![]() Ganschow, Inna ![]() Speeches/Talks (2020) „Op deenen 320 Säite gëtt déi russesch Emigratioun op a bannent Lëtzebuerg erkläert. Ënnert anerem erzielen Eenzelpersounen a Familljen hir Geschichten.“ Detailed reference viewed: 22 (0 UL)![]() Ganschow, Inna ![]() Speeches/Talks (2019) The interview treats two main topics: 1. the interdisciplinary student project between Universities of Luxembourg and University of Tambov, Russia, dedicated to the Luxembourgish-Russian crossroads of ... [more ▼] The interview treats two main topics: 1. the interdisciplinary student project between Universities of Luxembourg and University of Tambov, Russia, dedicated to the Luxembourgish-Russian crossroads of history and 2. the meaning of the city of Tambov in the contemporary history of Luxembourg, connected to the Luxembourger forcibly recruited soldiers in the soviet captivity. [less ▲] Detailed reference viewed: 25 (1 UL)![]() Ganschow, Inna ![]() Speeches/Talks (2019) Detailed reference viewed: 20 (0 UL)![]() Ganschow, Inna ![]() Speeches/Talks (2019) "The first Russian" in Luxembourg, which arrived in the 1920ths, were not the first ones. The pre-history of the Russian presence in the Grand Duchy before WWI and the further development regarding the ... [more ▼] "The first Russian" in Luxembourg, which arrived in the 1920ths, were not the first ones. The pre-history of the Russian presence in the Grand Duchy before WWI and the further development regarding the two world wars and the post-war situation were the topic of this radio interview. [less ▲] Detailed reference viewed: 105 (6 UL)![]() Ganschow, Inna ![]() Conference given outside the academic context (2021) We invite you to take part in a round table with international participation "My country - my Russia: a single educational space for young compatriots living abroad." The event will be held on March 21st ... [more ▼] We invite you to take part in a round table with international participation "My country - my Russia: a single educational space for young compatriots living abroad." The event will be held on March 21st, 2021 at 12.00 (Moscow time) in the meeting room of the Academic Council of the Russian State Humanitarian University with the direct participation of the Ministry of Education of Russia, the Ministry of Science and Higher Education of the Russian Federation, the Federal Agency for the Commonwealth of Independent States, compatriots living abroad, and on international humanitarian cooperation and television representatives. Within the framework of the event, the presentation of the 18th season of the All-Russian competition of youth copyright projects and projects in the field of education aimed at the social and economic development of Russian territories "My country is my Russia" (hereinafter - the Competition), including the international nomination "The Commonwealth of Our Countries », Speeches of specialized experts and specialists. The event will be attended by organizers, experts, graduates of the Competition, as well as representatives of educational organizations and youth public associations from more than 40 countries (Australia, Egypt, Germany, USA, Turkey, etc.). The event will be held in a hybrid format: face-to-face participation is possible, as well as online connection. [less ▲] Detailed reference viewed: 62 (0 UL)![]() Sharma, Shree Krishna ![]() Doctoral thesis (2014) The demand for precious radio spectrum is continuously increasing while the available radio frequency resource has become scarce due to spectrum segmentation and the dedicated frequency allocation of ... [more ▼] The demand for precious radio spectrum is continuously increasing while the available radio frequency resource has become scarce due to spectrum segmentation and the dedicated frequency allocation of standardized wireless systems. This scarcity has led to the concept of cognitive radio communication which comprises a variety of techniques capable of allowing the coexistence of licensed and unlicensed systems over the same spectrum. In this context, this thesis focuses on interweave and underlay cognitive radio paradigms which are widely considered as important enablers for realizing cognitive radio technology. In the interweave paradigm, an unlicensed user explores the spectral holes by means of some spectrum awareness methods and utilizes the available spectral availabilities opportunistically while in the underlay paradigm, an unlicensed user is allowed to coexist with the licensed user only if sufficient protection to the licensed user can be guaranteed. Starting with a detailed overview of the existing techniques, this thesis provides contributions in both theoretical and the practical aspects of these paradigms. This thesis is structured into two main parts as described below. One of the important capabilities required for a cognitive radio transceiver is to be able to acquire the knowledge of its surrounding radio environment in order to utilize the available spectral opportunities efficiently. The higher the level of information it can acquire, the better becomes the spectrum utilization. In this context, the first part of this thesis focuses on spectrum awareness techniques such as spectrum sensing, signal to noise ratio estimation and sparsity order estimation which are useful for realizing interweave and underlay based cognitive transceivers as well as a hybrid cognitive transceiver, which overcomes the drawbacks of both the above approaches. The effects of noise and channel correlations, which are often neglected in the existing literature, are considered in our analysis. In the above context, firstly, we propose new sensing thresholds for the eigenvalue based sensing approach using recent results from random matrix theory in order to achieve the improved sensing in correlated scenarios. Then we study the signal to noise ratio estimation problem for both narrowband and wideband transceivers with the help of a detailed theoretical analysis under the signal plus noise hypothesis for a range of correlated scenarios. Subsequently, we study the problem of compressive sparsity order estimation in order to estimate the sparsity order of the carrier occupancy over the wide spectrum using a compressive sensing approach. In addition, we carry out the performance analysis of a hybrid cognitive transceiver which combines the spectrum sensing approach with a power control-based underlay approach. The second part of this thesis introduces the concept of cognitive satellite communications which is a rather unexplored area in the literature despite its significant benefits to both satellite and terrestrial operators. This concept has been motivated due to the limited availability of the satellite spectrum as well as the continuously increasing demand of broadband multimedia, broadcast and interactive satellite services. Subsequently, we study the applications of various cognitive radio techniques in satellite communication systems focusing on the following two scenarios: (i) Hybrid cognitive satellite communication which deals with the spectral coexistence of satellite systems with the terrestrial systems, and (ii) Dual cognitive satellite communication which deals with the spectral coexistence of two satellite systems operating over the same coverage area. Understanding the characteristics of coexisting systems is of great importance while applying a suitable cognitive radio technique. In this context, this thesis exploits the specific characteristics of satellite systems in order to map a suitable cognitive radio technique to a specific scenario. For hybrid cognitive scenarios, we propose the following enabling techniques: (a) Interference modeling, (b) Harmful interference detection, (c) Cognitive beamforming including both transmit and receive beamforming, and (d) Dual-polarized spectrum sensing. Similarly, for dual cognitive scenarios, we propose the following techniques: (i) Cognitive interference alignment, (ii) Cognitive beamhopping, and (iii) Dual-polarized spectrum sensing. Finally, we provide interesting open research issues in the considered domain. [less ▲] Detailed reference viewed: 818 (92 UL)![]() ; ; et al in Frontiers in Psychology (2014), 5 Writing words in real life involves setting objectives, imagining a recipient, translating ideas into linguistic forms, managing grapho-motor gestures, etc. Understanding writing requires observation of ... [more ▼] Writing words in real life involves setting objectives, imagining a recipient, translating ideas into linguistic forms, managing grapho-motor gestures, etc. Understanding writing requires observation of the processes as they occur in real time. Analysis of pauses is one of the preferred methods for accessing the dynamics of writing and is based on the idea that pauses are behavioral correlates of cognitive processes. However, there is a need to clarify what we are observing when studying pause phenomena, as we will argue in the first section. This taken into account, the study of pause phenomena can be considered following two approaches. A first approach, driven by temporality, would define a threshold and observe where pauses, e.g., scriptural inactivity occurs. A second approach, linguistically driven, would define structural units and look for scriptural inactivity at the boundaries of these units or within these units. Taking a temporally driven approach, we present two methods which aim at the automatic identification of scriptural inactivity which is most likely not attributable to grapho-motor management in texts written by children and adolescents using digitizing tablets in association with Eye and Pen© (Chesnet and Alamargot, 2005). The first method is purely statistical and is based on the idea that the distribution of pauses exhibits different Gaussian components each of them corresponding to a different type of pause. After having reviewed the limits of this statistical method, we present a second method based on writing dynamics which attempts to identify breaking points in the writing dynamics rather than relying only on pause duration. This second method needs to be refined to overcome the fact that calculation is impossible when there is insufficient data which is often the case when working with young scriptors. [less ▲] Detailed reference viewed: 124 (3 UL)![]() ; ; et al in New England Journal of Medicine (2019), 380(16), 24 With regard to the article by Bailey et al. (March 15, 2018, issue) on the potential role of variants in the gene encoding intestinal cell kinase (ICK) in genetic generalized epilepsies, including ... [more ▼] With regard to the article by Bailey et al. (March 15, 2018, issue) on the potential role of variants in the gene encoding intestinal cell kinase (ICK) in genetic generalized epilepsies, including juvenile myoclonic epilepsy: We attempted replication by rechecking for enrichment of ICK variants in two previously published analyses of mainly familial cases of genetic generalized epilepsy, which included a total of 1149 cases of genetic generalized epilepsy and 5911 ethnically matched controls. We analyzed the burden of single-gene rare variants with the use of whole exome sequencing data, applying population stratification and both sample and variant quality control. We found no evidence of an enrichment of ICK variants in genetic generalized epilepsies or juvenile myoclonic epilepsy. Specifically, we did not detect a nonsynonymous variant in 357 persons with juvenile myoclonic epilepsy at a minor allele frequency at or below 0.1%. Although we cannot exclude the possibility that ICK variants may be population-specific risk factors for juvenile myoclonic epilepsy, the lack of validation in our cohorts does not support a true disease association but rather suggests that the authors’ results may be due to chance, possibly owing to methodologic issues (see the Supplementary Appendix, available with the full text of this letter at NEJM.org). [less ▲] Detailed reference viewed: 201 (9 UL)![]() ; Khanfir, Ahmed ![]() ![]() in 22nd IEEE International Conference on Software Quality, Reliability, and Security (2022) Studying and exposing software vulnerabilities is important to ensure software security, safety, and reliability. Software engineers often inject vulnerabilities into their programs to test the ... [more ▼] Studying and exposing software vulnerabilities is important to ensure software security, safety, and reliability. Software engineers often inject vulnerabilities into their programs to test the reliability of their test suites, vulnerability detectors, and security measures. However, state-of-the-art vulnerability injection methods only capture code syntax/patterns, they do not learn the intent of the vulnerability and are limited to the syntax of the original dataset. To address this challenge, we propose the first intent-based vulnerability injection method that learns both the program syntax and vulnerability intent. Our approach applies a combination of NLP methods and semantic-preserving program mutations (at the bytecode level) to inject code vulnerabilities. Given a dataset of known vulnerabilities (containing benign and vulnerable code pairs), our approach proceeds by employing semantic-preserving program mutations to transform the existing dataset to semantically similar code. Then, it learns the intent of the vulnerability via neural machine translation (Seq2Seq) models. The key insight is to employ Seq2Seq to learn the intent (context) of the vulnerable code in a manner that is agnostic of the specific program instance. We evaluate the performance of our approach using 1275 vulnerabilities belonging to five (5) CWEs from the Juliet test suite. We examine the effectiveness of our approach in producing compilable and vulnerable code. Our results show that INTJECT is effective, almost all (99%) of the code produced by our approach is vulnerable and compilable. We also demonstrate that the vulnerable programs generated by INTJECT are semantically similar to the withheld original vulnerable code. Finally, we show that our mutation-based data transformation approach outperforms its alternatives, namely data obfuscation and using the original data. [less ▲] ![]() Hesse, Markus ![]() in Arch + (2018), (231), 78-83 How the financialization of property markets and land use puts cities under pressure. Detailed reference viewed: 182 (22 UL)![]() Tropper, Elisabeth ![]() Conference given outside the academic context (2011) Detailed reference viewed: 67 (2 UL)![]() Asimakopoulos, Ioannis ![]() in Dogaru, Tatiana-Camelia (Ed.) (Re)forming Public Administration Paradigms in Global Governance Context (2018) Detailed reference viewed: 122 (8 UL)![]() ![]() Gilles, Peter ![]() in Zeitschrift für Germanistische Linguistik (2001), 29 Detailed reference viewed: 106 (1 UL)![]() ![]() Gilles, Peter ![]() in Germanistische Linguistik (2001), 157-158 Detailed reference viewed: 108 (2 UL)![]() ; Gilles, Peter ![]() in Stellmacher, Dieter (Ed.) Dialektologie zwischen Tradition und Neuansätzen. Beiträge der Internationalen Dialektologentagung. Göttingen, 19.-21. Oktober 1998 (2000) Detailed reference viewed: 138 (2 UL)![]() Ratti, Luca ![]() in Giornale di Diritto del Lavoro e di Relazioni Industriali (2016) Detailed reference viewed: 214 (5 UL)![]() Joxhe, Majlinda ![]() in Review of Economics of the Household (2020) This paper shows that sharing information concerning expenditure choices between a migrant and the recipient affects the migrant’s allocation patterns. In a lab-in-the-field experiment, Filipino migrants ... [more ▼] This paper shows that sharing information concerning expenditure choices between a migrant and the recipient affects the migrant’s allocation patterns. In a lab-in-the-field experiment, Filipino migrants are asked to earmark an in-kind budget to be delivered to their most closely connected household (MCCH). When the MCCH is fully aware of the migrant’s decisions (i.e., symmetric information), we observe that the migrant raises the portion for consumption goods in the range of 10.0-10.5% with respect to the case when the migrant’s choices are not disclosed (i.e., asymmetric information). Moreover, when sharing information, the migrant relies on more involvement of the recipient household and lowers by 7-9% the allocation to expenses she could monitor ex-post more strictly. The former result is consistent with the signaling motive, whereas the latter supports the presence of strategic behavior by the migrant remitter. These findings are more significant for intra- rather than inter-household transfers and provide insights for conditional cash transfer policies. [less ▲] Detailed reference viewed: 61 (6 UL)![]() Schmit, Dan ![]() Doctoral thesis (2021) Detailed reference viewed: 64 (1 UL)![]() Lucas Filho, Edson Ramiro ![]() ![]() ![]() in IDEAS 2014 : 18th International Database Engineering Applications Symposium (2014) Detailed reference viewed: 309 (8 UL)![]() ; ; et al in Journal of Chromatography. B, Analytical Technologies in the Biomedical and Life Sciences (2012), 898 An extraction method for intracellular metabolite profiling should ideally be able to recover the broadest possible range of metabolites present in a sample. However, the development of such methods is ... [more ▼] An extraction method for intracellular metabolite profiling should ideally be able to recover the broadest possible range of metabolites present in a sample. However, the development of such methods is hampered by the diversity of the physico-chemical properties of metabolites as well as by the specific characteristics of samples and cells. In this study, we report the optimization of an UPLC-MS method for the metabolite analysis of platelet samples. The optimal analytical protocol was determined by testing seven different extraction methods as well as by employing two different LC-MS methods, in which the metabolites were separated by using hydrophilic interaction liquid chromatography (HILIC) and reversed phase liquid chromatography (RPLC). The optimal conditions were selected using the coverage of the platelets' metabolome, the response of the identified metabolites, the reproducibility of the analytical method, and the time of the analysis as main evaluation criteria. Our results show that methanol-water (7:3) extraction coupled with HILIC-MS method provides the best compromise, allowing identification of 107 metabolites in a platelet cell extract sample, 91% of them with a RSD% lower than 20. A higher number of metabolites could be detected when analyzing the platelet samples with two different LC-MS methods or when using complementary extraction methods in parallel. [less ▲] Detailed reference viewed: 135 (2 UL) |
||