Results 4161-4180 of 9084.
Bookmark and Share    
Full Text
Peer Reviewed
See detailMicrostructural-defect-induced Dzyaloshinskii-Moriya interaction
Michels, Andreas UL; Mettus, Denis; Titov, Ivan UL et al

in Physical Review. B, Condensed Matter (2019), 99

Detailed reference viewed: 153 (23 UL)
Full Text
Peer Reviewed
See detailChapter 11 and the Level Playing Field: Should Chapter 11 be Considered as a Subsidy?
Mantin, Benny UL; Bock, Sebastian; Forsyth, Peter et al

in Journal of Air Transport Management (2019), 74

This paper assesses whether Chapter 11 is a form of subsidy for US airlines. US airlines have used Chapter 11 to restructure their operations. This has been criticized as a subsidy by major non US ... [more ▼]

This paper assesses whether Chapter 11 is a form of subsidy for US airlines. US airlines have used Chapter 11 to restructure their operations. This has been criticized as a subsidy by major non US airlines and governments for a long time and recently, in the “level playing field” debate. Applying legal and economic perspectives of subsidy, we examine the different opportunities of Chapter 11 to reduce airlines’ costs. It is argued that most of the forms available, such as the modification of collective bargaining, do not constitute a subsidy. Only the termination of pension plans might involve a subsidy, but only using a legal definition of doubtful relevance since there is normally no use of public funds. [less ▲]

Detailed reference viewed: 80 (1 UL)
See detailValers Larve : Imitatio, Anagrammatik und die Macht der Philologie in Gotthold Ephraim Lessings 'Der junge Gelehrte'
Busch, Christopher UL

in Ichtexte : Beiträge zur Philologie des Individuellen (2019)

Detailed reference viewed: 73 (0 UL)
Full Text
Peer Reviewed
See detailTranscriptome profiling data reveals Ubiquitin-Specific Peptidase 9 knockdown effects
Glaab, Enrico UL; Antony, Paul UL; Köglsberger, Sandra et al

in Data in Brief (2019), 25(1), 104130

Ubiquitin specific peptidase 9 (USP9) is a deubiquitinase encoded by a sex-linked gene with a Y-chromosomal form (USP9Y) and an X-chromosomal form (USP9X) that escapes X-inactivation. Since USP9 is a key ... [more ▼]

Ubiquitin specific peptidase 9 (USP9) is a deubiquitinase encoded by a sex-linked gene with a Y-chromosomal form (USP9Y) and an X-chromosomal form (USP9X) that escapes X-inactivation. Since USP9 is a key regulatory gene with sex-linked expression in the human brain, the gene may be of interest for researchers studying molecular gender differences and ubiquitin signaling in the brain. To assess the downstream effects of knocking down USP9X and USP9Y on a transcriptome-wide scale, we have conducted microarray profiling experiments using the human DU145 prostate cancer cell culture model, after confirming the robust expression of both USP9X and USP9Y in this model. By designing shRNA constructs for the specific knockdown of USP9X and the joint knockdown of USP9X and USP9Y, we have compared gene expression changes in both knockdowns to control conditions to infer potential shared and X- or Y-form specific alterations. Here, we provide details of the corresponding microarray profiling data, which has been deposited in the Gene Expression Omnibus database (GEO series accession number GSE79376). A biological interpretation of the data in the context of a potential involvement of USP9 in Alzheimer’s disease has previously been presented in Köglsberger et al. (2016). To facilitate the re-use and re-analysis of the data for other applications, e.g. the study of ubiquitin signaling and protein turnover control, and the regulation of molecular gender differences in the human brain and brain-related disorders, we provide a more in-depth discussion of the data properties, specifications and possible use cases. [less ▲]

Detailed reference viewed: 124 (3 UL)
Full Text
Peer Reviewed
See detailSimulation-based Optimisation Of Selective Laser Sintering/Melting Process
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

in Euro PM2019 Congress Proceedings (2019)

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of ... [more ▼]

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of which are based on extensive experiments aiming at finding statistical correlations between input parameters such as layer thickness, orientation, scan speed, powder bed temperature, laser power... and resulting strength and residual stress of the manufactured part. However, the rise of computer simulation based on mathematical models allows predictions at a much lower cost. Mathematical modelling of SLS/SLM involves molecular level thermodynamics and thermo-mechanical behaviour of the powder material. In this study, we employ the newly developed Extended Discrete Element Model to reproduce the SLS process including the mechanisms of sintering and the evolution of fracture properties and self-supporting ability. Results show that such microscale model offers high precision and flexibility for finding optimal process parameters. [less ▲]

Detailed reference viewed: 51 (12 UL)
Full Text
Peer Reviewed
See detailKnow Your Enemies and Know Yourself in the Real-Time Bidding Function Optimisation
Du, Manxing UL; Cowen-Rivers, Alexander I.; Wen, Ying et al

in Proceedings of the 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019) (2019)

Detailed reference viewed: 355 (1 UL)
See detailIdentification of optimal process parameters in selective laser sintering
Kabore, Brice Wendlassida UL; Estupinan Donoso, Alvaro Antonio UL; Peters, Bernhard UL et al

Scientific Conference (2019)

Selective Laser Sintering (SLS) is an efficient method for manufacturing complex geometries with high strength and durability. The SLS process subjects a powder bed to thermal cycles allowing theparticles ... [more ▼]

Selective Laser Sintering (SLS) is an efficient method for manufacturing complex geometries with high strength and durability. The SLS process subjects a powder bed to thermal cycles allowing theparticles to coalesce into a solid part without being completely melted. The thermal cycles along withthe thermo-mechanical properties of the powder dictate the properties of the manufactured part.Choosing optimal parameters that lead to functional parts with the desired stiffness, density andstrength requires extensive testing. Microscales models such that Molecular dynamics and DiscreteParticles offer great flexibilities and capacity to reproduce the SLS process from the physical point ofview [1].This study presents a multi-physical model based on the Extended Discrete Element Method forsimulating the thermodynamics and thermo-mechanics that take place in the SLS process as well asthe microstructure evolution of the part. A thermo-viscoelastic constitutive model for discreteparticles is coupled with heat transfer, sintering and fracture to predict.A genetic algorithm is employed to identify optimal process parameters, namely laser power,scanning speed, preheating temperature and layer thickness in an automated iterative process. Theseparameters are identified so that the density and strength of the cooled part meet the target values. [less ▲]

Detailed reference viewed: 79 (4 UL)
See detailThe Organised Crime-Terrorism Nexus: How to Address the Issue of ISIS Benefitting from Lucrative Criminal Activities?
Ligeti, Katalin UL; Lassalle, Maxime

in Roksandić Vidlička, Sunčana; Engelhart, Marc (Eds.) Dealing with Terrorism. Empirical and Normative Challenges of Fighting the Islamic State (2019)

Detailed reference viewed: 74 (5 UL)
Peer Reviewed
See detailA Critical Co/Autoethnographic Exploration of Self: Becoming Science Education Researchers in Diverse Cultural and Linguistic Landscapes
Park, Jennifer; Wilmes, Sara UL

in Bazzul, Jesse; Siry, Christina (Eds.) Critical voices in science education research: Narratives of academic journeys (2019)

This chapter illustrates the process of collaborative autoethnography (co-autoethnography) we used to construct space, in order to critically explore ourselves, and the contexts we study. Through a co ... [more ▼]

This chapter illustrates the process of collaborative autoethnography (co-autoethnography) we used to construct space, in order to critically explore ourselves, and the contexts we study. Through a co-autoethnographic process, we aimed to better understand our positioning in our lived experiences and to generate an understanding of how reflective critical research approaches could transform us, as well as the communities in which we were immersed. In this chapter, we share the process of our collective analysis of autoethnographic narratives (Coia L, Taylor M, Co/autoethnography: Exploring our teaching selves collaboratively. In L. Fitzgerald, M. Heston, D. Tidwell (Eds.), Research methods for the self-study of practice (pp. 3–16). Netherlands: Springer, 2009), which stemmed from our experiences living and conducting education research in multilingual and multicultural contexts. Our ethnographic method of data collection, analysis, and interpretation was generated from our journeys as researchers – moving to, living, and conducting research in culturally and linguistically diverse (CLD) environments. We share this process, and some lessons we learned, with the hope that other researchers may find co-autoethnography a cathartic methodology to explore and challenge their own perspectives relative to cultural and linguistic diversity in their lives and in their research. [less ▲]

Detailed reference viewed: 113 (17 UL)
Full Text
Peer Reviewed
See detailLe sens de la lecture
Roelens, Nathalie UL

in La Lecture littéraire dans tous ses étags (2019)

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailScreening Powers in Investment Arbitration: Questions of Legal Change and Legitimacy
Radović, Relja UL

in Baetens, Freya (Ed.) The Legitimacy of Unseen Actors in International Adjudication (2019)

Screening powers of arbitral institutions over requests initiating investment arbitrations are often justified by the need to prevent embarrassment of states and to avoid unnecessary costs. This Chapter ... [more ▼]

Screening powers of arbitral institutions over requests initiating investment arbitrations are often justified by the need to prevent embarrassment of states and to avoid unnecessary costs. This Chapter examines possible effects of such powers, particularly on the arbitral development of the jurisdictional standards governing investment arbitration. Can administrative organs filter the demands for legal change that will be heard before tribunals, and if so, does this diminish the legitimacy of their screening powers? It is argued that screening powers offer possibilities of setting arbitrators’ agenda in terms of which demands for legal change will be considered. This could affect their legitimacy, but it does not mean that screening powers have completely lost their justification. It is suggested that such powers must be exercised with an extreme level of diligence, requiring an almost complete elimination of legal considerations, in order to safeguard their legitimacy. [less ▲]

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailSignal Processing for High-Throughput Satellites: Challenges in New Interference-Limited Scenarios
Perez, Ana; Vazquez, Miguel; Shankar, Bhavani UL et al

in IEEE Signal Processing Magazine (2019)

The field of satellite communications (SatCom) is enjoying renewed attention in the global telecommunications market, and high-throughput satellites, with their multiple spot beams, are critical ... [more ▼]

The field of satellite communications (SatCom) is enjoying renewed attention in the global telecommunications market, and high-throughput satellites, with their multiple spot beams, are critical components for delivering the rates that will be demanded in the future. In this article, we present the state of the art and the open research challenges in the area of high-throughput satellites, with a focus on signal processing approaches for efficient interference mitigation. [less ▲]

Detailed reference viewed: 56 (6 UL)
Full Text
See detailGläserne Zwischenwände für effektive Kontrollen: Das belgische Regierungsbüro in der Zwischenkriegszeit
van de Maele, Jens UL

in Bernasconi, Gianenrico; Nellen, Stefan (Eds.) Das Büro: Zur Rationalisierung des Interieurs, 1880-1960 (2019)

Detailed reference viewed: 33 (5 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 173 (39 UL)
Full Text
Peer Reviewed
See detailOn the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in E-Business and Telecommunications - 2019 (2019)

Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communication entirely based on the knowledge of a shared password. Over the last two decades, we have ... [more ▼]

Password-based Authenticated Key-Exchange (PAKE) protocols allow the establishment of secure communication entirely based on the knowledge of a shared password. Over the last two decades, we have witnessed the debut of a number of prominent security models for PAKE protocols, whose aim is to capture the desired security properties that such protocols must satisfy when executed in the presence of an active adversary. These models are usually classified into (i) indistinguishability-based (IND-based) or (ii) simulation-based (SIM-based). However, the relation between these two security notions is unclear and mentioned as a gap in the literature. In this work, we prove that SIM-BMP security from Boyko et al. (EUROCRYPT 2000) implies IND-RoR security from Abdalla et al. (PKC 2005) and that IND-RoR security is equivalent to a slightly modified version of SIM-BMP security. We also investigate whether IND-RoR security implies (unmodified) SIM-BMP security. The results obtained also hold when forward secrecy is incorporated into the security models in question. [less ▲]

Detailed reference viewed: 125 (10 UL)
Full Text
See detailAutomated Identification of National Implementations of European Union Directives With Multilingual Information Retrieval Based On Semantic Textual Similarity
Nanda, Rohan UL

Doctoral thesis (2019)

The effective transposition of European Union (EU) directives into Member States is important to achieve the policy goals defined in the Treaties and secondary legislation. National Implementing Measures ... [more ▼]

The effective transposition of European Union (EU) directives into Member States is important to achieve the policy goals defined in the Treaties and secondary legislation. National Implementing Measures (NIMs) are the legal texts officially adopted by the Member States to transpose the provisions of an EU directive. The measures undertaken by the Commission to monitor NIMs are time-consuming and expensive, as they resort to manual conformity checking studies and legal analysis. In this thesis, we developed a legal information retrieval system using semantic textual similarity techniques to automatically identify the transposition of EU directives into the national law at a fine-grained provision level. We modeled and developed various text similarity approaches such as lexical, semantic, knowledge-based, embeddings-based and concept-based methods. The text similarity systems utilized both textual features (tokens, N-grams, topic models, word and paragraph embeddings) and semantic knowledge from external knowledge bases (EuroVoc, IATE and Babelfy) to identify transpositions. This thesis work also involved the development of a multilingual corpus of 43 directives and their corresponding NIMs from Ireland (English legislation), Italy (Italian legislation) and Luxembourg (French legislation) to validate the text similarity based information retrieval system. A gold standard mapping (prepared by two legal researchers) between directive articles and NIM provisions was prepared to evaluate the various text similarity models. The results show that the lexical and semantic text similarity techniques were more effective in identifying transpositions as compared to the embeddings-based techniques. We also observed that the unsupervised text similarity techniques had the best performance in case of the Luxembourg Directive-NIM corpus. We also developed a concept recognition system based on conditional random fields (CRFs) to identify concepts in European directives and national legislation. The results indicate that the concept recognitions system improved over the dictionary lookup program by tagging the concepts which were missed by dictionary lookup. The concept recognition system was extended to develop a concept-based text similarity system using word-sense disambiguation and dictionary concepts. The performance of the concept-based text similarity measure was competitive with the best performing text similarity measure. The labeled corpus of 43 directives and their corresponding NIMs was utilized to develop supervised text similarity systems by using machine learning classifiers. We modeled three machine learning classifiers with different textual features to identify transpositions. The results show that support vector machines (SVMs) with term frequency-inverse document frequency (TF-IDF) features had the best overall performance over the multilingual corpus. Among the unsupervised models, the best performance was achieved by TF-IDF Cosine similarity model with macro average F-score of 0.8817, 0.7771 and 0.6997 for the Luxembourg, Italian and Irish corpus respectively. These results demonstrate that the system was able to identify transpositions in different national jurisdictions with a good performance. Thus, it has the potential to be useful as a support tool for legal practitioners and Commission officials involved in the transposition monitoring process. [less ▲]

Detailed reference viewed: 112 (2 UL)
Full Text
Peer Reviewed
See detailDoes change in attention control mediate the impact of tDCS on attentional bias for threat? Limited evidence from a double-blind sham-controlled experiment in an unselected sample
Coussement, Charlotte; Maurage, Pierre; Billieux, Joël UL et al

in Psychologica Belgica (2019), 59(1), 16-32

Neurocognitive models of attentional bias for threat posit that attentional bias may result from a decreased activation of the left prefrontal cortex, and especially of its dorsolateral part (dlPFC ... [more ▼]

Neurocognitive models of attentional bias for threat posit that attentional bias may result from a decreased activation of the left prefrontal cortex, and especially of its dorsolateral part (dlPFC), resulting in an impaired attention control. Consequently, a transient increase of neural activity within the left dlPFC via non-invasive brain stimulation reduces attentional bias among both anxious and nonanxious participants. Yet, it is still unclear whether the impact of dlPFC activation on attentional bias is mediated by improvement in attention control. In this experiment, we sought to test this hypothesis in an unselected sample (n = 20). Accordingly, we adopted a double-blind within-subject protocol in which we delivered a single-session of anodal versus sham transcranial Direct Current Stimulation (tDCS) over the left dlPFC during the completion of a task assessing attention control. We also assessed its subsequent impact on attentional bias. Neither attention control nor attentional bias did significantly improve following anodal tDCS. Although our results did not support our main hypothesis, we believe the present null results to be particularly useful for future meta-research in the field. We also formulated a series of methodological recommendations for future research aiming at testing the tDCS-induced modification of attentional bias. [less ▲]

Detailed reference viewed: 91 (0 UL)