Search results for "Computer Science Application"
showing 10 items of 3998 documents
Electroencephalography as a Non-Invasive Biomarker of Alzheimer’s Disease: A Forgotten Candidate to Substitute CSF Molecules?
2021
Biomarkers for disease diagnosis and prognosis are crucial in clinical practice. They should be objective and quantifiable and respond to specific therapeutic interventions. Optimal biomarkers should reflect the underlying process (pathological or not), be reproducible, widely available, and allow measurements repeatedly over time. Ideally, biomarkers should also be non-invasive and cost-effective. This review aims to focus on the usefulness and limitations of electroencephalography (EEG) in the search for Alzheimer’s disease (AD) biomarkers. The main aim of this article is to review the evolution of the most used biomarkers in AD and the need for new peripheral and, ideally, non-invasive b…
The Nutraceutical Properties of Rhus coriaria Linn: Potential Application on Human Health and Aging Biomedicine
2023
Rhus coriaria Linn is a little plant growing in the Mediterranean basin, including Sicily, where it is known as Sicilian Sumac. Since antiquity, it has been used as a medicinal herb, considering its pharmacological properties and its recognized anti-inflammatory, antioxidant, and antimicrobial effects. Multiple studies have highlighted that the beneficial properties of Sumac extracts depend on the abundance of phytochemicals such as polyphenols, fatty acids, minerals, and fibers. Despite its wide use as a spice, the literature on Sumac effects on humans’ health and aging is still scarce. Considering its great nutraceutical potential, Sumac could be used to treat age-related diseases such as…
Adipose Stromal/Stem Cell-Derived Extracellular Vesicles: Potential Next-Generation Anti-Obesity Agents
2022
Over the last decade, several compounds have been identified for the treatment of obesity. However, due to the complexity of the disease, many pharmacological interventions have raised concerns about their efficacy and safety. Therefore, it is important to discover new factors involved in the induction/progression of obesity. Adipose stromal/stem cells (ASCs), which are mostly isolated from subcutaneous adipose tissue, are the primary cells contributing to the expansion of fat mass. Like other cells, ASCs release nanoparticles known as extracellular vesicles (EVs), which are being actively studied for their potential applications in a variety of diseases. Here, we focused on the importance …
Does openness and open access policy relate to the success of universities?
2013
This study takes a closer look at the Ranking Web of Universities and Ranking Web of Repositories rankings and tries to examine if there is a connection between these two rankings. Study is done by analyzing the success of University of Jyväskylä and the institutional repository JyX of the University in these rankings. Comparison shows that the JyX archive plays an important role in University’s success especially when analyzing the presence and openness of the University. By analyzing the success of eight European countries in these rankings and cross reading these findings with the development of relative citation impact shown in a report by the Finnish Academy, some interesting common tr…
A Dialogical Exploration of Student Teacher Reflections: From Notions of Insideness and Outsideness to Pedagogical Alongsideness
2023
This article offers a dialogical exploration of student teachers’ reflections on notions of insideness and outsideness, the focal themes of an Erasmus+ ten-day intensive programme (IP). The arts-based, interdisciplinary IP involved 32 student participants and twelve members of staff from eight European universities hosted by the University of Jyväskylä, Finland. The data for this paper are based on the final written essays of student participants as they reflected on their understanding of outsideness and insideness at the end of the IP. The dialogic approach used in the analysis allows for a careful exploration of how the students attended to different experiences, surmised the meaning of …
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Enablers of and constraints on employees' information sharing on enterprise social media
2020
PurposeThe purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.Design/methodology/approachThis qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.FindingsOn an enterprise social media platform, privacy …
Increasing stability in the linearized inverse Schrödinger potential problem with power type nonlinearities
2022
We consider increasing stability in the inverse Schr\"{o}dinger potential problem with power type nonlinearities at a large wavenumber. Two linearization approaches, with respect to small boundary data and small potential function, are proposed and their performance on the inverse Schr\"{o}dinger potential problem is investigated. It can be observed that higher order linearization for small boundary data can provide an increasing stability for an arbitrary power type nonlinearity term if the wavenumber is chosen large. Meanwhile, linearization with respect to the potential function leads to increasing stability for a quadratic nonlinearity term, which highlights the advantage of nonlinearit…
Oncogenic BRAF and p53 Interplay in Melanoma Cells and the Effects of the HDAC Inhibitor ITF2357 (Givinostat)
2023
Oncogenic BRAF mutations have been widely described in melanomas and promote tumour progression and chemoresistance. We previously provided evidence that the HDAC inhibitor ITF2357 (Givinostat) targets oncogenic BRAF in SK-MEL-28 and A375 melanoma cells. Here, we show that oncogenic BRAF localises to the nucleus of these cells, and the compound decreases BRAF levels in both the nuclear and cytosolic compartments. Although mutations in the tumour suppressor p53 gene are not equally frequent in melanomas compared to BRAF, the functional impairment of the p53 pathway may also contribute to melanoma development and aggressiveness. To understand whether oncogenic BRAF and p53 may cooperate, a po…