A CutFEM Method for a spatial resolved energy metabolism model in complex cellular geometriesFarina, Sofia ![]() Scientific Conference (2021, January) Computational techniques have been widely used to tackle problems in the biological sciences. A com- promise between high quality simulations and simple but accurate models can help to understand un ... [more ▼] Computational techniques have been widely used to tackle problems in the biological sciences. A com- promise between high quality simulations and simple but accurate models can help to understand un- known aspects of this field. In this work, we will show how the Cut Finite Element Method (CutFEM) [1] can be a powerful tool to solve a reaction diffusion PDE system that models the energy metabolism of a cell. The main difficulty to approach this problem is dealing with the morphology of the cell that can have sharp edges and evolves over time. While classical FEM requires the mesh conform to the domain boundary, CutFEM allows a non-conforming discretisation of the domain, and thus is especially suited for modeling complex and evolving cellular geometries. First, we introduce our simplified model for metabolic pathways taking place in a region small enough to consider the material property as homogeneous. The results obtained with FEM (FENICS Project [2][3]) and CutFEM suggest that the two methods are equivalent. This allows us to use CutFEM to increase the complexity of the domain, from a spherical shaped cell to an irregular astrocyte. We conclude that CutFEM is a robust method for tackling biological problems with complex geometries, opening the possibility to extend the complexity of our mathematical model including more features and to consider real cellular shapes that evolve in time in future work. [less ▲] Detailed reference viewed: 175 (11 UL) Cutting in real time in corotational elasticity and perspectives on simulating cuts; ; Bordas, Stéphane ![]() Book published by Springer (2013) We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of ... [more ▼] We focus here on the simulation of surgical acts of types similar to cutting and needle insertion in soft tissue, in real time (500 Hz), where the scale of the surgical instrument is several orders of magnitude smaller than that of the organ. [less ▲] Detailed reference viewed: 231 (0 UL) Cu–Zn disorder and band gap fluctuations in Cu2ZnSn(S,Se)4: Theoretical and experimental investigations; Larsen, Jes K. ; et alin Physica Status Solidi B. Basic Research (2016), 253(2), 247-254 Detailed reference viewed: 290 (1 UL) CVaR-based Robust Beamforming Framework for Massive MIMO LEO Satellite CommunicationsAl-Senwi, Madyan Abdullah Othman ; Lagunas, Eva ; et alin IEEE Global Communications Conference (IEEE Globecom), Kuala Lumpur, Malaysia, Dec. 2023 (2023) Detailed reference viewed: 91 (4 UL) Le Cvce.eu, une infrastructure numériqueGabellini, Marco ![]() Presentation (2017, December 18) Présentation des publications numériques sur le processus de la construction européenne analysé dans une perspective transnationale et multidimensionnelle sur le site cvce.eu. Les collections de ... [more ▼] Présentation des publications numériques sur le processus de la construction européenne analysé dans une perspective transnationale et multidimensionnelle sur le site cvce.eu. Les collections de publications thématiques et le programme d’histoire orale, comprenant près de 100 interviews de personnalités européennes, constituent une approche innovante de la construction européenne. [less ▲] Detailed reference viewed: 112 (5 UL) CVH Malach – Centrum vizuální historie Konference a workshop o novém přístupu a využití video databáze FortunoffBronec, Jakub ![]() in Marginalia Historica : Časopis pro Dějiny Vzdělanosti a Kultury (2020), 10(1/2019), 164-167 On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional ... [more ▼] On May 18, I took part in a very interesting workshop organized by the Malach Centre for Visual History at the Faculty of Mathematics and Physics of the Charles University in Prague. This exceptional association provides local access to the extensive digital archives of the USC Shoah Foundation - the Institute for Visual history and Education (USC), the Refugee Voices archive of the Association of Jewish Refugees and the testimony collection of the Jewish Holocaust Centre in Melbourne. Nevertheless, the workshop focused on the newly incorporated Fortunoff Video Archive (FVA) that belongs to the category of long-awaited ingestion, and the path to get a licence was more than difficult. The archive represents a new source for all scholars including me, but in this short comment, I would like to critically point out to several minor drawbacks. [less ▲] Detailed reference viewed: 160 (10 UL)![]() Cyber bullying among school aged children in LuxembourgSteffgen, Georges ; Pfetsch, Jan ; König, Andreas et alScientific Conference (2009, August) Detailed reference viewed: 189 (9 UL) Cyber bullying in Luxemburg: Aus nationaler SichtSteffgen, Georges ![]() Presentation (2007, November) Detailed reference viewed: 121 (3 UL)![]() Cyber bullying: Current research findingsSteffgen, Georges ![]() Scientific Conference (2009, April) Detailed reference viewed: 97 (0 UL)![]() Cyber bullying: The role of empathySteffgen, Georges ![]() Scientific Conference (2009, April) Detailed reference viewed: 113 (0 UL) Cyber bullying: The role of traditional bullying and empathySteffgen, Georges ; König, Andreas ![]() in Sapeo, B.; Haddon, L.; Mante-Meijer, E. (Eds.) et al The good, the bad and the challenging. Conference Proceedings (Vol. II) (2009) Detailed reference viewed: 552 (2 UL) The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements. An introductionChiara, Pier Giorgio ![]() in International Cybersecurity Law Review (2022) The EU Commission presented on 15 September 2022 the proposal for a ‘Regulation on horizontal cybersecurity requirements for products with digital elements amending Regulation (EU) 2019/1020’ (Cyber ... [more ▼] The EU Commission presented on 15 September 2022 the proposal for a ‘Regulation on horizontal cybersecurity requirements for products with digital elements amending Regulation (EU) 2019/1020’ (Cyber Resilience Act, CRA). This long-awaited piece of legislation would complement EU cybersecurity acquis by laying down horizontal cybersecurity requirements for all products with digital elements. This article sheds light on the ‘horizontal’ character of the CRA proposal by highlighting its main pillars. In particular, the contribution takes into account the new set of obligations placed on economic operators, the conformity assessment procedures as well as the market surveillance framework and the interplay with other legislative initiatives, both in the policy area and outside EU cybersecurity law. Against the backdrop of the sectoral regulatory approach adopted thus far by the Commission vis-à-vis cybersecurity requirements for products, horizontal intervention is needed to ensure legal certainty, avoiding duplicative obligations and further market fragmentation. [less ▲] Detailed reference viewed: 323 (5 UL) Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection; Bezzaoucha, Souad ; Voos, Holger et alin Proceedings of the 2018 American Control Conference (2018, June 27) In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼] In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲] Detailed reference viewed: 276 (9 UL) Cyber-attack detection based on controlled invariant sets; Voos, Holger ; in European Control Conference (ECC), Strasbourg, France, 24-27 June 2014 (2014, June) This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the ... [more ▼] This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology. [less ▲] Detailed reference viewed: 203 (2 UL) Cyberbullying as an act of revenge?König, Andreas ; ; Steffgen, Georges ![]() in Australian Journal of Guidance & Counselling (2010), 20(2), 210-224 Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and ... [more ▼] Despite significant overlaps between victim status in traditional forms of bullying and cyberbullying, and qualitative results about self-reported reasons for cyberbullying, the role of revenge and retaliation as a motive to engage in acts of cyberbullying has not yet been examined systematically. As a first step, this study investigates whether and to what extent traditional victims, when they become cyberbullies, actually choose their former (traditional) perpetrators as targets of their own cyberbullying behavior. Furthermore, the impact of individual differences in relevant traits, such as vengefulness and justice sensitivity, on the choice of cybervictims is examined. Data from 473 students were collected via an online survey. Of these, 149 were identified as traditional victims/cyberbullies. Results show that traditionally bullied students indeed tend to choose their former perpetrators as cybervictims, and that individual differences play a role in the choice of their victims. Implications for further research, as well as for interventions and prevention programmes, are discussed. [less ▲] Detailed reference viewed: 376 (3 UL) Cyberbullying in the Benelux-Countries: First findings and ways to address the problemSteffgen, Georges ; ; et alin Mora-Merchan, J.; Jäger, T. (Eds.) Cyberbullying: a cross-national comparison (2010) Detailed reference viewed: 214 (25 UL) Cyberbullying through the new media: Findings from an international network; Steffgen, Georges ![]() Book published by Psychology Press (2013) Detailed reference viewed: 559 (15 UL) Cyberbullying – zur Wirkung spezifischer Interventionsmaßnahmen. Befunde einer wissenschaftlichen Begleitstudie. Projektbericht.Steffgen, Georges ; König, Andreas ; Pfetsch, Jan ![]() Report (2009) Detailed reference viewed: 221 (2 UL) Cyberbullying: Missbrauch mittels neuer elektronischer MedienSteffgen, Georges ![]() in Willems, Helmut; Ferring, Dieter (Eds.) Macht und Missbrauch in Institutionen (2014) Detailed reference viewed: 457 (17 UL) Cyberbullying: Recent Areas of Research, and the Work of COST IS0801; Steffgen, Georges ![]() in Bulletin of the International Society for Research on Aggression (2013), 35(1), 20-23 Detailed reference viewed: 148 (0 UL) |
||