References of "Scientific journals"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailFormation et marché du travail transfrontalier : quelles pistes face aux déséquilibres croissants?
Pigeron-Piroth, Isabelle UL; Hein, Vincent; Belkacem, Rachid

in UniGR-CBS Policy Paper (2022), 3

The purpose of this paper is to contribute to the reflection on the role of training in the cross-border labor market. It does so by mobilizing the debates initiated in the different Cahiers de la Grande ... [more ▼]

The purpose of this paper is to contribute to the reflection on the role of training in the cross-border labor market. It does so by mobilizing the debates initiated in the different Cahiers de la Grande Région and during a conference-debate organized online on December 1 2020 on the topic of "Inequities, Skills, and Training: What Equations for the Cross-Border Labor Market?” More precisely, this contribution aims at answering the following question: how can training and its different practices in the professional fields, but also in school and university education, mitigate the imbalances that are emerging on the labor market of the Greater Region? The document thus proposes a few lines of thought for cross-border cooperation in the field of training. [less ▲]

Detailed reference viewed: 50 (5 UL)
Full Text
Peer Reviewed
See detailET-Class, an Energy Transfer-based Classification of Space Debris Removal Methods and Missions
Yalcin, Baris Can UL; Martinez Luna, Carol UL; Hubert Delisle, Maxime UL et al

in Frontiers in Space Technologies (2022)

Space debris is positioned as a fatal problem for current and future space missions. Many e ective space debris removal methods have been proposed in the past decade, and several techniques have been ... [more ▼]

Space debris is positioned as a fatal problem for current and future space missions. Many e ective space debris removal methods have been proposed in the past decade, and several techniques have been either tested on the ground or in parabolic ight experiments. Nevertheless, no uncooperative debris has been removed from any orbit until this moment. Therefore, to expand this research eld and progress the development of space debris removal technologies, this paper reviews and compares the existing technologies with past, present, and future methods and missions. Moreover, since one of the critical problems when designing space debris removal solutions is how to transfer the energy between the chaser/de-orbiting kit and target during the rst interaction, this paper proposes a novel classi cation approach, named ET-Class (Energy Transfer Class). This classi cation approach provides an energy-based perspective to the space debris phenomenon by classifying how existing methods dissipate or store energy during rst contact. [less ▲]

Detailed reference viewed: 119 (35 UL)
Full Text
Peer Reviewed
See detailUnterlassung und Verhältnismäßigkeit - das 2. PatMoG als Neuanfang
Stierle, Martin UL

in GRUR: Gewerblicher Rechtsschutz und Urheberrecht (2022), (5), 273-274

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailAvoiding bias when inferring race using name-based approaches
Kozlowski, Diego UL; Murray, Dakota S.; Bell, Alexis et al

in PLoS ONE (2022), 3(17), 0264270

Racial disparity in academia is a widely acknowledged problem. The quantitative understanding of racial-based systemic inequalities is an important step towards a more equitable research system. However ... [more ▼]

Racial disparity in academia is a widely acknowledged problem. The quantitative understanding of racial-based systemic inequalities is an important step towards a more equitable research system. However, because of the lack of robust information on authors’ race, few large-scale analyses have been performed on this topic. Algorithmic approaches offer one solution, using known information about authors, such as their names, to infer their perceived race. As with any other algorithm, the process of racial inference can generate biases if it is not carefully considered. The goal of this article is to assess the extent to which algorithmic bias is introduced using different approaches for name-based racial inference. We use information from the U.S. Census and mortgage applications to infer the race of U.S. affiliated authors in the Web of Science. We estimate the effects of using given and family names, thresholds or continuous distributions, and imputation. Our results demonstrate that the validity of name-based inference varies by race/ethnicity and that threshold approaches underestimate Black authors and overestimate White authors. We conclude with recommendations to avoid potential biases. This article lays the foundation for more systematic and less-biased investigations into racial disparities in science. [less ▲]

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailInkjet-printed indium sulfide buffer layer for Cu(In,Ga)(S,Se)2 thin film solar cells
Debot, Alice UL; Chu, Van Ben; Adeleye, Damilola UL et al

in Thin Solid Films (2022)

We report an environmentally friendly inkjet-printed indium sulfide (In2S3) buffer layer using benign chemistry and processing conditions. A pre-synthesized indium-thiourea compound is dissolved in a ... [more ▼]

We report an environmentally friendly inkjet-printed indium sulfide (In2S3) buffer layer using benign chemistry and processing conditions. A pre-synthesized indium-thiourea compound is dissolved in a mixture of water and ethanol, inkjet printed on a Cu(In,Ga)(S,Se)2 absorber and annealed in air. The buffer layer shows a β-In2S3 structure with few organic impurities and band gap in the range of 2.3 eV. An ultraviolet ozone treatment applied to the surface of the absorber prior to inkjet printing of the precursor is used to improve the wettability of the ink and therefore the surface coverage of the buffer on the absorber layer. The device with a fully covering In2S3 layer shows better open circuit voltage and fill factor than the device with a partially covering In2S3 layer. The best In2S3 device showed a light to electric power conversion efficiency similar to the reference cadmium sulfide buffer layer device. Good wettability conditions are therefore essential for higher efficiency solar cells when the buffer layer is inkjet-printed. [less ▲]

Detailed reference viewed: 51 (6 UL)
Full Text
Peer Reviewed
See detailRL/DRL Meets Vehicular Task Offloading Using Edge and Vehicular Cloudlet: A Survey
Liu, Jinshi; Ahmed, Manzoor; Mirza, Muhammad Ayzed et al

in IEEE Internet of Things Journal (2022)

The last two decades have seen a clear trend toward crafting intelligent vehicles based on the significant advances in communication and computing paradigms, which provide a safer, stress-free, and more ... [more ▼]

The last two decades have seen a clear trend toward crafting intelligent vehicles based on the significant advances in communication and computing paradigms, which provide a safer, stress-free, and more enjoyable driving experience. Moreover, emerging applications and services necessitate massive volumes of data, real-time data processing, and ultrareliable and low-latency communication (URLLC). However, the computing capability of current intelligent vehicles is minimal, making it challenging to meet the delay-sensitive and computation-intensive demand of such applications. In this situation, vehicular task/computation offloading toward the edge cloud (EC) and vehicular cloudlet (VC) seems to be a promising solution to improve the network’s performance and applications’ Quality of Service (QoS). At the same time, artificial intelligence (AI) has dramatically changed people’s lives. Especially for vehicular task offloading applications, AI achieves state-of-the-art performance in various vehicular environments. Motivated by the outstanding performance of integrating reinforcement learning (RL)/deep RL (DRL) to the vehicular task offloading systems, we present a survey on various RL/DRL techniques applied to vehicular task offloading. Precisely, we classify the vehicular task offloading works into two main categories: 1) RL/ DRL solutions leveraging EC and 2) RL/DRL solutions using VC computing. Moreover, the EC section-based RL/DRL solutions are further subcategorized into multiaccess edge computing (MEC) server, nearby vehicles, and hybrid MEC (HMEC). To the best of our knowledge, we are the first to cover RL/DRL-based vehicular task offloading. Also, we provide lessons learned and open research challenges in this field and discuss the possible trend for future research. [less ▲]

Full Text
Peer Reviewed
See detailCooperative Multi-Agent Deep Reinforcement Learning for Resource Management in Full Flexible VHTS Systems
Ortiz Gomez, Flor de Guadalupe UL; Tarchi, Daniele; Martinez, Ramon et al

in IEEE Transactions on Cognitive Communications and Networking (2022), 8(1),

Very high throughput satellite (VHTS) systems are expected to have a huge increase in traffic demand in the near future. Nevertheless, this increase will not be uniform over the entire service area due to ... [more ▼]

Very high throughput satellite (VHTS) systems are expected to have a huge increase in traffic demand in the near future. Nevertheless, this increase will not be uniform over the entire service area due to the non-uniform distribution of users and changes in traffic demand during the day. This problem is addressed by using flexible payload architectures, which allow the allocation of payload resources flexibly to meet the traffic demand of each beam, leading to dynamic resource management (DRM) approaches. However, DRM adds significant complexity to VHTS systems, so in this paper we discuss the use of one reinforcement learning (RL) algorithm and two deep reinforcement learning (DRL) algorithms to manage the resources available in flexible payload architectures for DRM. These algorithms are Q-Learning (QL), Deep Q-Learning (DQL) and Double Deep Q-Learning (DDQL) which are compared based on their performance, complexity and added latency. On the other hand, this work demonstrates the superiority a cooperative multiagent (CMA) decentralized distribution has over a single agent (SA). [less ▲]

Detailed reference viewed: 38 (10 UL)
Full Text
Peer Reviewed
See detailPromoting participative policy coherence for sustainable development Inclusive dialogue through the “pull-push-match” methodology
Koff, Harlan UL

in Regions & Cohesion (2022), 12(1), 1-24

Policy Coherence for Sustainable Development (PCSD) has promoted sustainability through policy coordination, but to what extent does it respond to the needs of local communities? Scholars of PCSD have ... [more ▼]

Policy Coherence for Sustainable Development (PCSD) has promoted sustainability through policy coordination, but to what extent does it respond to the needs of local communities? Scholars of PCSD have acknowledged how it has been considered as an end in itself rather than a means to achieve normative impact. A major limit of PCSD has been its institutionalized nature, as mechanisms for social participation have not been highlighted in implementation strategies. This article addresses this issue. It proposes “pull-push-match” as a methodology for the es-tablishment of participative PCSD. The article, co-authored by a team of researchers and practitioners from Mexico, addresses PCSD in relation to Indigenous communities. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailAmbient Backscatter Assisted Co-Existence in Aerial-IRS Wireless Networks
Solanki, Sourabh UL; Gautam, Sumit; Sharma, Shree Krishna et al

in IEEE Open Journal of the Communications Society (2022), 3

Ambient backscatter communication (AmBC) is an emerging technology that has the potential to offer spectral- and energy-efficient solutions for the next generation wireless communications networks ... [more ▼]

Ambient backscatter communication (AmBC) is an emerging technology that has the potential to offer spectral- and energy-efficient solutions for the next generation wireless communications networks, especially for the Internet of Things (IoT). Intelligent reflecting surfaces (IRSs) are also perceived to be an integral part of the beyond 5G systems to complement the traditional relaying scheme. To this end, this paper proposes a novel system design that enables the co-existence of a backscattering secondary system with the legacy primary system. This co-existence is primarily driven by leveraging the AmBC technique in IRS-assisted unmanned aerial vehicle (UAV) networks. More specifically, an aerial-IRS mounted on a UAV is considered to be employed for cooperatively relaying the transmitted signal from a terrestrial primary source node to a user equipment on the ground. Meanwhile, capitalizing on the AmBC technology, a backscatter capable terrestrial secondary node transmits its information to a terrestrial secondary receiver by modulating and backscattering the ambient relayed radio frequency signals from the UAV-IRS. We comprehensively analyze the performance of the proposed design framework with co-existing systems by deriving the outage probability and ergodic spectral efficiency expressions. Moreover, we also investigate the asymptotic behaviour of outage performance in high transmit power regimes for both primary and secondary systems. Importantly, we analyze the performance of the primary system by considering two different scenarios i.e., optimal phase shifts design and random phase shifting at IRS. Finally, based on the analytical performance assessment, we present numerical results to provide various useful insights and also provide simulation results to corroborate the derived theoretical results. [less ▲]

Detailed reference viewed: 94 (23 UL)
Full Text
Peer Reviewed
See detailBOOK REVIEW: Inna GANSHOW, 100 Jahre Russen in Luxemburg. Geschichte einer atomisierten Diaspora.
Grosbois, Thierry; Ganschow, Inna UL

in Hemecht: Zeitschrift für Luxemburger Geschichte (2022), 1(74), 110-112

"L’immigration russe au Luxembourg est directement liée aux soubresauts de la crise internationale induite par la chute de l’empire tsariste, de la révolution bolchévique, de la répression soviétique ... [more ▼]

"L’immigration russe au Luxembourg est directement liée aux soubresauts de la crise internationale induite par la chute de l’empire tsariste, de la révolution bolchévique, de la répression soviétique, puis de l’éclatement imprévu de l’URSS. L’ouvrage nous rappelle, en ces temps actuels où l’immigration est souvent présentée comme un danger identitaire, au point de criminaliser les passages aux frontières, que ce phénomène a existé tout au long de l’Histoire de l’Humanité et qu’il fait partie, en réalité, de la nature humaine." [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailOpinion Statement ECJ-TF 3/2021 on the ECJ Decision of 19 March 2021 in MK v. Autoridade Tributária e Aduaneira (Case C-388/19) on the Option of Taxpayers to Avoid Discriminatory Taxation of Capital Gains
Kofler, Georg; Garcia Prats, Alfredo; Haslehner, Werner UL et al

in European Taxation (2022)

In this case note, the CFE ECJ Task Force comments on the ECJ decision in MK v. Autoridade Tributária e Aduaneira (Case C-388/19) of 18 March 2021. The Court confirmed its previous case law and held that ... [more ▼]

In this case note, the CFE ECJ Task Force comments on the ECJ decision in MK v. Autoridade Tributária e Aduaneira (Case C-388/19) of 18 March 2021. The Court confirmed its previous case law and held that the Portuguese (optional) regime for taxation of capital gains from immovable property of non-residents was contrary to the free movement of capital under article 63 of the TFEU since non-residents were taxed less favourably than residents. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailCahiers de fiscalité luxembourgeoise et européenne - 2022/1
Chaouche, Fatima; Sinnig, Julia UL

in Cahiers de fiscalité luxembourgeoise et européenne (2022), 1(1), 201

Les Cahiers de fiscalité luxembourgeoise et européenne offrent une analyse rigoureuse et thématique du droit fiscal luxembourgeois. Associant les exigences de la recherche scientifique à la réalité de la ... [more ▼]

Les Cahiers de fiscalité luxembourgeoise et européenne offrent une analyse rigoureuse et thématique du droit fiscal luxembourgeois. Associant les exigences de la recherche scientifique à la réalité de la pratique administrative luxembourgeoise, les Cahiers proposent deux fois par an une sélection d'analyses doctrinales rédigées par des experts luxembourgeois et étrangers. Chaque numéro des Cahiers se fait également le reflet d'une analyse systémique de la jurisprudence fiscale la plus récente au niveau national - contributions directes (juridictions administratives) et fiscalité indirecte (juridictions judiciaires) - et au niveau supranational (CJUE, CEDH). La recherche en droit fiscal luxembourgeois étant au coeur de ce projet collectif éditorial, les Cahiers publient régulièrement des actes de colloques, des extraits de thèses de doctorat récemment soutenues et un travail pluriannuel de rédaction de commentaires de la loi générale des impôts (Abgabenordnung). [less ▲]

Detailed reference viewed: 17 (3 UL)
Full Text
Peer Reviewed
See detailTaxation, data and destination - An analysis of destination-based taxation from the perspective of tax principles and data protection regulation
Sinnig, Julia UL

in Cahiers de fiscalité luxembourgeoise et européenne (2022), 1(1), 183-195

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailRefining the Spady–Tinto approach: the roles of individual characteristics and institutional support in students’ higher education dropout intentions in Luxembourg
Hadjar, Andreas UL; Haas, Christina; Gewinner, Irina

in European Journal of Higher Education (2022), early online

Based on the classic models developed by Spady and Tinto on the link between social and academic integration and dropout, we propose a refined model to explain dropout intentions – relating to dropout ... [more ▼]

Based on the classic models developed by Spady and Tinto on the link between social and academic integration and dropout, we propose a refined model to explain dropout intentions – relating to dropout from higher education (HE) and dropout from a specific study programme – that more strongly emphasises individual background characteristics (e.g. gender, social origin, and immigration background). Additionally, we consider students’ satisfaction with the institutional support structures. Using Eurostudent survey data, this conceptual model was tested using structural equation modelling in the international and diverse HE context of Luxembourg. While the fitted model confirmed most of the expected associations of the conventional Spady–Tinto approach, initial study commitment was not linked to social integration (contacts with fellow students). We were able to identify satisfaction with institutional support as a key factor in explaining dropout intention, thus contributing to existing knowledge. In addition, we found that the link between socioeconomic factors and dropout intention from a study programme is not entirely mediated by the Spady–Tinto factors of commitment and integration. [less ▲]

Detailed reference viewed: 55 (4 UL)
Full Text
Peer Reviewed
See detailLes relations ambiguës du droit de l'économie sociale et solidaire et de l'économie circulaire
Hiez, David UL

in Revue juridique de l'environnement (2022), 47(1),

Detailed reference viewed: 87 (2 UL)
Full Text
Peer Reviewed
See detailReducibility of n-ary semigroups: from quasitriviality towards idempotency
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL et al

in Beiträge zur Algebra und Geometrie (2022), 63(1), 149-166

Let $X$ be a nonempty set. Denote by $\mathcal{F}^n_k$ the class of associative operations $F\colon X^n\to X$ satisfying the condition $F(x_1,\ldots,x_n)\in\{x_1,\ldots,x_n\}$ whenever at least $k$ of the ... [more ▼]

Let $X$ be a nonempty set. Denote by $\mathcal{F}^n_k$ the class of associative operations $F\colon X^n\to X$ satisfying the condition $F(x_1,\ldots,x_n)\in\{x_1,\ldots,x_n\}$ whenever at least $k$ of the elements $x_1,\ldots,x_n$ are equal to each other. The elements of $\mathcal{F}^n_1$ are said to be quasitrivial and those of $\mathcal{F}^n_n$ are said to be idempotent. We show that $\mathcal{F}^n_1=\cdots =\mathcal{F}^n_{n-2}\subseteq\mathcal{F}^n_{n-1}\subseteq\mathcal{F}^n_n$ and we give conditions on the set $X$ for the last inclusions to be strict. The class $\mathcal{F}^n_1$ was recently characterized by Couceiro and Devillet \cite{CouDev}, who showed that its elements are reducible to binary associative operations. However, some elements of $\mathcal{F}^n_n$ are not reducible. In this paper, we characterize the class $\mathcal{F}^n_{n-1}\setminus\mathcal{F}^n_1$ and show that its elements are reducible. We give a full description of the corresponding reductions and show how each of them is built from a quasitrivial semigroup and an Abelian group whose exponent divides $n-1$. [less ▲]

Detailed reference viewed: 201 (41 UL)
Full Text
Peer Reviewed
See detailAn integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm
Y. Enoch, Simon; Rodrigues de Mendonça Neto, Júlio UL; B. Hong, Jin et al

in Computer Networks (2022)

The dynamicity of today’s networks has created uncertainties for security administrators about the defense options to deploy. In this paper, we consider the administrator’s challenge of selecting and ... [more ▼]

The dynamicity of today’s networks has created uncertainties for security administrators about the defense options to deploy. In this paper, we consider the administrator’s challenge of selecting and deploying the best set of heterogeneous security hardening solutions for dynamic networks given multiple constraints (such as fixed budget, availability of hardening measures, performance degradation, non-patchable vulnerabilities, etc). The current state of the art does not focus on the dynamic characteristic of modern networks, where the effectiveness of defenses is affected by changes in the networks. Hence, we approach this challenge by developing an integrated method to effectively compute optimal defense solutions for dynamic networks given multiple objectives and constraints. The proposed approach works in the following five phases: (1) input/data collection, (2) model construction (using temporal-graph-based security model and Generalized Stochastic Petri Nets), (3) defense evaluator (based on security metrics), (4) Pareto optimal set evaluator (using Non dominated Sorting Genetic Algorithm), and (5) optimal solution evaluator (based on Weighted Sum Model). To demonstrate the feasibility of the proposed approach, we use a real-world case study while taking into account both the vulnerabilities that are patchable and non-patchable. We investigated the sensitivity of the model parameters based on the dynamic network, and the result showed a good result for values from 0.1–0.4 for the mutation probability while the crossover did not change for all the values. Furthermore, we compared the dynamic network optimization results to a static network and the evaluation shows that our proposed approach could aid a security administrator in selecting the best defense options to deploy for modern networks that are dynamic, with at least 75% and 62.50% of the defense Pareto points appearing in consecutive and in all network states, respectively. Moreover, it also provides an insight into the benefit of each defense option before the deployment. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailThe “OpenLux revelations”: Who is to be blamed?
Pantazatou, Aikaterini UL

in Cahiers de fiscalité luxembourgeoise et européenne (2022), 1(1),

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailIntelligent Reflecting Surface-assisted MU-MISOSystems with Imperfect Hardware: ChannelEstimation and Beamforming Design
Papazafeiropoulos, Anastasios; Pan, Cunhua; Kourtessis, Pandelis et al

in IEEE Transactions on Wireless Communications (2022), 21(3), 2077-2092

Intelligent reflecting surface (IRS), consisting of low-cost passive elements, is a promising technology for improvingthe spectral and energy efficiency of the fifth-generation (5G)and beyond networks. It ... [more ▼]

Intelligent reflecting surface (IRS), consisting of low-cost passive elements, is a promising technology for improvingthe spectral and energy efficiency of the fifth-generation (5G)and beyond networks. It is also noteworthy that an IRS canshape the reflected signal propagation. Most works in IRS-assisted systems have ignored the impact of the inevitable residualhardware impairments (HWIs) at both the transceiver hardwareand the IRS while any relevant works have addressed only simplescenarios, e.g., with single-antenna network nodes and/or withouttaking the randomness of phase noise at the IRS into account.In this work, we aim at filling up this gap by considering ageneral IRS-assisted multi-user (MU) multiple-input single-output(MISO) system with imperfect channel state information (CSI)and correlated Rayleigh fading. In parallel, we present a generalcomputationally efficient methodology for IRS reflect beamforming(RB) optimization. Specifically, we introduce an advantageouschannel estimation (CE) method for such systems accounting forthe HWIs. Moreover, we derive the uplink achievable spectralefficiency (SE) with maximal-ratio combining (MRC) receiver,displaying three significant advantages being: 1) its closed-formexpression, 2) its dependence only on large-scale statistics, and3) its low training overhead. Notably, by exploiting the first twobenefits, we achieve to perform optimization with respect to thethat can take place only at every several coherence intervals,and thus, reduces significantly the computational cost comparedto other methods which require frequent phase optimization.Among the insightful observations, we highlight that uncorrelatedRayleigh fading does not allow optimization of the SE, whichmakes the application of an IRS ineffective. Also, in the case thatthe phase drifts, describing the distortion of the phases in theRBM, are uniformly distributed, the presence of an IRS providesno advantage. The analytical results outperform previous worksand are verified by Monte-Carlo (MC) simulations. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailLe droit à la sauce piquante n°26 - Mars 2022
Hiez, David UL; Laurent, Rémi

in Le droit à la sauce piquante (2022), 26

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailStillborn Banking Union: Explaining Ineffective European Union Bank Resolution Rules
Howarth, David UL; Asimakopoulos, Ioannis

in Journal of Common Market Studies (2022), 60(2), 264-282

Our contribution demonstrates and explains the ineffectiveness of European Union (EU) bank resolution rules, a core element of Banking Union. This inadequacy owes in large part to the limited access to ... [more ▼]

Our contribution demonstrates and explains the ineffectiveness of European Union (EU) bank resolution rules, a core element of Banking Union. This inadequacy owes in large part to the limited access to and insufficient availability of EU resolution funds and inadequate national deposit guarantee schemes in most EU member states, in conjunction with the relatively high minimum requirements for own funds and eligible liabilities (MREL) for many EU banks. In many cases, these requirements are unlikely ever to be met – particularly for retail banks most likely to require resolution in the euro periphery. We offer a liberal intergovernmentalist analysis to explain the inadequacy of the EU resolution regime by examining German and French government preferences on EU rules on bank capital requirements agreed earlier in 2013 and national deposit guarantee schemes agreed in 2014. These government preferences were shaped significantly by the preferences of national banks and bank associations. [less ▲]

Detailed reference viewed: 180 (17 UL)
Full Text
Peer Reviewed
See detail"Relever l’esprit public en province". Convergences polémiques entre George Sand et Claude Tillier
Saintes, Laetitia UL

in Romantisme (2022), 1/2022

Premier texte ouvertement politique de George Sand, Fanchette, lettre de Blaise Bonnin à Claude Germain paraît en 1843 dans La Revue indépendante, publication qu’elle a cofondée avec Louis Viardot et ... [more ▼]

Premier texte ouvertement politique de George Sand, Fanchette, lettre de Blaise Bonnin à Claude Germain paraît en 1843 dans La Revue indépendante, publication qu’elle a cofondée avec Louis Viardot et Pierre Leroux. Or la brochure a peiné à trouver preneur : la frilosité des imprimeurs locaux, jointe à l’hostilité du ministériel Journal de l’Indre, achèvent de convaincre Sand de fonder un périodique répondant au « besoin de relever l’esprit public en province, et de le mettre sur un pied, non de rivalité, mais d’égalité avec celui de la métropole ». Ce sera L’Éclaireur de l’Indre, journal des départements de l’Indre, du Cher et de la Creuse, lancé en septembre 1844. Envisageant les « petites villes » comme des « antres de corruption, où l’intimidation assure l’impunité au vice et au crime tout autant qu’à Paris le mystère », Sand développe dans les écrits polémiques qu’elle publie dès lors et jusqu’à 1851 un propos proche, sur le plan thématique comme sur le plan rhétorique, de celui de Claude Tillier, pamphlétaire du Nivernais voisin qu’elle cite parfois textuellement. Cofondateur en 1831 de L’Indépendant de Clamecy, périodique républicain, Tillier a rejoint en 1841 les rangs de L’Association, journal de la Nièvre, feuille d’opposition dont il devient bientôt l’un des principaux rédacteurs. Ayant lui aussi à lutter contre la presse ministérielle – dont L’Écho de la Nièvre, organe de la préfecture – et contre l’hostilité affichée des notables locaux, peinant de ce fait à trouver un imprimeur acceptant de publier ses pamphlets, Tillier, républicain revendiqué, n’en défend pas moins dans ce journal comme dans ses pamphlets un propos progressiste où l’idée de justice sociale occupe une place centrale, à l’opposé du libéralisme économique et social débridé qui caractérise la monarchie de Juillet. Le geste polémique de Tillier comme celui de Sand donnent à penser sur la possibilité d’une parole polémique et plus avant sur ses modalités sous le régime de Juillet. Les deux écrivains affrontent, en effet, des réalités différentes. Alors que Tillier, relativement méconnu hors du Nivernais, cherche à faire connaître son œuvre dans la capitale, Sand, écrivaine déjà fameuse, doit pour sa part affronter l’esprit du temps, hostile aux incursions des femmes en terre polémique. Cela conditionne fortement la forme que prennent leurs paroles polémiques respectives, depuis leur support (de l’article de journal à la brochure) jusqu’aux modalités rhétoriques et esthétiques. Aussi cette contribution entend-elle éclairer un aspect méconnu de l’œuvre de Sand et faire redécouvrir celle de Tillier en les étudiant sous divers angles ; on envisagera d’abord les supports de leur propos polémique avant de se pencher sur les thématiques qui leur sont communes. On établira ensuite l’horizon idéologique présidant à ces productions destinées à « relever l’esprit public en province » en y défendant les idées républicaines et socialistes, avant d’étudier les modalités rhétoriques de ces deux œuvres polémiques représentatives de l’esprit du temps. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailEditorial - Le plan d'action de la Commission pour l'économie sociale : un cadre pour avancer ?
Corbisier, Isabelle UL

in tijdschrift voor rechtspersoon en vennootschap - revue pratique des sociétés (2022), (2), 65-66

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailDynamic Bandwidth Allocation and Precoding Design for Highly-Loaded Multiuser MISO in Beyond 5G Networks
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in IEEE Transactions on Wireless Communications (2022), 21(3), 1794-1805

Multiuser techniques play a central role in the fifth-generation (5G) and beyond 5G (B5G) wireless networks that exploit spatial diversity to serve multiple users simultaneously in the same frequency ... [more ▼]

Multiuser techniques play a central role in the fifth-generation (5G) and beyond 5G (B5G) wireless networks that exploit spatial diversity to serve multiple users simultaneously in the same frequency resource. It is well known that a multi-antenna base station (BS) can efficiently serve a number of users not exceeding the number of antennas at the BS via precoding design. However, when there are more users than the number of antennas at the BS, conventional precoding design methods perform poorly because inter-user interference cannot be efficiently eliminated. In this paper, we investigate the performance of a highly-loaded multiuser system in which a BS simultaneously serves a number of users that is larger than the number of antennas. We propose a dynamic bandwidth allocation and precoding design framework and apply it to two important problems in multiuser systems: i) User fairness maximization and ii) Transmit power minimization, both subject to predefined quality of service (QoS) requirements. The premise of the proposed framework is to dynamically assign orthogonal frequency channels to different user groups and carefully design the precoding vectors within every user group. Since the formulated problems are non-convex, we propose two iterative algorithms based on successive convex approximations (SCA), whose convergence is theoretically guaranteed. Furthermore, we propose a low-complexity user grouping policy based on the singular value decomposition (SVD) to further improve the system performance. Finally, we demonstrate via numerical results that the proposed framework significantly outperforms existing designs in the literature. [less ▲]

Detailed reference viewed: 57 (8 UL)
Full Text
Peer Reviewed
See detailIntegrating Macroeconomics into the EU Single Legal Order: The Role of Financial Stability in Post-Crisis Europe
Tuori, Klaus UL; Losada, Fernando

in European Papers (2022), Vol. 6(3 /2021), 1367-1396

This article follows the trajectory of the EU legal order, from its inception to its current stage, by focusing on the transformations it has experienced resulting from its increasing interaction with ... [more ▼]

This article follows the trajectory of the EU legal order, from its inception to its current stage, by focusing on the transformations it has experienced resulting from its increasing interaction with macroeconomics. When the Court of Justice declared that a new legal order resulted from the provisions of the Treaty of Rome, its interpretation stemmed from a coherent understanding of the institutional form (indirect administration) and substantive content (microeconomic integra-tion) of European integration. The addition of the macroeconomic layer of integration, with its own institutional form (integrated administration and open method of coordination) but still broadly subject to the same legal order, resulted into a less consistent whole. The crises the Union faced during the last decade tested the resistance of these structures and, although the Court has been consistently interpreting EU law according to the same procedures and tech-niques without radical deviations, the irruption of financial stability as macroeconomic impera-tive has rearranged the equilibrium in integration. Now we can argue that institutional form, substantive content and legal order of European integration are again realigned, but instead of resulting from the provisions of the Treaties and from placing the legal rationality of law at the core of the system, financial stability is the rationale coherently arranging them together. The consequences of this rearrangement for the EU legal order are the object of study of this spe-cial issue. [less ▲]

Detailed reference viewed: 13 (2 UL)
Full Text
Peer Reviewed
See detailOn Reliable Key Performance Indicators in Cognitive Radio Networks
Khan, Abd Ullah; Abbas, Ghulam; Abbas, Ziaul Haq et al

in IEEE Networking Letters (2022)

Network serveability (NS), which considers both channel availability (CA) and service retainability (SR), is a key indicator to concisely express the performance of cognitive radio networks (CRNs ... [more ▼]

Network serveability (NS), which considers both channel availability (CA) and service retainability (SR), is a key indicator to concisely express the performance of cognitive radio networks (CRNs). However, CA cannot guarantee connection setup if receiver’s accessibility ( RxA ) is neglected. Likewise, SR yields imperfect results if RxA is ignored. As such, the two rather incomplete performance indicators misrepresent NS and lead to an overestimated satisfaction level of users. Aiming at reliable and concise analysis of CRNs’ performance, this letter introduces the concept of connection availability (CoA), which encompasses both CA and RxA for a user. Besides, it introduces service maintainability (SM), which incorporates the impact of RxA into SR. Consequently, the performance is represented more concisely through network serviceability (NeS), a concept we introduce to consider both CA and SM. We show that CoA, SM, and NeS diverge with various proportions from CA, SR, and NS, respectively, under variable traffic loads and channel failure rates. This indicates the degree of performance difference RxA introduces, and provides network designers the basis for dependable CRN budgeting. [less ▲]

Full Text
Peer Reviewed
See detailEvaluation of the wound healing properties of South African medicinal plants using zebrafish and in vitro bioassays
Mhlongo, Fikile; Cordero Maldonado, Maria Lorena UL; Crawford, Alexander UL et al

in Journal of Ethnopharmacology (2022), 286

Ethnopharmacological relevance In South Africa, medicinal plants have a history of traditional use, with many species used for treating wounds. The scientific basis of such uses remains largely unexplored ... [more ▼]

Ethnopharmacological relevance In South Africa, medicinal plants have a history of traditional use, with many species used for treating wounds. The scientific basis of such uses remains largely unexplored. Aim of the study To screen South African plants used ethnomedicinally for wound healing based on their pro-angiogenic and wound healing activity, using transgenic zebrafish larvae and cell culture assays. [less ▲]

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailRefracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization
Lin, Zhi; Niu, Hehao; An, Kang et al

in IEEE Transactions on Aerospace and Electronic Systems (2022)

Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by ... [more ▼]

Reconfigurable intelligent surface (RIS) has been viewed as a promising solution in constructing reconfigurable radio environment of the propagation channel and boosting the received signal power by smartly coordinating the passive elements’ phase shifts at the RIS. Inspired by this emerging technique, this article focuses on joint beamforming design and optimization for RIS-aided hybrid satellite-terrestrial relay networks, where the links from the satellite and base station (BS) to multiple users are blocked. Specifically, a refracting RIS cooperates with a BS, where the latter operates as a half-duplex decode-and-forward relay, in order to strengthen the desired satellite signals at the blocked users. Considering the limited onboard power resource, the design objective is to minimize the total transmit power of both the satellite and BS while guaranteeing the rate requirements of users. Since the optimized beamforming weight vectors at the satellite and BS, and phase shifters at the RIS are coupled, leading to a mathematically intractable optimization problem, we propose an alternating optimization scheme by utilizing singular value decomposition and uplink–downlink duality to optimize beamforming weight vectors, and using Taylor expansion and penalty function methods to optimize phase shifters iteratively. Finally, simulation results are provided to verify the superiority of the proposed scheme compared to the benchmark schemes [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailPanorama de droit de la consommation 2021
Poillot, Elise UL; Aubry, Hélène; Sauphanoir-Brouillaud, Natacha

in Recueil Dalloz (2022)

Full Text
Peer Reviewed
See detailModal characterisation of simulation relations in probabilistic concurrent games
Zhang, Chenyi; Pang, Jun UL

in Science of Computer Programming (2022), 215

Detailed reference viewed: 31 (1 UL)
Full Text
Peer Reviewed
See detailFreins et perspectives d’une union budgétaire européenne
Allemand, Frederic UL; Creel, Jérôme

in Revue des juristes de SciencesPo (2022), 22

Detailed reference viewed: 21 (5 UL)
Full Text
Peer Reviewed
See detailUAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization
Tran Dinh, Hieu UL; Nguyen, van Dinh UL; Chatzinotas, Symeon UL et al

in IEEE Transactions on Wireless Communications (2022), 21(3), 1621-1637

Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of ... [more ▼]

Unmanned aerial vehicle (UAV) communication hasemerged as a prominent technology for emergency communi-cations (e.g., natural disaster) in the Internet of Things (IoT)networks to enhance the ability of disaster prediction, damageassessment, and rescue operations promptly. A UAV can bedeployed as a flying base station (BS) to collect data from time-constrained IoT devices and then transfer it to a ground gateway(GW). In general, the latency constraint at IoT devices and UAV’slimited storage capacity highly hinder practical applicationsof UAV-assisted IoT networks. In this paper, full-duplex (FD)radio is adopted at the UAV to overcome these challenges. Inaddition, half-duplex (HD) scheme for UAV-based relaying isalso considered to provide a comparative study between twomodes (viz., FD and HD). Herein, a device is considered tobe successfully served iff its data is collected by the UAV andconveyed to GW timely during flight time. In this context,we aim to maximize the number of served IoT devices byjointly optimizing bandwidth, power allocation, and the UAVtrajectory while satisfying each device’s requirement and theUAV’s limited storage capacity. The formulated optimizationproblem is troublesome to solve due to its non-convexity andcombinatorial nature. Towards appealing applications, we firstrelax binary variables into continuous ones and transform theoriginal problem into a more computationally tractable form.By leveraging inner approximation framework, we derive newlyapproximated functions for non-convex parts and then develop asimple yet efficient iterative algorithm for its solutions. Next,we attempt to maximize the total throughput subject to thenumber of served IoT devices. Finally, numerical results showthat the proposed algorithms significantly outperform benchmarkapproaches in terms of the number of served IoT devices andsystem throughput. [less ▲]

Detailed reference viewed: 95 (25 UL)
Full Text
Peer Reviewed
See detailComplex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment
Distler, Verena UL; Gutfleisch, Tamara; Lallemand, Carine UL et al

in Computers in Human Behavior Reports (2022), 4

An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away. This paper ... [more ▼]

An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away. This paper addresses this question using a mixed-methods approach, focusing on encryption as a mechanism for confidentiality during data transmission on a smartphone application. In study 1, we conducted a qualitative co-creation study with security and Human-Computer Interaction (HCI) experts (N = 9) to create appropriate textual and visual representations of the security mechanism encryption in data transmission. We investigated this question in two contexts: online banking and e-voting. In study 2, we put these ideas to the test by presenting these visual and textual representations to non-expert users in an online vignette experiment (N = 2180). We found a statistically significant and positive effect of the textual representation of encryption on perceived security and understanding, but not on user experience (UX). More complex text describing encryption resulted in higher perceived security and more accurate understanding. The visual representation of encryption had no statistically significant effect on perceived security, UX or understanding. Our study contributes to the larger discussion regarding visible instances of security and their impact on user perceptions. [less ▲]

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailThe Law of the Economic and Monetary Union: Complementing, Adapting or Transforming the EU Legal Order?
Tuori, Klaus UL; Losada, Fernando

in European Papers - A Journal on Law and Integration (2022), Vol. 6(3), 1367-1521

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailUnifying Quantum and Classical Speed Limits on Observables
García-Pintos, Luis Pedro; Nicholson, Schuyler B.; Green, Jason R. et al

in Physical Review X (2022)

The presence of noise or the interaction with an environment can radically change the dynamics of observables of an otherwise isolated quantum system. We derive a bound on the speed with which observables ... [more ▼]

The presence of noise or the interaction with an environment can radically change the dynamics of observables of an otherwise isolated quantum system. We derive a bound on the speed with which observables of open quantum systems evolve. This speed limit is divided into Mandelstam and Tamm’s original time-energy uncertainty relation and a time-information uncertainty relation recently derived for classical systems, and both are generalized to open quantum systems. By isolating the coherent and incoherent contributions to the system dynamics, we derive both lower and upper bounds on the speed of evolution.We prove that the latter provide tighter limits on the speed of observables than previously known quantum speed limits and that a preferred basis of speed operators serves to completely characterize the observables that saturate the speed limits. We use this construction to bound the effect of incoherent dynamics on the evolution of an observable and to find the Hamiltonian that gives the maximum coherent speedup to the evolution of an observable. [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailPreventing active re-identification attacks on social graphs via sybil subgraph obfuscation
Mauw, Sjouke UL; Ramirez Cruz, Yunior UL; Trujillo Rasua, Rolando UL

in Knowledge and Information Systems (2022), 64

Active re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to ... [more ▼]

Active re-identification attacks constitute a serious threat to privacy-preserving social graph publication, because of the ability of active adversaries to leverage fake accounts, a.k.a. sybil nodes, to enforce structural patterns that can be used to re-identify their victims on anonymised graphs. Several formal privacy properties have been enunciated with the purpose of characterising the resistance of a graph against active attacks. However, anonymisation methods devised on the basis of these properties have so far been able to address only restricted special cases, where the adversaries are assumed to leverage a very small number of sybil nodes. In this paper, we present a new probabilistic interpretation of active re-identification attacks on social graphs. Unlike the aforementioned privacy properties, which model the protection from active adversaries as the task of making victim nodes indistinguishable in terms of their fingerprints with respect to all potential attackers, our new formulation introduces a more complete view, where the attack is countered by jointly preventing the attacker from retrieving the set of sybil nodes, and from using these sybil nodes for re-identifying the victims. Under the new formulation, we show that k-symmetry, a privacy property introduced in the context of passive attacks, provides a sufficient condition for the protection against active re-identification attacks leveraging an arbitrary number of sybil nodes. Moreover, we show that the algorithm K-Match, originally devised for efficiently enforcing the related notion of k-automorphism, also guarantees k-symmetry. Empirical results on real-life and synthetic graphs demonstrate that our formulation allows, for the first time, to publish anonymised social graphs (with formal privacy guarantees) that effectively resist the strongest active re-identification attack reported in the literature, even when it leverages a large number of sybil nodes. [less ▲]

Full Text
Peer Reviewed
See detailAdditive Effect of Dopaminergic Medication on Gait Under Single and Dual-Tasking Is Greater Than of Deep Brain Stimulation in Advanced Parkinson Disease With Long-duration Deep Brain Stimulation.
Langer, Agnes; Lucke-Paulig, Lara; Gassner, Lucia et al

in Neuromodulation : journal of the International Neuromodulation Society (2022)

INTRODUCTION: Patients with advanced Parkinson disease (PD) often experience problems with mobility, including walking under single- (ST) and dual-tasking (DT) conditions. The effects of deep brain ... [more ▼]

INTRODUCTION: Patients with advanced Parkinson disease (PD) often experience problems with mobility, including walking under single- (ST) and dual-tasking (DT) conditions. The effects of deep brain stimulation in the subthalamic nucleus (DBS) versus dopaminergic medication (Med) on these conditions are not well investigated. MATERIALS AND METHODS: We used two ST and two DT-gait paradigms to evaluate the effect of DBS and dopaminergic medication on gait parameters in 14 PD patients (mean age 66 ± 8 years) under DBS(OFF)/Med(ON), DBS(ON)/Med(OFF), and DBS(ON)/Med(ON) conditions. They performed standardized 20-meter walks with convenient and fast speed. To test DT capabilities, they performed a checking-boxes and a subtraction task during fast-paced walking. Quantitative gait analysis was performed using a tri-axial accelerometer (Dynaport, McRoberts, The Netherlands). Dual-task costs (DTC) of gait parameters and secondary task performance were compared intraindividually between DBS(OFF)/Med(ON) vs DBS(ON)/Med(ON), and DBS(ON)/Med(OFF) vs DBS(ON)/Med(ON) to estimate responsiveness. RESULTS: Dopaminergic medication increased gait speed and cadence at convenient speed. It increased cadence and decreased number of steps at fast speed, and improved DTC of cadence during the checking boxes and DTC of cadence and number of steps during the subtraction tasks. DBS only improved DTC of cadence during the checking boxes and DTC of gait speed during the subtraction task. CONCLUSION: Dopaminergic medication showed larger additional effects on temporal gait parameters under ST and DT conditions in advanced PD than DBS. These results, after confirmation in independent studies, should be considered in the medical management of advanced PD patients with gait and DT deficits. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailAn Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification
Arenas Correa, Monica Patricia UL; Demirci, Huseyin UL; Lenzini, Gabriele UL

in Machine Learning and Knowledge Extraction (2022), 4(1), 222-239

Arrays of Cholesteric Spherical Reflectors (CSRs), microscopic cholesteric liquid crystals in a spherical shape, have been argued to become a game-changing technology in anti-counterfeiting. Used to build ... [more ▼]

Arrays of Cholesteric Spherical Reflectors (CSRs), microscopic cholesteric liquid crystals in a spherical shape, have been argued to become a game-changing technology in anti-counterfeiting. Used to build identifiable tags or coating, called CSR IDs, they can supply objects with unclonable fingerprint-like characteristics, making it possible to authenticate objects. In a previous study, we have shown how to extract minutiæ from CSR IDs. In this journal version, we build on that previous research, consolidate the methodology, and test it over CSR IDs obtained by different production processes. We measure the robustness and reliability of our procedure on large and variegate sets of CSR IDs’ images taken with a professional microscope (Laboratory Data set) and with a microscope that could be used in a realistic scenario (Realistic Data set). We measure intra-distance and interdistance, proving that we can distinguish images coming from the same CSR ID from images of different CSR IDs. However, without surprise, images in Laboratory Data set have an intra-distance that on average is less, and with less variance, than the intra-distance between responses from Realistic Data set. With this evidence, we discuss a few requirements for an anti-counterfeiting technology based on CSRs. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailA Hybrid Approach to Optimal TOA-Sensor Placement With Fixed Shared Sensors for Simultaneous Multi-Target Localization
Xu, Sheng; Wu, Linlong UL; Doğançay, Kutluyıl et al

in IEEE Transactions on Signal Processing (2022)

This paper focuses on optimal time-of-arrival (TOA) sensor placement for multiple target localization simultaneously. In previous work, different solutions only using non-shared sensors to localize ... [more ▼]

This paper focuses on optimal time-of-arrival (TOA) sensor placement for multiple target localization simultaneously. In previous work, different solutions only using non-shared sensors to localize multiple targets have been developed. Those methods localize different targets one-by-one or use a large number of mobile sensors with many limitations, such as low effectiveness and high network complexity. In this paper, firstly, a novel optimization model for multi-target localization incorporating shared sensors is formulated. Secondly, the systematic theoretical results of the optimal sensor placement are derived and concluded using the A-optimality criterion, i.e., minimizing the trace of the inverse Fisher information matrix (FIM), based on rigorous geometrical derivations. The reachable optimal trace of Cramér-Rao lower bound (CRLB) is also derived. It can provide optimal conditions for many cases and even closed form solutions for some special cases. Thirdly, a novel numerical optimization algorithm to quickly find and calculate the (sub-)optimal placement and achievable lower bound is explored, when the model becomes complicated with more practical constraints. Then, a hybrid method for solving the most general situation, integrating both the analytical and numerical solutions, is proposed. Finally, the correctness and effectiveness of the proposed theoretical and mathematical methods are demonstrated by several simulation examples. [less ▲]

Full Text
Peer Reviewed
See detailInverse deformation analysis: an experimental and numerical assessment using the FEniCS Project
Mazier, Arnaud UL; Bilger, Alexandre; Forte, Antonio E. et al

in Engineering with Computers (2022)

In this paper, we develop a framework for solving inverse deformation problems using the FEniCS Project finite-element software. We validate our approach with experimental imaging data acquired from a ... [more ▼]

In this paper, we develop a framework for solving inverse deformation problems using the FEniCS Project finite-element software. We validate our approach with experimental imaging data acquired from a soft silicone beam under gravity. In contrast with inverse iterative algorithms that require multiple solutions of a standard elasticity problem, the proposed method can compute the undeformed configuration by solving only one modified elasticity problem. This modified problem has a complexity comparable to the standard one. The framework is implemented within an open-source pipeline enabling the direct and inverse deformation simulation directly from imaging data. We use the high-level unified form language (UFL) of the FEniCS Project to express the finite-element model in variational form and to automatically derive the consistent Jacobian. Consequently, the design of the pipeline is flexible: for example, it allows the modification of the constitutive models by changing a single line of code. We include a complete working example showing the inverse deformation of a beam deformed by gravity as supplementary material. [less ▲]

Detailed reference viewed: 226 (33 UL)
Full Text
Peer Reviewed
See detailHPV-related quality of life in diagnosed women: A longitudinal study
Santos, B Daiana; Moreira, Celia S; Teixeira Santos, Ana Carolina UL et al

in Journal of Health Psychology (2022)

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailTheoretical Considerations about Energy Transition in Luxembourg
Arababadi, Ali; Leyer, Stephan UL; Hansen, Joachim UL et al

in Environmental Sciences Proceedings (2022)

The energy transition is a certain phenomenon in the future which as of yet has no agreed definition. It involves a shift in the dominant ‘rules of the game’—a transformation of established technologies ... [more ▼]

The energy transition is a certain phenomenon in the future which as of yet has no agreed definition. It involves a shift in the dominant ‘rules of the game’—a transformation of established technologies and societal practices and movement from one dynamic equilibrium to another, typically stretching over several generations. The study aims to explore some salient features of this transition that Luxembourg will face using a theoretical approach. The study was limited to the transportation sector, residential sector, and public dimension. it has been shown how the availability of different contextual factors in Luxembourg will raise the need for new pathways to move towards this transition. The alternative pathways have been argued, to [less ▲]

Detailed reference viewed: 35 (7 UL)
Full Text
Peer Reviewed
See detailStochastic Hydrodynamics of Complex Fluids: Discretisation and Entropy Production
Cates, Michael E.; Fodor, Etienne UL; Markovich, Tomer et al

in Entropy (2022)

Many complex fluids can be described by continuum hydrodynamic field equations, to which noise must be added in order to capture thermal fluctuations. In almost all cases, the resulting coarse-grained ... [more ▼]

Many complex fluids can be described by continuum hydrodynamic field equations, to which noise must be added in order to capture thermal fluctuations. In almost all cases, the resulting coarse-grained stochastic partial differential equations carry a short-scale cutoff, which is also reflected in numerical discretisation schemes. We draw together our recent findings concerning the construction of such schemes and the interpretation of their continuum limits, focusing, for simplicity, on models with a purely diffusive scalar field, such as ‘Model B’ which describes phase separation in binary fluid mixtures. We address the requirement that the steady-state entropy production rate (EPR) must vanish for any stochastic hydrodynamic model in a thermal equilibrium. Only if this is achieved can the given discretisation scheme be relied upon to correctly calculate the nonvanishing EPR for ‘active field theories’ in which new terms are deliberately added to the fluctuating hydrodynamic equations that break detailed balance. To compute the correct probabilities of forward and time-reversed paths (whose ratio determines the EPR), we must make a careful treatment of so-called ‘spurious drift’ and other closely related terms that depend on the discretisation scheme. We show that such subtleties can arise not only in the temporal discretisation (as is well documented for stochastic ODEs with multiplicative noise) but also from spatial discretisation, even when noise is additive, as most active field theories assume. We then review how such noise can become multiplicative via off-diagonal couplings to additional fields that thermodynamically encode the underlying chemical processes responsible for activity. In this case, the spurious drift terms need careful accounting, not just to evaluate correctly the EPR but also to numerically implement the Langevin dynamics itself. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailComing Together of Bayesian Inference and Skew Spherical Data
Ley, Christophe UL; Nakhaei Rad, Najmeh; Bekker, Andriette et al

in Frontiers in Big Data (2022)

This paper presents Bayesian directional data modeling via the skew-rotationally-symmetric Fisher-von Mises-Langevin (FvML) distribution. The prior distributions for the parameters are a pivotal building ... [more ▼]

This paper presents Bayesian directional data modeling via the skew-rotationally-symmetric Fisher-von Mises-Langevin (FvML) distribution. The prior distributions for the parameters are a pivotal building block in Bayesian analysis, therefore, the impact of the proposed priors will be quantified using the Wasserstein Impact Measure (WIM) to guide the practitioner in the implementation process. For the computation of the posterior, modifications of Gibbs and slice samplings are applied for generating samples. We demonstrate the applicability of our contribution via synthetic and real data analyses. Our investigation paves the way for Bayesian analysis of skew circular and spherical data. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailUltrafast multidimensional spectroscopy with field resolution and noncollinear geometry at mid-infrared frequencies
Deckert, Thomas UL; Allerbeck, Jonas; Kurihara, Takayuki et al

in New Journal of Physics (2022)

Energetic correlations and their dynamics govern the fundamental properties of condensed matter materials. Ultrafast multidimensional spectroscopy in the mid infrared is an advanced technique to study ... [more ▼]

Energetic correlations and their dynamics govern the fundamental properties of condensed matter materials. Ultrafast multidimensional spectroscopy in the mid infrared is an advanced technique to study such coherent low-energy dynamics. The intrinsic many-body phenomena in functional solid-state materials, in particular few-layer samples, remain widely unexplored to this date, because complex and weak sample responses demand versatile and sensitive detection. Here, we present a novel setup for ultrafast multidimensional spectroscopy with noncollinear geometry and complete field resolution in the 15–40 THz range. Electric fields up to few-100 kV cm−1 drive coherent dynamics in a perturbative regime, and an advanced modulation scheme allows to detect nonlinear signals down to a few tens of V cm−1 entirely background-free with high sensitivity and full control over the geometric phase-matching conditions. Our system aims at the investigation of correlations and many-body interactions in condensed matter systems at low energy. Benchmark measurements on bulk indium antimonide reveal a strong six-wave mixing signal and map ultra- fast changes of the band structure with access to amplitude and phase information. Our results pave the way towards the investigation of functional thin film materials and few-layer samples. [less ▲]

Detailed reference viewed: 68 (4 UL)
Full Text
Peer Reviewed
See detailGCN5 maintains muscle integrity by acetylating YY1 to promote dystrophin expression
Addicks, Gregory; Zhang, Hongbo; Ryu, Dongryeol et al

in Journal of Cell Biology (2022), 221(2),

Detailed reference viewed: 14 (0 UL)
Full Text
See detailLes falsificateurs de l'histoire:L'ADR et le "Klëppelkrich"
Scuto, Denis UL

in Tageblatt (2022)

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailAutomatic Generation of Acceptance Test Cases from Use Case Specifications: an NLP-based Approach
Wang, Chunhui UL; Pastore, Fabrizio UL; Göknil, Arda UL et al

in IEEE Transactions on Software Engineering (2022), 48(2), 585-616

Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect to their functional requirements. In safety critical systems, it plays a crucial role since ... [more ▼]

Acceptance testing is a validation activity performed to ensure the conformance of software systems with respect to their functional requirements. In safety critical systems, it plays a crucial role since it is enforced by software standards, which mandate that each requirement be validated by such testing in a clearly traceable manner. Test engineers need to identify all the representative test execution scenarios from requirements, determine the runtime conditions that trigger these scenarios, and finally provide the input data that satisfy these conditions. Given that requirements specifications are typically large and often provided in natural language (e.g., use case specifications), the generation of acceptance test cases tends to be expensive and error-prone. In this paper, we present Use Case Modeling for System-level, Acceptance Tests Generation (UMTG), an approach that supports the generation of executable, system-level, acceptance test cases from requirements specifications in natural language, with the goal of reducing the manual effort required to generate test cases and ensuring requirements coverage. More specifically, UMTG automates the generation of acceptance test cases based on use case specifications and a domain model for the system under test, which are commonly produced in many development environments. Unlike existing approaches, it does not impose strong restrictions on the expressiveness of use case specifications. We rely on recent advances in natural language processing to automatically identify test scenarios and to generate formal constraints that capture conditions triggering the execution of the scenarios, thus enabling the generation of test data. In two industrial case studies, UMTG automatically and correctly translated 95% of the use case specification steps into formal constraints required for test data generation; furthermore, it generated test cases that exercise not only all the test scenarios manually implemented by experts, but also some critical scenarios not previously considered. [less ▲]

Detailed reference viewed: 207 (32 UL)
Full Text
Peer Reviewed
See detailTkT: Automatic Inference of Timed and Extended Pushdown Automata
Pastore, Fabrizio UL; Micucci, Daniela; Guzman, Michell et al

in IEEE Transactions on Software Engineering (2022), 48(2), 617-636

To mitigate the cost of manually producing and maintaining models capturing software specifications, specification mining techniques can be exploited to automatically derive up-to-date models that ... [more ▼]

To mitigate the cost of manually producing and maintaining models capturing software specifications, specification mining techniques can be exploited to automatically derive up-to-date models that faithfully represent the behavior of software systems. So far, specification mining solutions focused on extracting information about the functional behavior of the system, especially in the form of models that represent the ordering of the operations. Well-known examples are finite state models capturing the usage protocol of software interfaces and temporal rules specifying relations among system events. Although the functional behavior of a software system is a primary aspect of concern, there are several other non-functional characteristics that must be typically addressed jointly with the functional behavior of a software system. Efficiency is one of the most relevant characteristics. In fact, an application delivering the right functionalities inefficiently has a big chance to not satisfy the expectation of its users. Interestingly, the timing behavior is strongly dependent on the functional behavior of a software system. For instance, the timing of an operation depends on the functional complexity and size of the computation that is performed. Consequently, models that combine the functional and timing behaviors, as well as their dependencies, are extremely important to precisely reason on the behavior of software systems. In this paper, we address the challenge of generating models that capture both the functional and timing behavior of a software system from execution traces. The result is the Timed k-Tail (TkT) specification mining technique, which can mine finite state models that capture such an interplay: the functional behavior is represented by the possible order of the events accepted by the transitions, while the timing behavior is represented through clocks and clock constraints of different nature associated with transitions. Our empirical evaluation with several libraries and applications show that TkT can generate accurate models, capable of supporting the identification of timing anomalies due to overloaded environment and performance faults. Furthermore, our study shows that TkT outperforms state-of-the-art techniques in terms of scalability and accuracy of the mined models. [less ▲]

Detailed reference viewed: 117 (13 UL)
Full Text
Peer Reviewed
See detailThe mouse metallomic landscape of aging and metabolism
Morel, Jean-David; Sauzéat, Lucie; Goeminne, Ludger et al

in Nature Communications (2022), 13(607),

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailStochastic Geometry-Based Analysis of Cache-Enabled Hybrid Satellite-Aerial-Terrestrial Networks With Non-Orthogonal Multiple Access
Zhang, Xiaokai; Zhang, Bangning; An, Kang et al

in IEEE Transactions on Wireless Communications (2022), 21(2), 1272-1287

Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a ... [more ▼]

Due to the emergence of non-terrestrial platformswith extensive coverage, flexible deployment, and reconfigurablecharacteristics, the hybrid satellite-aerial-terrestrial networks(HSATNs) can accommodate a great variety of wireless accessservices in different applications. To effectively reduce the trans-mission latency and facilitate the frequent update of files withimproved spectrum efficiency, we investigate the performanceof cache-enabled HSATN, where the user retrieves the requiredcontent files from the cache-enabled aerial relay or the satellitewith the non-orthogonal multiple access (NOMA) scheme. If therequired content files of the user are cached in the aerial relay,the cache-enabled relay would serve directly. Otherwise, the userwould retrieve the content file from the satellite system, where thesatellite system seeks opportunities for proactive content pushingto the relay during the user content delivery phase. Specifically,taking into account the uncertainty of the number and locationof aerial relays, along with the channel fading of terrestrialusers, the outage probability and hit probability of the considerednetwork are, respectively, derived based on stochastic geometry.Numerical results unveil the effectiveness of the cache-enabledHSATN with the NOMA scheme and proclaim the influence ofkey factors on the system performance. The realistic, tractable,and expandable framework, as well as associated methodology,provide both useful guidance and a solid foundation for evolvednetworks with advanced configurations in the performance ofcache-enabled HSATN. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Reverse Engineering of Role-based Access Control Policies of Web Applications
Le, Ha Thanh UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Journal of Systems and Software (2022), 184

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with ... [more ▼]

Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and detecting AC defects. In this paper, we present a semi-automated framework for reverse-engineering of AC policies from Web applications. Our goal is to learn and recover role-based access control (RBAC) policies from implementations, which are then used to validate implemented policies and detect AC issues. Our framework, built on top of a suite of security tools, automatically explores a given Web application, mines domain input specifications from access logs, and systematically generates and executes more access requests using combinatorial test generation. To learn policies, we apply machine learning on the obtained data to characterize relevant attributes that influence AC. Finally, the inferred policies are presented to the security engineer, for validation with respect to intended access rights and for detecting AC issues. Inconsistent and insufficient policies are highlighted as potential AC issues, being either vulnerabilities or implementation errors. We evaluated our approach on four Web applications (three open-source and a proprietary one built by our industry partner) in terms of the correctness of inferred policies. We also evaluated the usefulness of our approach by investigating whether it facilitates the detection of AC issues. The results show that 97.8% of the inferred policies are correct with respect to the actual AC implementation; the analysis of these policies led to the discovery of 64 AC issues that were reported to the developers. [less ▲]

Detailed reference viewed: 115 (12 UL)
Full Text
Peer Reviewed
See detailWarehousing asylum seekers: The logistification of reception
Vianelli, Lorenzo UL

in Environment and Planning. D, Society and Space (2022), 40(1), 41-59

This article employs the analytical perspective of logistics to explore a key, yet quite overlooked, aspect of the functioning of the EU border regime: the reception and associated territorial ... [more ▼]

This article employs the analytical perspective of logistics to explore a key, yet quite overlooked, aspect of the functioning of the EU border regime: the reception and associated territorial distribution of newly arrived asylum seekers. Drawing on qualitative data collected at the height of ‘refugee reception crisis’ in multiple contexts in Italy and Sweden, the article shows how reception is undergoing a process of ‘logistification’. In this process, organisational and logistical concerns prevail over the care for those who are assisted, and reception is turned into a logistical matter of moving and accommodating asylum seekers. Crucial to this process of ‘logistification’ is the warehousing of asylum seekers – an art of government that seeks to objectify asylum seekers through their depersonalisation, victimisation and (im)mobilisation. The article argues that the ‘logistification’ of reception not only has dehumanising effects on asylum seekers, but also exposes the attempt to make profit out their management and transfer. This creates the conditions for the development of a reception industry in which the very presence of asylum seekers is valorised for the profit of a whole range of actors who ensure the reproduction, transfer, knowledge and control of those hosted in reception facilities. [less ▲]

Detailed reference viewed: 55 (7 UL)
Full Text
Peer Reviewed
See detailMethod of Rain Attenuation Prediction Based on Long–Short Term Memory Network
Cornejo, Andres; Landeros, Salvador; Matias, Jose Maria et al

in Neural Processing Letters (2022)

Rain attenuation events are one of the foremost drawbacks in satellite communications, impairing satellite link availability. For this reason, it is necessary to foresee rain events to avoid an outage of ... [more ▼]

Rain attenuation events are one of the foremost drawbacks in satellite communications, impairing satellite link availability. For this reason, it is necessary to foresee rain events to avoid an outage of the satellite link. In this paper, we propose and develop a method based on Machine Learning to predict events of rain attenuation without appealing to complex mathematical models. To be specific, we implement a Long–short term memory architecture that is a Deep Learning algorithm based on an artificial recurrent neural network. Furthermore, supervised learning is the learning task for our algorithms. For this purpose, rain attenuation time-series feed the Long–short term memory network at the input to train it. However, the lack of a rainfall database hinders the development of a reliable prediction method. Therefore, we generate a synthetic rain attenuation database by using the recommendations of the International Telecommunication Union. Each model is trained and validated by computational experiments, employing statistical metrics to find the most accurate and reliable models. Thus, the accuracy metric compares the outcomes of the proposal with other related methods and models. As a result, our best model reaches an accuracy of 91.88% versus 87.99% from the external best model, demonstrating superiority over other models/methods. On average, our proposal accuracy reaches a value of 88.08%. Finally, we find out that this proposal can contribute efficiently to improving the performance of satellite system networks by re-routing data traffic or increasing link availabilities, taking advantage of the prediction of rain attenuation events. [less ▲]

Detailed reference viewed: 56 (10 UL)
Full Text
Peer Reviewed
See detailDer Staat als Träger der Stadtentwicklung. Urbanisierung des Plateau Kirchberg, Luxemburg
Hesse, Markus UL

in RaumPlanung (2022), 216(2-2022), 40-45

Der Beitrag untersucht die Governance-Strukturen des Europa- und Bankenviertels Kirchberg in Luxemburg-Stadt, Musterfall einer Bürostadt der Nachkriegszeit. Dieses Gebiet wird primär durch den Staat als ... [more ▼]

Der Beitrag untersucht die Governance-Strukturen des Europa- und Bankenviertels Kirchberg in Luxemburg-Stadt, Musterfall einer Bürostadt der Nachkriegszeit. Dieses Gebiet wird primär durch den Staat als Träger verantwortet. Es ist indes mit ähnlichen Problemen konfrontiert wie private Großprojekte der Stadtplanung, vor allem mit Blick auf institutionelle Strukturen und Pfadabhängigkeit der Entwicklung. [less ▲]

Detailed reference viewed: 55 (4 UL)
Full Text
Peer Reviewed
See detailProp of ribbon hypergraphs and strongly homotopy involutive Lie bialgebras
Merkulov, Sergei UL

in International Mathematics Research Notices (2022), rnac023

For any integer d we introduce a prop RHrad of d-oriented ribbon hypergraphs (in which "edges" can connect more than two vertices) and prove that there exists a canonical morphism Holieb⋄d⟶RHrad from the ... [more ▼]

For any integer d we introduce a prop RHrad of d-oriented ribbon hypergraphs (in which "edges" can connect more than two vertices) and prove that there exists a canonical morphism Holieb⋄d⟶RHrad from the minimal resolution Holieb⋄d of the (degree shifted) prop of involutive Lie bialgebras into the prop of ribbon hypergraphs which is non-trivial on each generator of Holieb⋄d. As an application we show that for any graded vector space W equipped with a family of cyclically (skew)symmetric higher products the associated vector space of cyclic words in elements of W has a combinatorial Holieb⋄d-structure. As an illustration we construct for each natural number N≥1 an explicit combinatorial strongly homotopy involutive Lie bialgebra structure on the vector space of cyclic words in N graded letters which extends the well-known Schedler's necklace Lie bialgebra structure from the formality theory of the Goldman-Turaev Lie bialgebra in genus zero. [less ▲]

Detailed reference viewed: 145 (1 UL)
Full Text
Peer Reviewed
See detailFunctional Convergence of U-processes with Size-Dependent Kernels
Döbler, Christian UL; Kasprzak, Mikolaj UL; Peccati, Giovanni UL

in Annals of Applied Probability (2022), 32(1), 551-601

Detailed reference viewed: 81 (9 UL)
Full Text
Peer Reviewed
See detailThe ecology of the unseen
Wilmes, Paul UL

in Archives des Sciences Naturelles, Physiques et Mathématiques (2022), XLVIII

On the global scale, humankind is having a profound impact on the ecology of assemblages of organisms which we can see with the naked eye. At the same time, we are also starting to learn about the impact ... [more ▼]

On the global scale, humankind is having a profound impact on the ecology of assemblages of organisms which we can see with the naked eye. At the same time, we are also starting to learn about the impact of our collective, modern lifestyles on the ecology of the unseen, for example the microbes in our gut which are being affected by the overuse of antibiotics and unhealthy diets. However, we do not fully understand which functions the microorganisms fulfill as our knowledge so far is rather limited. In our own research, we see for example that 50-90 % of the molecules produced by microbes are completely unknown to Science but likely play important roles in key physiological processes. This means that we as humans are presently affecting key microbial processes in our bodies without fully understanding the possible repercussions. In addition, many of these molecules likely have bioactive properties and, thereby, represent an untapped resource for the development of new drugs. Therefore, it is important that we start charting out this great molecular expanse to ensure its stewardship for generations to come. [less ▲]

Detailed reference viewed: 78 (4 UL)
Full Text
Peer Reviewed
See detailLarge degrees in scale-free inhomogeneous random graphs
Bhattacharjee, Chinmoy UL; Schulte, Matthias

in Annals of Applied Probability (2022), 32(1), 696-720

We consider a class of scale-free inhomogeneous random graphs, which includes some long-range percolation models. We study the maximum degree in such graphs in a growing observation window and show that ... [more ▼]

We consider a class of scale-free inhomogeneous random graphs, which includes some long-range percolation models. We study the maximum degree in such graphs in a growing observation window and show that its limiting distribution is Frechet. We achieve this by proving convergence of the underlying point process of the degrees to a certain Poisson process. Estimating the index of the power-law tail for the typical degree distribution is an important question in statistics. We prove consistency of the Hill estimator for the inverse of the tail exponent of the typical degree distribution. [less ▲]

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailQuantizations of Lie bialgebras, duality involution and oriented graph complexes
Merkoulov (merkulov), Serguei UL; Zivkovic, Marko UL

in Letters in Mathematical Physics (2022), DOI 10.1007(s11005-022-01505-6),

We prove that the action of the Grothendieck-Teichmüller group on the genus completed properad of (homotopy) Lie bialgebras commutes with the reversing directions involution of the latter. We also prove ... [more ▼]

We prove that the action of the Grothendieck-Teichmüller group on the genus completed properad of (homotopy) Lie bialgebras commutes with the reversing directions involution of the latter. We also prove that every universal quantization of Lie bialgebras is homotopy equivalent to the one which commutes with the duality involution exchanging Lie bracket and Lie cobracket. The proofs are based on a new result in the theory of oriented graph complexes (which can be of independent interest) saying that the involution on an oriented graph complex that changes all directions on edges induces the identity map on its cohomology. [less ▲]

Detailed reference viewed: 69 (0 UL)
See detailDie Ursprünge von St. Vith und seine Entwicklung bis ins 15. Jahrhundert
Pauly, Michel UL

in Zwischen Venn und Schneifel (2022), 58(2), 23-27

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailTHS-GWNN: a deep learning framework for temporal network link prediction
Mo, Xian; Pang, Jun UL; Liu, Zhiming

in Frontiers of Computer Science (2022), 16(2), 162304

Detailed reference viewed: 126 (2 UL)
Full Text
Peer Reviewed
See detailLa voie des réformes de l'UEM: "le futur ancien n'est pas notre avenir"
Allemand, Frederic UL

in Revue des Affaires Européennes (2022), 2021(3), 545-563

of a set of reforms in the Economic and Monetary Union (EMU). The economic union is particularly concerned. The reforms implemented so far have been carried out without any change to the substance of the ... [more ▼]

of a set of reforms in the Economic and Monetary Union (EMU). The economic union is particularly concerned. The reforms implemented so far have been carried out without any change to the substance of the EU constitutional framework, given that they made use of both the extensive substantive scope of EU legislative decision-making power in the field of economic union and the development of institutional practices to fill gaps or complement the EU legal framework. In so doing, EMU developments are condemned to take place within the limits of constitutional provisions that are outdated in many respects, increasingly complex, confusing and unreadable. Achieving a genuine EMU means breaking out of this status quo. Constitutional revision is no longer an option: it is a prerequisite for the well functioning of EMU. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailThe missing risk premium in exchange rates
Penasse, Julien UL

in Journal of Financial Economics (2022), 143(2), 697-715

We use a present-value model of the real exchange rate to impose structure on the currency risk premium. We allow the currency risk premium to depend on both the interest rate differential and a latent ... [more ▼]

We use a present-value model of the real exchange rate to impose structure on the currency risk premium. We allow the currency risk premium to depend on both the interest rate differential and a latent component: the missing risk premium. Consistent with the data, our present-value model implies that the real exchange rate should predict currency returns. We find that the missing risk premium, not the interest rate differential, explains most of the variation in the real exchange rate. Moreover, our model sheds light on puzzling relations between the interest rate differential, the real exchange rate, and the currency risk premium. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailThe regional occupational structure in interwar England and Wales
Calabrese, Matteo UL

in Historical Methods (2022)

A lack of regional data on the occupational structure in England and Wales during the interwar years has so far prevented extensive study of this time period. In the current paper, we fill this gap by ... [more ▼]

A lack of regional data on the occupational structure in England and Wales during the interwar years has so far prevented extensive study of this time period. In the current paper, we fill this gap by reconstructing the occupational structure at the district level, based on a recently-digitized register for 1939 and by linking this dataset with the population censuses of 1911 and 1921. The resulting data reveals significant regional differences in the expansion of the tertiary sector, and the relative decline of agricultural and industrial activities. For industry, we find an increase in the level of geographical concentration during 1911–1921, to decline by 1939. The primary sector followed a similar pattern, whereas activities in the tertiary sector became less concentrated. [less ▲]

Detailed reference viewed: 76 (15 UL)
Full Text
Peer Reviewed
See detailBlockchain as a driving force for federalism: A theory of cross-organizational task-technology fit
Roth, Tamara UL; Stohr, Alexander; Amend, Julia et al

in International Journal of Information Management (2022)

Detailed reference viewed: 67 (2 UL)
Full Text
Peer Reviewed
See detailCharacterizing the theory of energy transition in Luxembourg— Part three— In the residential sector
Arababadi, Ali; Leyer, Stephan UL; Hansen, Joachim UL et al

in Energy Science and Engineering (2022)

Increasing consciousness to address future concerns is a challenging subject, noticed considerably by policymakers and investors. Investigation of energy use in residential buildings in terms of quantity ... [more ▼]

Increasing consciousness to address future concerns is a challenging subject, noticed considerably by policymakers and investors. Investigation of energy use in residential buildings in terms of quantity and sources of energy was the main focus of this study. Indeed, the paper was aimed to study the role of contextual factors on two points: the energy demand and the spreading of renewable technologies in the residential sector. It was theory- driven research to highlight some future concerns. The first theory was to reveal how the growth of single- family houses versus multi- family houses could affect the growth of energy consumption and the application of renewable technologies. The second theory was built to highlight that spreading energy measures to increase efficiency or introducing a new energy carrier should be embedded in the context of new construction activities or in a template of renovation projects. The third theory was to emphasize the priority of thinking about managing the changes in residential buildings because of the lasting impact of the decision about the type of building. Finally, the purpose of the ongoing transition was argued to highlight that the growth of renewable technologies has not been necessarily aligned with getting away from fossil fuels. [less ▲]

Detailed reference viewed: 42 (5 UL)
Full Text
See detailTowards hypothesis-driven, personalized microbiome screening
Sedrani, Catherine Marie UL; Wilmes, Paul UL

in Cell Reports Methods (2022), 2(1),

Detailed reference viewed: 104 (11 UL)
Full Text
Peer Reviewed
See detailA dynamic “predict, then optimize” preventive maintenance approach using operational intervention data
van Staden, Heletje E.; Deprez, Laurens UL; Boute, Robert

in European Journal of Operational Research (2022)

We investigate whether historical machine failures and maintenance records may be used to derive future machine failure estimates and, in turn, prescribe advancements of scheduled preventive maintenance ... [more ▼]

We investigate whether historical machine failures and maintenance records may be used to derive future machine failure estimates and, in turn, prescribe advancements of scheduled preventive maintenance interventions. We model the problem using a sequential predict, then optimize approach. In our prescriptive optimization model, we use a finite horizon Markov decision process with a variable order Markov chain, in which the chain length varies depending on the time since the last preventive maintenance action was performed. The model therefore captures the dependency of a machine’s failures on both recent failures as well as preventive maintenance actions, via our prediction model. We validate our model using an original equipment manufacturer data set and obtain policies that prescribe when to deviate from the planned periodic maintenance schedule. To improve our predictions for machine failure behavior with limited to no past data, we pool our data set over different machine classes by means of a Poisson generalized linear model. We find that our policies can supplement and improve on those currently applied by 5%, on average. [less ▲]

Detailed reference viewed: 34 (1 UL)
Full Text
Peer Reviewed
See detailDeep Convolutional Self-Attention Network forEnergy-Efficient Power Control in NOMA Networks
Adam,Abuzar B. M; Lei, Lei; Chatzinotas, Symeon UL et al

in IEEE Transactions on Vehicular Technology (2022), 71(5), 5540-5545

In this letter, we propose an end-to-end multi-modalbased convolutional self-attention network to perform powercontrol in non-orthogonal multiple access (NOMA) networks. Weformulate an energy efficiency ... [more ▼]

In this letter, we propose an end-to-end multi-modalbased convolutional self-attention network to perform powercontrol in non-orthogonal multiple access (NOMA) networks. Weformulate an energy efficiency (EE) maximization problem wedesign an iterative solution to handle the optimization problem.This solution can provides an offline benchmark but might notbe suitable for online power control therefore, we employ ourproposed deep learning model. The proposed deep learning modelconsists of two main pipelines, one for the deep feature mappingwhere we stack our self-attention block on top of a ResNet toextract high quality features and focus on specific regions in thedata to extract the patterns of the influential factors (interference,quality of service (QoS) and the corresponding power allocation).The second pipeline is to extract the shallow modality features.Those features are combined and passed to a dense layer toperform the final power prediction. The proposed deep learningframework achieves near optimal performance and outperformstraditional solutions and other strong deep learning models suchas PowerNet and the conventional convolutional neural network(CNN). [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailDifferential graded Lie groups and their differential graded Lie algebras
Jubin, Benoît; Kotov, Alexei; Poncin, Norbert UL et al

in Transformation Groups (2022), 10.1007/s00031-021-09666-9

Detailed reference viewed: 124 (6 UL)
Full Text
Peer Reviewed
See detailEditorial
Cole, Mark David UL

in UFITA - Archiv für Medienrecht und Medienwissenschaft (2022), 86(2021), 209-211

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailQuis custodiet ipsos custodes? Data protection in the judiciary in EU and EEA Member States
Terzidou, Kalliopi UL; Custers, Bart; Louis, Linda et al

in International Data Privacy Law (2022)

Detailed reference viewed: 49 (12 UL)
Full Text
Peer Reviewed
See detailMultiomic profiling of the liver across diets and age in a diverse mouse population
Williams, Evan UL; Pfister, Niklas; Roy, Suheeta et al

in Cell Systems (2022), 13(1), 43-57

Detailed reference viewed: 60 (0 UL)
Full Text
Peer Reviewed
See detailLaser welding of copper to aluminum with spiral trajectory and identification of excessive aluminum melting
Mathivanan, Karthik UL; Plapper, Peter UL; Mathivanan, Karthik UL

in Journal of Laser Applications (2022)

Laser welding of copper and aluminum is challenging due to the formation of complex intermetallic phases. Only a defined amount of Al and Cu can be melted because of the limited solubility of Al–Cu ... [more ▼]

Laser welding of copper and aluminum is challenging due to the formation of complex intermetallic phases. Only a defined amount of Al and Cu can be melted because of the limited solubility of Al–Cu systems. Finding the optimum melting is critical for a strong joint. Optical emission during the welding process contains the metal vapor of Al metal that is being welded. This is a good indicator for monitoring the welding process. This research paper focuses on the optical emission of Al from the bottom sheet during welding of Cu (top) and Al (bottom) in overlapped configuration for a spiral trajectory. The emitted signal in the range of 395 nm (±3 nm) from the bottom sheet of aluminum is used to identify excessive Cu–Al welding. The tensile shear strength, microstructure, and welding signal in the time domain for optimum and excessive weld conditions are investigated. In this study, a technique using a photodiode is shown to identify the excessive melting of Al during the welding process in real time. [less ▲]

Detailed reference viewed: 76 (2 UL)
Full Text
Peer Reviewed
See detailUsing small-angle scattering to guide functional magnetic nanoparticle design
Honecker, Dirk; Bersweiler, Mathias UL; Erokhin, Sergey et al

in Nanoscale Advances (2022), 4

Detailed reference viewed: 42 (3 UL)
Full Text
Peer Reviewed
See detailAssociation of ultra-rare coding variants with genetic generalized epilepsy: A case–control whole exome sequencing study
Koko, Mahmoud; Motelow, Joshua E.; Stanley, Kate E. et al

in Epilepsia (2022)

Abstract Objective We aimed to identify genes associated with genetic generalized epilepsy (GGE) by combining large cohorts enriched with individuals with a positive family history. Secondarily, we set ... [more ▼]

Abstract Objective We aimed to identify genes associated with genetic generalized epilepsy (GGE) by combining large cohorts enriched with individuals with a positive family history. Secondarily, we set out to compare the association of genes independently with familial and sporadic GGE. Methods We performed a case–control whole exome sequencing study in unrelated individuals of European descent diagnosed with GGE (previously recruited and sequenced through multiple international collaborations) and ancestry-matched controls. The association of ultra-rare variants (URVs; in 18 834 protein-coding genes) with epilepsy was examined in 1928 individuals with GGE (vs. 8578 controls), then separately in 945 individuals with familial GGE (vs. 8626 controls), and finally in 1005 individuals with sporadic GGE (vs. 8621 controls). We additionally examined the association of URVs with familial and sporadic GGE in two gene sets important for inhibitory signaling (19 genes encoding γ-aminobutyric acid type A [GABAA] receptors, 113 genes representing the GABAergic pathway). Results GABRG2 was associated with GGE (p = 1.8 × 10−5), approaching study-wide significance in familial GGE (p = 3.0 × 10−6), whereas no gene approached a significant association with sporadic GGE. Deleterious URVs in the most intolerant subgenic regions in genes encoding GABAA receptors were associated with familial GGE (odds ratio [OR] = 3.9, 95 confidence interval [CI] = 1.9–7.8, false discovery rate [FDR]-adjusted p = .0024), whereas their association with sporadic GGE had marginally lower odds (OR = 3.1, 95 CI = 1.3–6.7, FDR-adjusted p = .022). URVs in GABAergic pathway genes were associated with familial GGE (OR = 1.8, 95 CI = 1.3–2.5, FDR-adjusted p = .0024) but not with sporadic GGE (OR = 1.3, 95 CI = .9–1.9, FDR-adjusted p = .19). Significance URVs in GABRG2 are likely an important risk factor for familial GGE. The association of gene sets of GABAergic signaling with familial GGE is more prominent than with sporadic GGE. [less ▲]

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailFairness, integrity, and privacy in a scalable blockchain-based federated learning system
Rückel, Timon; Sedlmeir, Johannes UL; Hofmann, Peter

in Computer Networks (2022), 202

Federated machine learning (FL) allows to collectively train models on sensitive data as only the clients’ models and not their training data need to be shared. However, despite the attention that ... [more ▼]

Federated machine learning (FL) allows to collectively train models on sensitive data as only the clients’ models and not their training data need to be shared. However, despite the attention that research on FL has drawn, the concept still lacks broad adoption in practice. One of the key reasons is the great challenge to implement FL systems that simultaneously achieve fairness, integrity, and privacy preservation for all participating clients. To contribute to solving this issue, our paper suggests a FL system that incorporates blockchain technology, local differential privacy, and zero-knowledge proofs. Our implementation of a proof-of-concept with multiple linear regressions illustrates that these state-of-the-art technologies can be combined to a FL system that aligns economic incentives, trust, and confidentiality requirements in a scalable and transparent system. [less ▲]

Full Text
Peer Reviewed
See detailSpecial Issue on New Paradigms of Software Production and Deployment
Capozucca, Alfredo UL; Bruel, Jean-Michel; Mazzara, Manuel et al

in SN Computer Science (2022), 3(132),

Ediorial of the Special Issue on “New paradigms of software production and deployment”.

Detailed reference viewed: 57 (7 UL)
Full Text
Peer Reviewed
See detailFocal adhesion kinase plays a dual role in TRAIL resistance and metastatic outgrowth of malignant melanoma
Del Mistro, Greta; Riemann, Shamala; Schindler, Sebastian et al

in Cell Death and Disease (2022)

Despite remarkable advances in therapeutic interventions, malignant melanoma (MM) remains a life-threating disease. Following high initial response rates to targeted kinase-inhibition metastases quickly ... [more ▼]

Despite remarkable advances in therapeutic interventions, malignant melanoma (MM) remains a life-threating disease. Following high initial response rates to targeted kinase-inhibition metastases quickly acquire resistance and present with enhanced tumor progression and invasion, demanding alternative treatment options. We show 2nd generation hexameric TRAIL-receptor-agonist IZI1551 (IZI) to effectively induce apoptosis in MM cells irrespective of the intrinsic BRAF/NRAS mutation status. Conditioning to the EC50 dose of IZI converted the phenotype of IZI-sensitive parental MM cells into a fast proliferating and invasive, IZI-resistant metastasis. Mechanistically, we identified focal adhesion kinase (FAK) to play a dual role in phenotype-switching. In the cytosol, activated FAK triggers survival pathways in a PI3K- and MAPK-dependent manner. In the nucleus, the FERM domain of FAK prevents activation of wtp53, as being expressed in the majority of MM, and consequently intrinsic apoptosis. Caspase-8-mediated cleavage of FAK as well as FAK knockdown, and pharmacological inhibition, respectively, reverted the metastatic phenotype-switch and restored IZI responsiveness. FAK inhibition also re-sensitized MM cells isolated from patient metastasis that had relapsed from targeted kinase inhibition to cell death, irrespective of the intrinsic BRAF/NRAS mutation status. Hence, FAK-inhibition alone or in combination with 2nd generation TRAIL-receptor agonists may be recommended for treatment of initially resistant and relapsed MM, respectively. [less ▲]

Detailed reference viewed: 76 (7 UL)
Full Text
Peer Reviewed
See detailCerebro: Static Subsuming Mutant Selection
Garg, Aayush UL; Ojdanic, Milos UL; Degiovanni, Renzo Gaston UL et al

in IEEE Transactions on Software Engineering (2022)

Detailed reference viewed: 100 (32 UL)
Full Text
Peer Reviewed
See detailIntersectional Inequalities in Science
Kozlowski, Diego UL; Larivière, Vincent; Sugimoto, Cassidy R. et al

in Proceedings of the National Academy of Sciences of the United States of America (2022), 119(2), 2113067119

The US scientific workforce is primarily composed of White men. Studies have demonstrated the systemic barriers preventing women and other minoritized populations from gaining entry to science; few ... [more ▼]

The US scientific workforce is primarily composed of White men. Studies have demonstrated the systemic barriers preventing women and other minoritized populations from gaining entry to science; few, however, have taken an intersectional perspective and examined the consequences of these inequalities on scientific knowledge. We provide a large-scale bibliometric analysis of the relationship between intersectional identities, topics, and scientific impact. We find homophily between identities and topic, suggesting a relationship between diversity in the scientific workforce and expansion of the knowledge base. However, topic selection comes at a cost to minoritized individuals for whom we observe both between- and within-topic citation disadvantages. To enhance the robustness of science, research organizations should provide adequate resources to historically underfunded research areas while simultaneously providing access for minoritized individuals into high-prestige networks and topics. [less ▲]

Detailed reference viewed: 56 (4 UL)
Full Text
Peer Reviewed
See detailDairy Intake and Parkinson's Disease: A Mendelian Randomization Study
Domenighetti, Cloé; Sugier, Pierre-Emmanuel; Ashok Kumar Sreelatha, Ashwin et al

in Movement Disorders (2022)

Abstract Background Previous prospective studies highlighted dairy intake as a risk factor for Parkinson's disease (PD), particularly in men. It is unclear whether this association is causal or explained ... [more ▼]

Abstract Background Previous prospective studies highlighted dairy intake as a risk factor for Parkinson's disease (PD), particularly in men. It is unclear whether this association is causal or explained by reverse causation or confounding. Objective The aim is to examine the association between genetically predicted dairy intake and PD using two-sample Mendelian randomization (MR). Methods We genotyped a well-established instrumental variable for dairy intake located in the lactase gene (rs4988235) within the Courage-PD consortium (23 studies; 9823 patients and 8376 controls of European ancestry). Results Based on a dominant model, there was an association between genetic predisposition toward higher dairy intake and PD (odds ratio [OR] per one serving per day = 1.70, 95 confidence interval = 1.12–2.60, P = 0.013) that was restricted to men (OR = 2.50 [1.37–4.56], P = 0.003; P-difference with women = 0.029). Conclusions Using MR, our findings provide further support for a causal relationship between dairy intake and higher PD risk, not biased by confounding or reverse causation. Further studies are needed to elucidate the underlying mechanisms. © 2022 International Parkinson and Movement Disorder Society [less ▲]

Detailed reference viewed: 66 (5 UL)
Full Text
Peer Reviewed
See detailDYT6 mutated THAP1 is a cell type dependent regulator of the SP1 family.
Cheng, Fubo; Zheng, Wenxu; Barbuti, Peter Antony et al

in Brain : a journal of neurology (2022), 145(11), 3968-3984

DYT6 dystonia is caused by mutations in the transcription factor THAP1. THAP1 knock-out or knock-in mouse models revealed complex gene expression changes, which are potentially responsible for the ... [more ▼]

DYT6 dystonia is caused by mutations in the transcription factor THAP1. THAP1 knock-out or knock-in mouse models revealed complex gene expression changes, which are potentially responsible for the pathogenesis of DYT6 dystonia. However, how THAP1 mutations lead to these gene expression alterations and whether the gene expression changes are also reflected in the brain of THAP1 patients are still unclear. In this study we used epigenetic and transcriptomic approaches combined with multiple model systems [THAP1 patients' frontal cortex, THAP1 patients' induced pluripotent stem cell (iPSC)-derived midbrain dopaminergic neurons, THAP1 heterozygous knock-out rat model, and THAP1 heterozygous knock-out SH-SY5Y cell lines] to uncover a novel function of THAP1 and the potential pathogenesis of DYT6 dystonia. We observed that THAP1 targeted only a minority of differentially expressed genes caused by its mutation. THAP1 mutations lead to dysregulation of genes mainly through regulation of SP1 family members, SP1 and SP4, in a cell type dependent manner. Comparing global differentially expressed genes detected in THAP1 patients' iPSC-derived midbrain dopaminergic neurons and THAP1 heterozygous knock-out rat striatum, we observed many common dysregulated genes and 61 of them were involved in dystonic syndrome-related pathways, like synaptic transmission, nervous system development, and locomotor behaviour. Further behavioural and electrophysiological studies confirmed the involvement of these pathways in THAP1 knock-out rats. Taken together, our study characterized the function of THAP1 and contributes to the understanding of the pathogenesis of primary dystonia in humans and rats. As SP1 family members were dysregulated in some neurodegenerative diseases, our data may link THAP1 dystonia to multiple neurological diseases and may thus provide common treatment targets. [less ▲]

Full Text
Peer Reviewed
See detailSexual Satisfaction and Sexual Behaviors During the Covid-19 Pandemic: Results From the International Sexual Health and Reproductive (I-SHARE) Health Survey in Luxembourg
Jobim Fischer, Vinicius UL; Gomez Bravo, Raquel UL; Einloft Brunnet, Alice et al

in BMC Public Health (2022)

Aim: To identify the impact of COVID-19 measures on sexual behaviors and sexual satisfaction in Luxembourg residents. Methods: We conducted a cross-sectional online survey of adults (> 18 years of age ... [more ▼]

Aim: To identify the impact of COVID-19 measures on sexual behaviors and sexual satisfaction in Luxembourg residents. Methods: We conducted a cross-sectional online survey of adults (> 18 years of age) residing in Luxembourg, while COVID-19 restrictions were in place. The survey was available in four languages (French, German, English and Portuguese). Survey questions focused on masturbation, cuddling, condom use, sex frequency, sexting, cybersex, watching porn, and sexual satisfaction. Results: 557 volunteers completed the survey (35.5% men, 64.3% women). Sexual problems increased during the COVID-19 measures while sexual satisfaction decreased compared to prior the COVID-19 measures (assessed retrospectively). Factors associated with increased odds of sexual satisfaction were: having a steady relationship before COVID-19 restrictions, engaging in sexting, reporting good mental health and not altering alcohol intake. Conclusions: The context of the COVID-19 pandemic and the measures implemented in Luxembourg affected sexual behaviors and sexual satisfaction. Sexual and reproductive health care centers and health professionals in general should take these results into consideration when providing care. Recommendations on the importance of sexual health for general wellbeing and behaviors associated with sexual satisfaction should be offered and possibilities to experience sexuality while reducing contamination risks be discussed. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailBlockchain matters – lex cryptographia and the displacement of legal symbolics and imaginaries
Becker, Katrin UL

in Law and Critique (2022)

This article focusses on the social and legal implications that blockchain technology brings about, not only due to its ideological framework, but also, and especially, due to the concept of law it ... [more ▼]

This article focusses on the social and legal implications that blockchain technology brings about, not only due to its ideological framework, but also, and especially, due to the concept of law it inaugurates. Thus, this article claims, that, by interlocking technological and legal structures, blockchain technology initiates a profound displacement of legal symbolics and imaginaries. It shows how blockchain law, by emancipating itself from three essential dimensions of law—language, territory, and the body—implies a profound disruption of how we perceive law and its legitimacy. Starting with an overview of the technological details of blockchain, the paper then addresses its ideological context and traces the underlying ideas, values and functions and their relation with—and impact on—the general perception of law and legal issues. By critically assessing the claim that blockchain will liberate the subject from any heteronymic constraints, this paper analyses to what extent this technology has social and legal implications that reach far beyond its virtual, purely blockchain-related scope of applications—and why this technology should matter to us all. [less ▲]

Detailed reference viewed: 100 (5 UL)
Full Text
Peer Reviewed
See detailCalibration of the Latest Generation Superconducting Gravimeter iGrav-043 Using the Observatory Superconducting Gravimeter OSG-CT040 and the Comparisons of Their Characteristics at the Walferdange Underground Laboratory for Geodynamics, Luxembourg
Elsaka, Basem; Francis, Olivier UL; Kusche, Jürgen

in Pure and Applied Geophysics (2022)

In December 2019, the latest generation transportable superconducting gravimeter (SG) iGrav-043 purchased by the University of Bonn was installed in the Walferdange Underground Laboratory for Geodynamics ... [more ▼]

In December 2019, the latest generation transportable superconducting gravimeter (SG) iGrav-043 purchased by the University of Bonn was installed in the Walferdange Underground Laboratory for Geodynamics (WULG) in the Grand Duchy of Luxembourg. In this paper, we estimate the calibration factor of the iGrav-043, which is essential for long-term gravity monitoring. We used simultaneously collected gravity data from the un-calibrated iGrav-043 and the calibrated Observatory superconducting gravimeter OSG-CT040 that operates continuously at WULG since 2002. The tidal analysis provides a simple way to transfer the calibration factor of one SG to the other. We then assess and compare tidal analyses, instrumental drifts and high frequency noises. After 20 years of continuous operation, the instrumental drift of the OSG-CT040 is almost zero. From 533 days of joint operation, we found that the instrumental drift of iGrav-043 exhibits a composite behavior: just after the setup and for two months a fast exponential decrease of 171 nm s−2, then a linear with a rate of 66 nm s−2 ± 10 nm s−2 per year. We suggest that a period of 3 months is sufficient for calibrating the iGrav. Accidental electrical power cuts triggered slight differences in the reaction and recovery of the OSG-CT040 and iGrav-043. However, it has been found that the long-term linear behavior of the drift was not affected. [less ▲]

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailWhen less is more: Investigating factors influencing the distraction effect of virtual reality from pain
Barcatta, Katharina; Holl, Elisabeth UL; Battistutta, Layla UL et al

in Frontiers in Pain Research (2022), 2

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailInterpolating Nonadiabatic Molecular Dynamics Hamiltonian with Artificial Neural Networks
Bipeng Wang; Weibin Chu; Tkatchenko, Alexandre UL et al

in Journal of Physical Chemistry Letters (2022)

Detailed reference viewed: 130 (2 UL)