Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailNanoscale interfacial engineering enables highly stable and efficient perovskite photovoltaics
Krishna, Anurag; Zhang, Hong; Zhou, Zhiwen et al

in Energy and Environmental Science (2021)

Detailed reference viewed: 50 (5 UL)
Full Text
Peer Reviewed
See detailA platform for experimental precision medicine: The extended BXD mouse family.
Ashbrook, David G.; Arends, Danny; Prins, Pjotr et al

in Cell systems (2021), 12(3), 235-2479

The challenge of precision medicine is to model complex interactions among DNA variants, phenotypes, development, environments, and treatments. We address this challenge by expanding the BXD family of ... [more ▼]

The challenge of precision medicine is to model complex interactions among DNA variants, phenotypes, development, environments, and treatments. We address this challenge by expanding the BXD family of mice to 140 fully isogenic strains, creating a uniquely powerful model for precision medicine. This family segregates for 6 million common DNA variants-a level that exceeds many human populations. Because each member can be replicated, heritable traits can be mapped with high power and precision. Current BXD phenomes are unsurpassed in coverage and include much omics data and thousands of quantitative traits. BXDs can be extended by a single-generation cross to as many as 19,460 isogenic F1 progeny, and this extended BXD family is an effective platform for testing causal modeling and for predictive validation. BXDs are a unique core resource for the field of experimental precision medicine. [less ▲]

Detailed reference viewed: 72 (4 UL)
Full Text
See detailThe Long-Term Effect of Research Grants on the Scientific Output of University Professors
Hussinger, Katrin UL; Carvalho, J.N.

E-print/Working paper (2021)

Detailed reference viewed: 130 (9 UL)
See detailBildung für nachhaltige Entwicklung als Kompetenzorientierung
Andersen, Katja Natalie UL

in KiTa aktuell HRS - Fachzeitschrift für Leitungen, Fachkräfte und Träger der Kindertagesbetreuung (2021), 29(9), 197

Detailed reference viewed: 95 (2 UL)
Full Text
See detailRapport final Projet 2020: Le capital social dans l'intégration des jeunes migrants au Luxembourg
Vysotskaya, Volha UL; Oliveira, José UL; Nienaber, Birte UL

Report (2021)

The SOCAMI project focuses on the importance of social ties in the integration pathways of young migrants from third countries in Luxembourg. Youth is a period rich in learning where social identities and ... [more ▼]

The SOCAMI project focuses on the importance of social ties in the integration pathways of young migrants from third countries in Luxembourg. Youth is a period rich in learning where social identities and feelings of belonging to a social group are developed. In this sense, the analysis of the role of social ties in the integration of young migrants is essential. In particular, the ties that young migrants establish with residents of their host country may endure in the future and should therefore be considered relevant in the formation of their social relationships. However, young migrants often find themselves in vulnerable situations linked to job insecurity or, more broadly, marginalisation within the host society. Thus, it is mainly the relationships fostered by youth organisations, governmental or non-governmental, formal or informal, that play a central role in the preparation of young migrants for adult life. The overall aim of this study is to understand, investigate, explain and scientifically formulate the role of social capital in the integration of young migrants residing in Luxembourg. [less ▲]

Detailed reference viewed: 90 (2 UL)
See detailPolicy failure in urban governance: the case of large digital corporations
Carr, Constance UL; Hesse, Markus UL

Presentation (2021)

This paper draws upon the branch of urban studies literature known as policy mobilities (McCann 2011) and, particularly, policy failure (Temenos & Lauermann 2020) to understand the strategic practices of ... [more ▼]

This paper draws upon the branch of urban studies literature known as policy mobilities (McCann 2011) and, particularly, policy failure (Temenos & Lauermann 2020) to understand the strategic practices of large digital corporations (LDCs) in urban development. While it is a relatively new phenomenon that LDCs are appearing as important actors in the field of urban development, their role has moved beyond being simply the producers of new technological products that supposedly make cities more efficient, green and smart. They are, for example, in the background, forging their central position in the functioning of cities by taking up space (land, water, bodies) for so-called essential urban infrastructures such as data centers (Carr 2021) needed to support their technologies. At the same time, they are also driving the production of what we refer to as their symbolic spaces of LDC-style digital cities. These are Amazon’s HQ2 and the digital city that was proposed by Sidewalk Labs Toronto (daughter firm of Alphabet Inc.), projects that epitomised both their importance in the field and the height of their technological innovation. Yet, striking about these cases is that, with the exception of the HQ2 in Arlington, these projects never materialized. In this paper, we argue that this was not a coincidence. Rather, both Amazon and Alphabet effectively mobilized a strategy of policy-making that has recently received attention in the urban studies literature: policy failure (Lovell 2017; Temenos & Lauermann 2020). Viewing these cases through the lens of policy failure shows that LDC-led digital cities is not so much about producing flashy cities equipped with avant-garde technologies as it is about endorsing a post-political mode of urban governance that drains public institutions of time and resources and reconfigures state-society relations. This is a cautionary tale for practitioners, who need to understand and watch out for the flags of this disingenuous behaviour. [less ▲]

Detailed reference viewed: 106 (5 UL)
Full Text
Peer Reviewed
See detailTemporal Networks Based Industry Identification for Bitcoin Users
Han, Weili; Chen, Dingjie; Pang, Jun UL et al

in Proceedings of 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA'21) (2021)

Detailed reference viewed: 44 (4 UL)
See detailReview - The Lost Soldier: The Ordeal of a World War II GI from the Home Front to the Hürtgen Forest
Janz, Nina UL

in Michigan War Studies Review (2021)

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailMolecular pathways behind acquired obesity: Adipose tissue and skeletal muscle multiomics in monozygotic twin pairs discordant for BMI.
van der Kolk, Birgitta W.; Saari, Sina; Lovric, Alen et al

in Cell Reports Medicine (2021), 2(4), 100226

Tissue-specific mechanisms prompting obesity-related development complications in humans remain unclear. We apply multiomics analyses of subcutaneous adipose tissue and skeletal muscle to examine the ... [more ▼]

Tissue-specific mechanisms prompting obesity-related development complications in humans remain unclear. We apply multiomics analyses of subcutaneous adipose tissue and skeletal muscle to examine the effects of acquired obesity among 49 BMI-discordant monozygotic twin pairs. Overall, adipose tissue appears to be more affected by excess body weight than skeletal muscle. In heavier co-twins, we observe a transcriptional pattern of downregulated mitochondrial pathways in both tissues and upregulated inflammatory pathways in adipose tissue. In adipose tissue, heavier co-twins exhibit lower creatine levels; in skeletal muscle, glycolysis- and redox stress-related protein and metabolite levels remain higher. Furthermore, metabolomics analyses in both tissues reveal that several proinflammatory lipids are higher and six of the same lipid derivatives are lower in acquired obesity. Finally, in adipose tissue, but not in skeletal muscle, mitochondrial downregulation and upregulated inflammation are associated with a fatty liver, insulin resistance, and dyslipidemia, suggesting that adipose tissue dominates in acquired obesity. [less ▲]

Detailed reference viewed: 47 (6 UL)
Full Text
Peer Reviewed
See detailDexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
Daoudi, Nadia UL; Samhi, Jordan UL; Kabore, Abdoul Kader UL et al

in Communications in Computer and Information Science (2021)

Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such ... [more ▼]

Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such as malware detection, where deep learning on images alleviates the need for comprehensively hand-crafted features generalising to different malware variants. We postulate that this research direction could become the next frontier in Android malware detection, and therefore requires a clear roadmap to ensure that new approaches indeed bring novel contributions. We contribute with a first building block by developing and assessing a baseline pipeline for image-based malware detection with straightforward steps. We propose DexRay, which converts the bytecode of the app DEX files into grey-scale “vector” images and feeds them to a 1-dimensional Convolutional Neural Network model. We view DexRay as foundational due to the exceedingly basic nature of the design choices, allowing to infer what could be a minimal performance that can be obtained with image-based learning in malware detection. The performance of DexRay evaluated on over 158k apps demonstrates that, while simple, our approach is effective with a high detection rate(F1-score= 0.96). Finally, we investigate the impact of time decay and image-resizing on the performance of DexRay and assess its resilience to obfuscation. This work-in-progress paper contributes to the domain of Deep Learning based Malware detection by providing a sound, simple, yet effective approach (with available artefacts) that can be the basis to scope the many profound questions that will need to be investigated to fully develop this domain. [less ▲]

Detailed reference viewed: 123 (23 UL)
Full Text
Peer Reviewed
See detailThe Blockchain Effect: From Inter-Ecosystem to Intra-Ecosystem Competition
Höß, Alexandra UL; Schlatt, Vincent; Rieger, Alexander UL et al

in Proceedings of the Twenty-Ninth European Conference on Information Systems (ECIS) (2021)

Blockchains enable distributed operation, decentralized control, and token-based representations of tangible and intangible assets. Organizations commonly use blockchain technology to foster collaboration ... [more ▼]

Blockchains enable distributed operation, decentralized control, and token-based representations of tangible and intangible assets. Organizations commonly use blockchain technology to foster collaboration. In this paper, we investigate the use of blockchain to foster competition. We conduct a single-case study of Germany’s mobility-as-a-service community and its efforts to use blockchain as a technical backbone for mobility ecosystems. The community views blockchain as a technology that embodies organizing principles of empowerment and equality. These principles motivated the community to rethink ecosystem structure. In particular, the community began to question the exclusive, non-adversarial position of mobility service aggregators. We find that rethinking this position might shift their competitive focus from the inter- to the intra-ecosystem level and enables the creation of a larger ecosystem. As a second-order effect, the community began to rethink ecosystem governance. Specifically, it began to explore options for effectively distributed decision making while safeguarding efficiency. [less ▲]

Detailed reference viewed: 156 (5 UL)
Full Text
Peer Reviewed
See detailThe supply of hours worked and fluctuations between growth regimes
Irmen, Andreas UL; Iong, Ka-Kit UL

in Journal of Economic Theory (2021)

Declining hours of work per worker in conjunction with a growing work force may give rise to fluctuations between growth regimes. This is shown in an overlapping generations model with two-period lived ... [more ▼]

Declining hours of work per worker in conjunction with a growing work force may give rise to fluctuations between growth regimes. This is shown in an overlapping generations model with two-period lived individuals endowed with Boppart-Krusell preferences (Boppart and Krusell (2020)). On the supply side, economic growth is due to the expansion of consumption-good varieties through endogenous research. A sufficiently negative equilibrium elasticity of the individual supply of hours worked to an expansion in the set of consumption-good varieties destabilizes the steady state so that equilibrium trajectories may fluctuate between two growth regimes, one with and the other without an active research sector. Fluctuations affect intergenerational welfare, the evolution of GDP, and the functional income distribution. A stabilization policy can shift the economy onto its steady-state path. Fluctuations arise for empirically reasonable parameter constellations. The economics of fluctuations between growth regimes is linked to the intergenerational trade of shares and their pricing in the asset market. [less ▲]

Detailed reference viewed: 34 (1 UL)
Full Text
Peer Reviewed
See detailThe supply of hours worked and fluctuations between growth regimes
Irmen, Andreas UL; Iong, Ka-Kit UL

Scientific Conference (2021)

Declining hours of work per worker in conjunction with a growing work force may give rise to fluctuations between growth regimes. This is shown in an overlapping generations model with two-period lived ... [more ▼]

Declining hours of work per worker in conjunction with a growing work force may give rise to fluctuations between growth regimes. This is shown in an overlapping generations model with two-period lived individuals endowed with Boppart-Krusell preferences (Boppart and Krusell (2020)). On the supply side, economic growth is due to the expansion of consumption-good varieties through endogenous research. A sufficiently negative equilibrium elasticity of the individual supply of hours worked to an expansion in the set of consumption-good varieties destabilizes the steady state so that equilibrium trajectories may fluctuate between two growth regimes, one with and the other without an active research sector. Fluctuations affect intergenerational welfare, the evolution of GDP, and the functional income distribution. A stabilization policy can shift the economy onto its steady-state path. Fluctuations arise for empirically reasonable parameter constellations. The economics of fluctuations between growth regimes is linked to the intergenerational trade of shares and their pricing in the asset market. [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailA gravity analysis of refugee mobility using mobile phone data
Beine, Michel UL; Bertinelli, Luisito UL; Cömertpay, Rana UL et al

in Journal of Development Economics (2021)

Detailed reference viewed: 119 (11 UL)
Full Text
See detailAutomation, Growth, and Factor Shares in the Era of Population Aging
Irmen, Andreas UL

Presentation (2021)

How does population aging affect economic growth and factor shares in times of increasingly automatable production processes? The present paper addresses this question in a new macroeconomic model of ... [more ▼]

How does population aging affect economic growth and factor shares in times of increasingly automatable production processes? The present paper addresses this question in a new macroeconomic model of automation where competitive firms perform tasks to produce output. Tasks require labor and machines as inputs. New machines embody superior technological knowledge and substitute for labor in the performance of tasks. Automation is labor-augmenting in the reduced-form aggregate production function. If wages increase then the incentive to automate becomes stronger. Moreover, the labor share declines even though the aggregate production function is Cobb–Douglas. Population aging due to a higher longevity reduces automation in the short and promotes it in the long run. It boosts the growth rate of absolute and per-capita GDP in the short and the long run, lifts the labor share in the short and reduces it in the long run. Population aging due to a decline in fertility increases automation, reduces the growth rate of GDP, and lowers the labor share in the short and the long run. In the short run, it may or may not increase the growth rate of per-capita GDP, in the long run it unequivocally accelerates per-capita GDP growth. [less ▲]

Detailed reference viewed: 51 (3 UL)
Full Text
Peer Reviewed
See detailPower and Bandwidth Minimization for Demand-Aware GEO Satellite Systems
Abdu, Tedros Salih UL; Kisseleff, Steven UL; Lagunas, Eva UL et al

Scientific Conference (2021)

Smart radio resource allocation combined with the recent advances of digital payloads will allow to control the transmit power and bandwidth of the satellites depending on the demand and the channel ... [more ▼]

Smart radio resource allocation combined with the recent advances of digital payloads will allow to control the transmit power and bandwidth of the satellites depending on the demand and the channel conditions of users. The system flexibility is important not only to handle divergent demand requirements but also to efficiently utilize the limited and expensive satellite resources. In this paper, we propose a demand-aware smart radio resource allocation technique, where the transmit power and the bandwidth of the GEO satellite are minimized while satisfying the user demand. The formulated optimization problem is non-convex mixed-integer nonlinear program which is difficult to solve. Hence, we apply a quadratic transform to solve the problem iteratively. The numerical results showed that the proposed scheme outperforms the benchmark schemes in terms of bandwidth utilization while accurately providing capacity-ondemand. [less ▲]

Detailed reference viewed: 107 (33 UL)
Full Text
See detailEin Schritt vor, zwei Schritte zurück? - Folgen einer verpflichtenden Zugriffsmöglichkeit auf verschlüsselte Daten
Schmitz, Sandra UL; Schiffner, Stefan UL

in Taeger, Jürgen (Ed.) Im Fokus der Rechtsentwicklung – Die Digitalisierung der Welt (2021)

Detailed reference viewed: 45 (9 UL)
Full Text
Peer Reviewed
See detailA workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms
Stojkovski, Borce UL; Lenzini, Gabriele UL

in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (2021)

Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing ... [more ▼]

Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model. [less ▲]

Detailed reference viewed: 73 (14 UL)
Full Text
Peer Reviewed
See detailInterfered by unaccomplished academic tasks: The role of success expectations
Brassler, Nina; Grund, Axel UL; Dedic, Maid et al

in Learning and Motivation (2021), 76

Characteristics of concurring action alternatives can influence the experience and behavior in a focal action. In two scenario studies we investigated the role of success expectancies of an unaccomplished ... [more ▼]

Characteristics of concurring action alternatives can influence the experience and behavior in a focal action. In two scenario studies we investigated the role of success expectancies of an unaccomplished academic task as a relevant motivational characteristic to explain the experience and behavior during a focal leisure activity. Students imagined themselves in scenarios which were experimentally manipulated by varying the presence of a motivational conflict and the description of the concurring action. They anticipated what they would experience in these situations. Results indicate that students experience more impairments in situations of motivational conflict than when there is no conflict. Even more important, when success expectancies for the unaccomplished academic task were described as low, the anticipated impairments were higher than when expectations were described as high. Influencing expectations is discussed as one starting point for handling negative consequences of motivational conflicts due to academic tasks. [less ▲]

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailRadio Frequency Interference Detection Using Nonnegative Matrix Factorization
Silva, Felipe B.; Cetin, Ediz; Alves Martins, Wallace UL

in IEEE Transactions on Aerospace and Electronic Systems (2021)

This work proposes a new pre-correlation interference detection technique based on nonnegative matrix factorization (NMF) for global navigation satellite system (GNSS) signals. The proposed technique uses ... [more ▼]

This work proposes a new pre-correlation interference detection technique based on nonnegative matrix factorization (NMF) for global navigation satellite system (GNSS) signals. The proposed technique uses NMF to extract the time and frequency properties of the received signal from its spectrogram. The estimated spectral shape is then compared with the spectrogram’s time slices by means of a similarity function to detect the presence of radio frequency interference (RFI). In the presence of RFI, the NMF estimated spectral shape tends to be well-defined, resulting in high similarity levels. In contrast, in the absence of RFI, the received signal is solely comprised of noise and GNSS signals resulting in a noise like spectral shape estimate, leading to considerably reduced similarity levels. The proposal exploits this different similarity levels to detect the presence of interference. Simulation results indicate that the proposed technique yields increased detection capability with low false alarm rate even in low jammer-to-noise ratio environments for both narrow and wideband interference sources without requiring fine-tuning of parameters for specific RFI types. In addition, the proposal has reduced computational complexity, when compared with an existing statistical-based detector. [less ▲]

Detailed reference viewed: 65 (1 UL)