Search results for "Cryptography"
showing 10 items of 657 documents
Statistical Explorations and Univariate Timeseries Analysis on COVID-19 Datasets to Understand the Trend of Disease Spreading and Death
2020
&ldquo
Guidelines Have a Key Role in Driving HCV Elimination by Advocating for Simple HCV Care Pathways.
2021
The availability of pangenotypic direct-acting antivirals for treatment of hepatitis C (HCV) has provided an opportunity to simplify patient pathways. Recent clinical practice guidelines have recognised the need for simplification to ensure that elimination of HCV as a public health concern remains a priority. Despite the move towards simplified treatment algorithms, there remains some complexity in the recommendations for the management of genotype 3 patients with compensated cirrhosis. In an era where additional clinical trial data are not anticipated, clinical guidance should consider experience gained in real-world settings. Although more experience is required for some pangenotypic the…
Towards identifying drug side effects from social media using active learning and crowd sourcing.
2019
Motivation Social media is a largely untapped source of information on side effects of drugs. Twitter in particular is widely used to report on everyday events and personal ailments. However, labeling this noisy data is a difficult problem because labeled training data is sparse and automatic labeling is error-prone. Crowd sourcing can help in such a scenario to obtain more reliable labels, but is expensive in comparison because workers have to be paid. To remedy this, semi-supervised active learning may reduce the number of labeled data needed and focus the manual labeling process on important information. Results We extracted data from Twitter using the public API. We subsequently use Ama…
Sort and beer: Everything you wanted to know about the sorting task but did not dare to ask
2011
author cannot archive publisher's version/PDF; International audience; In industries, the sensory characteristics of products are key points to control. The method commonly used to characterize and describe products is the conventional profile. This very efficient method requires a lot of time to train assessors and to teach them how to quantify the sensory characteristics of interest. Over the last few years, other faster and less restricting methods have been developed, such as free choice profile, flash profile, projective mapping or sorting tasks. Among these methods, the sorting task has recently become quite popular in sensory evaluation because of its simplicity: it only requires ass…
Ensuring Diverse User Experiences and Accessibility While Developing the TeSLA e-Assessment System
2019
The TeSLA project, with its new, innovative approaches for e-assessment, offers a great possibility for increasing the educational equality and making higher education studies available for all. It has been estimated that 10–15% of students in higher education institutions have some disabilities or special educational needs. At online universities or in online programmes, the number is even higher. These numbers emphasise the importance of the universal design for learning as a leading principle while developing the digital learning environments and e-assessment procedures. In this chapter, we describe the key elements of ensuring the accessibility of the TeSLA e-assessment system during th…
Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities
2021
AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…
Evolutionary ethics and adaptive atheism
2020
In Evolution Science and Ethics in the Third Millennium (2018), whose key arguments are summarized in the target article above, Cliquet and Avramov offer an exacting and extensive analysis of the e...
Optimizing Query Perturbations to Enhance Shape Retrieval
2020
3D Shape retrieval algorithms use shape descriptors to identify shapes in a database that are the most similar to a given key shape, called the query. Many shape descriptors are known but none is perfect. Therefore, the common approach in building 3D Shape retrieval tools is to combine several descriptors with some fusion rule. This article proposes an orthogonal approach. The query is improved with a Genetic Algorithm. The latter makes evolve a population of perturbed copies of the query, called clones. The best clone is the closest to its closest shapes in the database, for a given shape descriptor. Experimental results show that improving the query also improves the precision and complet…
India’s Turn to Rights-Based Legislation (2004–2014): A Critical Review of the Literature
2018
This article surveys the academic literature on rights-based legislation and critically discusses key findings and arguments that emerge from this literature. I conduct this survey and discussion in light of a wider understanding of the political economy of Indian democracy as resilient but limited in terms of substantial forms of redistribution and recognition in favour of subaltern groups. This contradiction has arguably become especially pronounced in the context of neoliberalisation, where, despite the active participation of the poor in electoral democracy, socioeconomic inequality has reached dramatic heights, and I discuss rights-based legislation as a response to this. In conclusio…
Bank Loan Loss Accounting and Its Contracting Effects: The New Expected Loss Models
2019
As a result of the recent financial crisis, several key institutions urged the IASB and the FASB to re-evaluate their models for loan loss accounting and use more forward-looking information. The paper examines the principal features of the new expected loss approach, taking into account the tensions between accounting and prudential objectives with respect to credit losses. We discuss the rationales for the change introduced by IFRS 9 and explore the differences between the IASB and the FASB models. Based on the notions of accounting conservatism and earnings management, we discuss the potential consequences of the new models. While both the FASB and the IASB model are more conservative th…