Using prepared mixtures of ToxCast chemicals to evaluate non-targeted analysis (NTA) method performance; ; et al in Analytical and bioanalytical chemistry (2019), 411(4), 835-851 Detailed reference viewed: 31 (2 UL) Using presence to evaluate an augmented reality location aware gameMcCall, Roderick ; ; et alin Personal & Ubiquitous Computing (2011), 15(1), 25-35 Location-aware augmented reality games provide players with a rich and potentially unlimited range of interaction possibilities. In this paper, a study is described which uses a number of measurement ... [more ▼] Location-aware augmented reality games provide players with a rich and potentially unlimited range of interaction possibilities. In this paper, a study is described which uses a number of measurement techniques including questionnaires, direct observation, semi-structured interviews and video analysis to measure player’s sense of presence. The paper points to the importance of the availability of actions within augmented reality games and how this shapes their sense of presence. The findings indicate that such an approach to measuring presence can provide valuable information on the structure of augmented reality location-aware games. [less ▲] Detailed reference viewed: 120 (0 UL) Using Prêt à Voter in Victorian State ElectionsRyan, Peter ; ; et alin Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (2012) The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Prêt à ... [more ▼] The Prêt à Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Prêt à Voter to the idiosyncrasies of elections in the Australian state of Victoria. The general background and desired user experience have previously been described; here we concentrate on the cryptographic protocols for dealing with some unusual aspects of Victorian voting. We explain the problems, present solutions, then analyse their security properties and explain how they tie in to other design decisions. We hope this will be an interesting case study on the application of end-to-end verifiable voting protocols to real elections. [less ▲] Detailed reference viewed: 84 (1 UL) Using prior knowledge from cellular pathways and molecular networks for diagnostic specimen classificationGlaab, Enrico ![]() in Briefings in Bioinformatics (2015) For many complex diseases, an earlier and more reliable diagnosis is considered a key prerequisite for developing more effective therapies to prevent or delay disease progression. Classical statistical ... [more ▼] For many complex diseases, an earlier and more reliable diagnosis is considered a key prerequisite for developing more effective therapies to prevent or delay disease progression. Classical statistical learning approaches for specimen classification using omics data, however, often cannot provide diagnostic models with sufficient accuracy and robustness for heterogeneous diseases like cancers or neurodegenerative disorders. In recent years, new approaches for building multivariate biomarker models on omics data have been proposed, which exploit prior biological knowledge from molecular networks and cellular pathways to address these limitations. This survey provides an overview of these recent developments and compares pathway- and network-based specimen classification approaches in terms of their utility for improving model robustness, accuracy and biological interpretability. Different routes to translate omics-based multifactorial biomarker models into clinical diagnostic tests are discussed, and a previous study is presented as example. [less ▲] Detailed reference viewed: 176 (16 UL) Using process data for assessment in Intelligent Tutoring Systems. A psychometrician’s, cognitive psychologist's, and computer scientist’s perspective.Greiff, Samuel ; ; in Sottilare, Robert A.; Graesser, Arthur C.; Hu, Xiangen (Eds.) et al Design recommendations for intelligent tutoring systems. Volume 5 (2017) Detailed reference viewed: 161 (2 UL) Using process data to explain group differences in complex problem solving; ; Greiff, Samuel et alin Journal of Educational Psychology (2020), 122 Detailed reference viewed: 36 (2 UL)![]() Using process data to explain group differences in complex problem solving; ; et al Scientific Conference (2018, April) Detailed reference viewed: 94 (2 UL) Using Regularization to Infer Cell Line Specificity in Logical Network Models of Signaling Pathways.; Lucarelli, Philippe ; Sauter, Thomas ![]() in Frontiers in physiology (2018), 9 Understanding the functional properties of cells of different origins is a long-standing challenge of personalized medicine. Especially in cancer, the high heterogeneity observed in patients slows down ... [more ▼] Understanding the functional properties of cells of different origins is a long-standing challenge of personalized medicine. Especially in cancer, the high heterogeneity observed in patients slows down the development of effective cures. The molecular differences between cell types or between healthy and diseased cellular states are usually determined by the wiring of regulatory networks. Understanding these molecular and cellular differences at the systems level would improve patient stratification and facilitate the design of rational intervention strategies. Models of cellular regulatory networks frequently make weak assumptions about the distribution of model parameters across cell types or patients. These assumptions are usually expressed in the form of regularization of the objective function of the optimization problem. We propose a new method of regularization for network models of signaling pathways based on the local density of the inferred parameter values within the parameter space. Our method reduces the complexity of models by creating groups of cell line-specific parameters which can then be optimized together. We demonstrate the use of our method by recovering the correct topology and inferring accurate values of the parameters of a small synthetic model. To show the value of our method in a realistic setting, we re-analyze a recently published phosphoproteomic dataset from a panel of 14 colon cancer cell lines. We conclude that our method efficiently reduces model complexity and helps recovering context-specific regulatory information. [less ▲] Detailed reference viewed: 172 (7 UL) Using rule-based machine learning for candidate disease gene prioritization and sample classification of cancer gene expression dataGlaab, Enrico ; ; et alin PLoS ONE (2012), 7(7), 39932-39932 Microarray data analysis has been shown to provide an effective tool for studying cancer and genetic diseases. Although classical machine learning techniques have successfully been applied to find ... [more ▼] Microarray data analysis has been shown to provide an effective tool for studying cancer and genetic diseases. Although classical machine learning techniques have successfully been applied to find informative genes and to predict class labels for new samples, common restrictions of microarray analysis such as small sample sizes, a large attribute space and high noise levels still limit its scientific and clinical applications. Increasing the interpretability of prediction models while retaining a high accuracy would help to exploit the information content in microarray data more effectively. For this purpose, we evaluate our rule-based evolutionary machine learning systems, BioHEL and GAssist, on three public microarray cancer datasets, obtaining simple rule-based models for sample classification. A comparison with other benchmark microarray sample classifiers based on three diverse feature selection algorithms suggests that these evolutionary learning techniques can compete with state-of-the-art methods like support vector machines. The obtained models reach accuracies above 90% in two-level external cross-validation, with the added value of facilitating interpretation by using only combinations of simple if-then-else rules. As a further benefit, a literature mining analysis reveals that prioritizations of informative genes extracted from BioHEL’s classification rule sets can outperform gene rankings obtained from a conventional ensemble feature selection in terms of the pointwise mutual information between relevant disease terms and the standardized names of top-ranked genes. [less ▲] Detailed reference viewed: 139 (5 UL) Using Selene to Verify your Vote in JCJIovino, Vincenzo ; Rial, Alfredo ; Roenne, Peter et alin Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07) Detailed reference viewed: 282 (31 UL) Using simple relays to improve physical-layer securityZheng, Gan ; ; et alin Communications in China (ICCC), 2012 1st IEEE International Conference on (2012) This paper studies different uses of two cooperating relays to improve the secrecy rate of a wiretap channel. These two relays are assumed to perform only simple functions: either amplify-and-forward (AF ... [more ▼] This paper studies different uses of two cooperating relays to improve the secrecy rate of a wiretap channel. These two relays are assumed to perform only simple functions: either amplify-and-forward (AF) or jamming. Complex functions such as decode-and-forward (DF) are not considered. We study three modes of cooperation: i) cooperative jamming (CJ), ii) AF-aided beamforming and iii) mixed AF-aided beamforming and CJ, all with individual relay power constraints. While i) is known in the literature, our efforts are spent on ii) and iii). In particular, for iii), we assume that the jamming signals in two communication stages are correlated, giving rise to improved performances. We also propose a heuristic approach for selecting the appropriate cooperating mode. Simulation results illustrate the performance gain of each scheme under different channel conditions and the effectiveness of the proposed mode selection method. [less ▲] Detailed reference viewed: 153 (0 UL) Using social media to disseminate primary care researchLygidakis, Charilaos ; Gomez Bravo, Raquel ![]() in Goodyear-Smith, Felicity; Mash, Robert (Eds.) How To Do Primary Care Research (2018) Social media are a powerful means of communication among health-care professionals, patients and the public. Their use has been increasing steadily globally, transforming the way that people exchange ... [more ▼] Social media are a powerful means of communication among health-care professionals, patients and the public. Their use has been increasing steadily globally, transforming the way that people exchange information, interact and collaborate. Physicians are using more and more social networks to connect with broader audiences, communicate with their patients and their colleagues and build a network of trustworthy peers. Researchers are also leveraging social media, capitalising on the velocity with which the messages can spread and the ability to disseminate their messages to the general public in addition to research communities, thus attracting more attention and increasing the influence and impact of their work. [less ▲] Detailed reference viewed: 99 (13 UL) Using Space-based Data for Humanitarian CausesBlount, Percy ; in ROOM: The Space Journal (2018) Detailed reference viewed: 43 (1 UL) Using storytelling to teach vocabulary in language lessons – does it work? (print)Kirsch, Claudine ![]() in Language Learning Journal (2012), 44(1), 33-51 It has long been claimed that stories are a powerful tool for language learning. Storytelling is often used as a discrete pedagogical approach in primary modern foreign language (MFL) lessons in England ... [more ▼] It has long been claimed that stories are a powerful tool for language learning. Storytelling is often used as a discrete pedagogical approach in primary modern foreign language (MFL) lessons in England. There has, however, been little investigation into how storytelling might impact on vocabulary learning in the primary classroom. This article focuses on how a London primary teacher used stories in German lessons in a Year 6 class (ages 10–11), and analyses the words and sentences the case-study children remembered over a brief period of time. Data were collected over two terms through observations, interviews and posttests. The findings illustrate the wide range of teaching strategies that allowed for explicit and incidental learning and encouraged meaningful language use. They also show that children recalled a considerable number of words and sentences. [less ▲] Detailed reference viewed: 471 (16 UL) Using the Blockchain Technology for Trust Improvement of Processes in Logistics and TransportationImeri, Adnan ![]() Doctoral thesis (2021) This thesis address the general problem of safe and secure transport of dangerous goods (TDG). The TDG is very complicated to manage because of risk for the environment and human life. Currently, it ... [more ▼] This thesis address the general problem of safe and secure transport of dangerous goods (TDG). The TDG is very complicated to manage because of risk for the environment and human life. Currently, it suffers from a lack of efficiency, trust, and t ransparency. In this thesis, we propose a novel method to specify the workflow aspects of TDG by considering all TDG process stages during its entire lifecycle. This method aims to facilitate the specifications of the TDG workflow management system that is entirely based on existing regulatory frameworks ensuring the compliance, trust, and transparency of all underlying processes. The proposed system design method is based on the so-called model-driven architecture (MDA) approach and enhancing it to consider blockchain properties. The first stage is the formal analysis of the process of TDG and its alignment with the regulatory frameworks. The proposed design method aims, at this stage, to allow the formal definition and verification of the design of the system with regard to the regulatory frameworks. The next stages of the method rely strongly on the model transformation that is a salient aspect of the proposed design method. Model transformation allows to automatically discover peer system components and authorized interactions. The last stage of the whole model transformations is the specification of digital twin profiles for all potential s t akeholders. All the interactions in the real world between stakeholders are transformed into interactions in the digital world, while the interactions with the environment are achieved through the use of IoT. The proposed approach enables interactions between components of the systems (digital twins, IoT devices, etc.) only if this is compliant with the regulatory framework. Thanks to blockchain technology, our design method allows improving trust and transparency in the process of TDG from the perspective of stakeholder collaborations. Smart contract technological capabilities are also a cornerstone of the proposed solution. This thesis also contributes to improving the semantic of smart contracts to capture supply chain management specifications as well as dangerous goods specificities in terms of t ransportation. Dynamic concepts related to the supply chain management of dangerous goods such as time-related and geographic constraints, digital certification, anomaly detection and multi-party smart contract, managing emergencies, and shared responsibility have been addressed at the level of the smart contract. In particular, this thesis proposes applying temporal logic for the formal specification and verification of smart contracts. This thesis proposes an integrated approach for blockchain and IoT to support the dynamic aspects in the supply chain of dangerous goods. Data collected from various IoT devices along the physical supply chain (goods, vehicles, country borders, etc.) are transmitted to the blockchain and further processed by the system following the workflow logic that was specified and automatically triggering related smart contracts and corresponding actions. The last contribution in this thesis is the implementation of a proof-of-concept system to validate the different aspects of the contribution, namely the design method, the trust and transparency assurance, and the automatic triggering of actions and information flows. [less ▲] Detailed reference viewed: 76 (5 UL) Using the Cross-Entropy method for control optimization: A case study of see-and-avoid on unmanned aerial vehiclesOlivares Mendez, Miguel Angel ; ; Kannan, Somasundar et alin Control and Automation (MED), 2014 22nd Mediterranean Conference of (2014, June) This paper presents an adaptation of the Cross-Entropy (CE) method to optimize fuzzy logic controllers. The CE is a recently developed optimization method based on a general Monte-Carlo approach to ... [more ▼] This paper presents an adaptation of the Cross-Entropy (CE) method to optimize fuzzy logic controllers. The CE is a recently developed optimization method based on a general Monte-Carlo approach to combinatorial and continuous multi-extremal optimization and importance sampling. This work shows the application of this optimization method to optimize the inputs gains, the location and size of the different membership functions' sets of each variable, as well as the weight of each rule from the rule's base of a fuzzy logic controller (FLC). The control system approach presented in this work was designed to command the orientation of an unmanned aerial vehicle (UAV) to modify its trajectory for avoiding collisions. An onboard looking forward camera was used to sense the environment of the UAV. The information extracted by the image processing algorithm is the only input of the fuzzy control approach to avoid the collision with a predefined object. Real tests with a quadrotor have been done to corroborate the improved behavior of the optimized controllers at different stages of the optimization process. [less ▲] Detailed reference viewed: 181 (12 UL) Using the Empowerment Scale with unemployed people in lifelong learning: Is the tool sound and useful?Meyers, Raymond ; Pignault, Anne ; Houssemand, Claude ![]() in Psychology Research (2016), 6(11), 648-659 Empowerment is a widely used construct in research on social work, mental health and community interventions, but has only been exploited indirectly with the unemployed. But job finding is an important ... [more ▼] Empowerment is a widely used construct in research on social work, mental health and community interventions, but has only been exploited indirectly with the unemployed. But job finding is an important dimension of empowerment and could be used to test the accuracy of the concept and of its measures. The Making Decisions Empowerment Scale was used with 97 unemployed people who had been jobless for 6 months. Even though the psychometric qualities of the 5 subscales and the total scale were mixed, convergent and discriminant validity with several adaptive and non-adaptive dimensions could be established for the global scale and for the Esteem, Power, Control and, to a lesser degree, the Activism subscales. The results were only marginally better for the 28 items global scale compared to the 9 items Esteem scale. Empowerment could be adequately modelled by using three dimensions: change coping, depression, and chance control of unemployment. Comparing 6 months later those who had found a job with the still unemployed, the 2 groups differed significantly on 2 of the 5 subscales (Activism and Control) though not on the total empowerment scale, nor on the other psychometric scales. The results throw some doubt on the accuracy of an aggregate measure that sums up divergent dimensions. Instead, it is proposed that more specific and individualized constructs be used, at least in unemployment research. [less ▲] Detailed reference viewed: 217 (9 UL) Using the GPU for fast symmetry-based dense stereo matching in high resolution images; ; Goncalves Almeida Antunes, Michel et alin IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2014) Detailed reference viewed: 99 (9 UL) Using the Intergeo Platform for Teaching and Research; ; Kreis, Yves et alin Bardini, Caroline; Fortin, Philippe; Oldknow, Adrian (Eds.) et al Proceedings of the 9th International Conference on Technology in Mathematics Teaching (2009) The main objective of the Intergeo Project (http://i2geo.net) is to make digital content for mathematics teaching in Europe more accessible, usable and exploitable. So far, Intergeo provides an Internet ... [more ▼] The main objective of the Intergeo Project (http://i2geo.net) is to make digital content for mathematics teaching in Europe more accessible, usable and exploitable. So far, Intergeo provides an Internet platform that offers content in a searchable and metadata-tagged form. In particular, teachers can search for suitable content based on the key concepts and themes of their curriculum. Once found, the content can be used either directly on the web or using the software of choice. Another very important aspect is that all material used in the classroom should adhere to certain pedagogical and mathematical quality standards. Intergeo facilitates the evaluation of material by means of a quality-testing framework that aids teachers and researchers in assessing the educational value of the digital content. The questionnaire used for this can be answered both quickly as well as in depth. In this workshop we will show how to use the platform and how to participate in the project as a user or by becoming an associate partner. Also, we will help software and tool authors to be able to read and write the new standard format for interactive geometry, i2g. [less ▲] Detailed reference viewed: 26 (5 UL)![]() Using the LLTM to determine an item-generating system for reading comprehensionSonnleitner, Philipp ![]() Poster (2008) Due to inconclusive findings concerning the components responsible for the difficulty of reading comprehension items, this paper attempts to set up an item-generating system using hypothesis-driven ... [more ▼] Due to inconclusive findings concerning the components responsible for the difficulty of reading comprehension items, this paper attempts to set up an item-generating system using hypothesis-driven modeling of item complexity applying Fischer’s (1973) linear logistic test model (LLTM) to a German reading comprehension test. This approach guarantees an evaluation of the postulated item-generating system; moreover construct validity of the administered test is investigated. Previous findings in this field are considered; additionally, some text features are introduced to this debate and their impact on item difficulty is discussed. Results once more show a strong influence of formal components (e.g. the number of presented response options in a multiple-choice-format), but also indicate how this effect can be minimized. [less ▲] Detailed reference viewed: 44 (0 UL) |
||