Search results for "Cryptography"
showing 10 items of 657 documents
The HIF1α-PFKFB3 Pathway: A Key Player in Diabetic Retinopathy
2021
Abstract Diabetic retinopathy (DR) is the leading cause of blindness for adults in developed countries. Both microvasculopathy and neurodegeneration are implicated in mechanisms of DR development, with neuronal impairment preceding microvascular abnormalities, which is often underappreciated in the clinic. Most current therapeutic strategies, including anti-vascular endothelial growth factor (anti-VEGF)-antibodies, aim at treating the advanced stages (diabetic macular edema and proliferative diabetic retinopathy) and fail to target the neuronal deterioration. Hence, new therapeutic approach(es) intended to address both vascular and neuronal impairment are urgently needed. The hypoxia-induci…
Models and Model Transformations Within Web Applications
2016
Unlike traditional single-user desktop applications, web applications have separated memory and computational resources (the client and the server side) and have to deal with multiple user accounts. This complicates the development process. Is there some approach of creating web applications without thinking about web-specific aspects, as if we are developing stand-alone desktop applications? We say, “yes”, and that is where models and model transformations come in handy. The proposed model-driven approach simplifies the development of web applications and makes it possible to use a single code base for deploying both desktop and web-based versions of the software.
Software/Hardware Issues in Modelling Insect Brain Architecture
2011
The concept of cognitive abilities is commonly associated to humans and animals like mammals, birds and others. Nevertheless, in the last years several research groups have intensified the studies on insects that posses a much simpler brain structure even if they are able to show interesting memory and learning capabilities. In this paper a survey on some key results obtained in a joint research activity among Engineers and Neurogeneticians is reported. They were focussed toward the design and implementation of a model of the insect brain inspired by the Drosophila melanogaster. Particular attention was paid to the main neural centers the Mushroom Bodies and the Central Complex. Moreover a …
Erradicando la xenofobia y la aporofobia desde la compasión ética como capacidad clave de la neuroeducación moral
2021
Drawing on the contributions of some of the most recent and relevant studies on neuroethics and moral neuroeducation, this paper undertakes an analysis of compassion. In order to focus on the results of this neuroscientific research a reductionist naturalist framework is set aside in order to embrace the broader outlook of a moral neuroeducation that, firstly, refuses to reduce its normative character to the human capacity for evolutionary adaptation; and, secondly, seeks to locate within the brain the neuronal foundations for the development of a capacity for compassion towards those of one’s own community, and also those from outside it. Thereby, this capacity for compassion moves beyond …
Towards a comprehensive understanding of new regional industrial path development
2019
Path creation is a key concept in economic geography. So far, particularly scholars within evolutionary economic geography have pioneered research on this topic. This paper critically discusses the...
Student participation in peer interaction
2021
This study explores how students deal with material resources in their peer interaction when working in pairs in an open-ended problem-solving task. The productive use of material resources can be expected to support successful peer work. However, research into social phenomena in peer interaction is needed in order to identify and describe productive and less productive forms of dealing with material resources as students participate in open-ended problem-solving tasks. Consequently, this explorative study responds to this research need. Based on multimodal data, including video recordings, transcribed talk and the written contributions from four pairs of Year 7 students aged 12-13 years, …
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Location-Awareness for Failure Management in Cellular Networks: An Integrated Approach
2021
Recent years have seen the proliferation of different techniques for outdoor and, especially, indoor positioning. Still being a field in development, localization is expected to be fully pervasive in the next few years. Although the development of such techniques is driven by the commercialization of location-based services (e.g., navigation), its application to support cellular management is considered to be a key approach for improving its resilience and performance. When different approaches have been defined for integrating location information into the failure management activities, they commonly ignore the increase in the dimensionality of the data as well as their integration into th…
Register Variation in Electronic Business Correspondence
2011
Electronic correspondence is a highly dynamic genre within the business world in which Register Variation (RV) is frequently used as a tool to improve communication but it often can lead to misunderstanding. In order to shed some light on this still unexplored area, the present study firstly offers a practical approach to classify and analyse RV within professional communication. After this, it reviews previous studies on email writing to apply their findings to this approach and, in the third part of the study, a corpus of recent business emails in English is analysed to examine how the key parameters of RV are currently used within this genre. The results will show that, not only the cont…
A black-box, general purpose quadratic self-consistent field code with and without Cholesky Decomposition of the two-electron integrals
2021
We present the implementation of a quadratically convergent self-consistent field (QCSCF) algorithm based on an adaptive trust-radius optimisation scheme for restricted open-shell Hartree���Fock (ROHF), restricted Hartree���Fock (RHF), and unrestricted Hartree���Fock (UHF) references. The algorithm can exploit Cholesky decomposition (CD) of the two-electron integrals to allow calculations on larger systems. The most important feature of the QCSCF code lies in its black-box nature ��� probably the most important quality desired by a generic user. As shown for pilot applications, it does not require one to tune the self-consistent field (SCF) parameters (damping, Pulay's DIIS, and other simil…