently remains on the majority language and home ... [more ▼]

Calls for multilingual pedagogies have reached early childhood education and some programmes have been implemented in Europe. However, their focus frequently remains on the majority language and home languages are given little space. For multilingual programmes to be inclusive and empowering, professionals need to break with monolingual practices based on monolingual ideologies. The resource-oriented pedagogy of translanguaging which challenges hegemonic practices, is one way in which professionals can give space to all languages, leverage children’s resources and contribute to their development. The present chapter presents the findings of a professional development on multilingual pedagogies in Luxembourg. Data stem from observations, video-recorded activities and interviews with four practitioners, two working in a formal education setting and two in a non-formal one. The findings show that the practitioners developed a positive stance towards translanguaging and multilingual education, learned to design a child-centred and holistic multilingual learning environment and used languages flexibly, deploying translation, code-switching and translanguaging. This dynamic language use facilitated communication, participation, language learning and well-being. There were differences between the practitioners’ flexible language use. The professionals in the school did not use pair talk, made less use of code-switching and used languages more strategically and responsibly than the caregivers in the crèche. [less ▲]

Detailed reference viewed: 50 (0 UL)
Peer Reviewed
See detailTheoretical approaches towards multilingual education
Kirsch, Claudine UL; Duarte

in Kirsch, Claudine; Duarte, Joana (Eds.) Multilingual approaches for teaching and learning. From acknowledging to capitalising on multilingualism in European mainstream education (2020)

Detailed reference viewed: 34 (1 UL)
Peer Reviewed
See detailEarly Language Education in Luxembourg
Kirsch, Claudine UL; Seele, Claudia

in Schwartz, Mila; Prošić-Santovac, Danijela (Eds.) International Handbook of early childhood education (2020)

Detailed reference viewed: 36 (0 UL)
Peer Reviewed
See detailFlexible language use in multilingual early childhood education in Luxembourg: Reflecting on its nature and functions
Kirsch, Claudine UL; Seele, Claudia

in Panagiotopoulou, Argyro; Rosen, Lisa; Strzykala, Jenna (Eds.) Inclusion, Education, and Translanguaging: How to Promote Social Justice in (Teacher) Education? (2020)

Detailed reference viewed: 36 (0 UL)
Peer Reviewed
See detailEffective professional development and sustainability of multilingual approaches
Kirsch, Claudine UL; Duarte, Joana; Palviainen, Åsa

in Kirsch, Claudine; Duarte, Joana (Eds.) Multilingual approaches for teaching and learning_From acknowledging to capitalising on multilingualism in European mainstream education (2020)

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailAdversarial Embedding: A robust and elusive Steganography and Watermarking technique
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

Scientific Conference (2020)

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image ... [more ▼]

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to extract it. The key properties of adversarial attacks (invisible perturbations, nontransferability, resilience to tampering) offer guarantees regarding the confidentiality and the integrity of the hidden messages. We empirically evaluate adversarial embedding using more than 100 models and 1,000 messages. Our results confirm that our embedding passes unnoticed by both humans and steganalysis methods, while at the same time impedes illicit retrieval of the message (less than 13% recovery rate when the interceptor has some knowledge about our model), and is resilient to soft and (to some extent) aggressive image tampering (up to 100% recovery rate under jpeg compression). We further develop our method by proposing a new type of adversarial attack which improves the embedding density (amount of hidden information) of our method to up to 10 bits per pixel. [less ▲]

Detailed reference viewed: 82 (6 UL)
Full Text
Peer Reviewed
See detailJoint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

Scientific Conference (2019, December 09)

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 74 (16 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailDistance-based vertex identification in graphs: The outer multiset dimension
Gil-Pons, Reynaldo; Ramirez Cruz, Yunior UL; Trujillo-Rasua, Rolando et al

in Applied Mathematics and Computation (2019), 363

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailThe DAta Protection REgulation COmpliance Model
Bartolini, Cesare UL; Lenzini, Gabriele UL; Robaldo, Livio UL

in IEEE Security and Privacy (2019), 17(6), 37-45

Understanding whether certain technical measures comply with the General Data Protection Regulation’s (GDPR’s) principles is complex legal work. This article describes a model of the GDPR that allows for ... [more ▼]

Understanding whether certain technical measures comply with the General Data Protection Regulation’s (GDPR’s) principles is complex legal work. This article describes a model of the GDPR that allows for semiautomatic processing of legal text and the leveraging of state-of-the-art legal informatics approaches, which are useful for legal reasoning, software design, information retrieval, or compliance checking. [less ▲]

Full Text
Peer Reviewed
See detailEthical Aspects in Teaching Physical Education
Scheuer, Claude UL; Thill, Jean-Luc

in Peters, Michael A. (Ed.) Encyclopedia of Teacher Education (2019)

Physical Education in schools can contribute positively to children and young people’s development in many ways. Besides the important contribution that Physical Education has on physical and motor ... [more ▼]

Physical Education in schools can contribute positively to children and young people’s development in many ways. Besides the important contribution that Physical Education has on physical and motor development, it can also be an important vehicle for cognitive, personal, social, and emotional development too. Such development is enhanced through informed thinking, caring, and enlightened Physical Education teaching by teachers who are operating within an ethical framework of good practice. Children and young people, as well as their families, should have every confidence that when in school Physical Education teachers treat learners with respect and understanding. Thus, it is of primordial importance that Physical Education teachers promote good practice and procedures by complying to values-related principles while being ever vigilant and aware of their responsibilities toward the children and young people in their care. In this entry, we explore ethical practice in Physical Education from the perspective of ethical teaching and the role the subject can play in contribution to the development of ethical awareness in children and young people. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Traffic Splitting to Counter Website Fingerprinting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya UL; Pennekamp, Jan et al

Poster (2019, November 11)

Detailed reference viewed: 32 (4 UL)
Peer Reviewed
See detailSimilarities and differences of value-added scores from models with different covariates: A cluster analysis
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 40 (3 UL)