135,882 research outputs found
CBmeter- a new medical device for early screening of metabolic diseases
Type 2 diabetes mellitus (T2DM) is a highly prevalent disease worldwide which is asymptomatic in about 44% of patients being critical to search for new ways of early diagnosis. Recent studies have demonstrated that the etiology of this disease may be associated with alterations in the function of the carotid body (CB), a chemosensor organ located within the bifurcation of the carotid artery. In animal models of metabolic syndrome it was observed that the CBs are overactivated, underlying diseases such as obesity, hypertension and T2DM. This discovery provided a new paradigm in the neuroendocrinology field, suggesting that diagnostic function of the CBs has predictive value for the development of metabolic diseases. Despite this fact, it is not common in clinical practice to look at the CBs as organs associated with endocrine dysfunction and we believe this is probably due to the nonexistence of a user-friendly, portable medical device that diagnosis the function of the CBs.info:eu-repo/semantics/publishedVersio
Nowcasting Thunderstorms for Munich Airport
The successful demonstration and assessment of the DLR thunderstorm nowcasting algorithms at Munich Airport during two campaigns in the summers of 2010 and 2011 are described. The algorithms Cb-TRAM and Rad-TRAM, that detect, monitor, and forecast up to one hour (nowcast) thunderstorm cells from satellite and radar data, run in real time and provided new thunderstorm products for users at the airport. The products were presented on displays the users were already familiar with as well as on webpages designed by DLR. On the webpages, also additional information like measurements with DLR’s polarimetric radar and model forecasts was shown. Moreover, thunderstorm warnings were is-sued and sent via email to the users whenever a thunderstorm was detected in the terminal manoeu-vring area of the airport of Munich. The nowcasting skills of Rad-TRAM and Cb-TRAM are encouraging, especially for lead times up to 30 minutes, and the user feedback on the DLR thunderstorm products was very positive. The Rad-TRAM and Cb-TRAM products provide a good overview on the situation and its future development, and the thunderstorm warnings were very helpful for the collaborative decision making at the airport. However, some suggestions for improvements were made like the demand for nowcasts beyond one hour. This will be considered within the integrated weather forecast system, WxFUSION, which has been further developed during the campaigns
Elements of Cellular Blind Interference Alignment --- Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity
We explore degrees of freedom (DoF) characterizations of partially connected
wireless networks, especially cellular networks, with no channel state
information at the transmitters. Specifically, we introduce three fundamental
elements --- aligned frequency reuse, wireless index coding and interference
diversity --- through a series of examples, focusing first on infinite regular
arrays, then on finite clusters with arbitrary connectivity and message sets,
and finally on heterogeneous settings with asymmetric multiple antenna
configurations. Aligned frequency reuse refers to the optimality of orthogonal
resource allocations in many cases, but according to unconventional reuse
patterns that are guided by interference alignment principles. Wireless index
coding highlights both the intimate connection between the index coding problem
and cellular blind interference alignment, as well as the added complexity
inherent to wireless settings. Interference diversity refers to the observation
that in a wireless network each receiver experiences a different set of
interferers, and depending on the actions of its own set of interferers, the
interference-free signal space at each receiver fluctuates differently from
other receivers, creating opportunities for robust applications of blind
interference alignment principles
An Ontario Libraries' Network, or Cooperative Entanglement
While I
accepted the invitation to discuss the College Bibliocentre at
this Clinic, I cannot
say that I did so with equanimity. Quite apart from many
organizational difficulties, the systems both in operation and in varying stages
of
development at the College Bibliocentre, have evolved from practical emersion
without the benefit of the finite
planning or initial test and research proce-
dures from
grant aids that many others have experienced. This is why I
adopted the latter part of my title for this paper.
I was asked
particularly to discuss the techniques we are using to
acquire the necessary input to the various systems. However, if I was asked to
underline what I considered to be the
major problems facing the development
of a central technical service unit, the technicalities of how to
input would be
the least concern. The
major problems are those beyond the technological
requirements how to achieve the degree of coordination required and, in
particular, how to overcome the financial hazards which face such an organiza-
tion.published or submitted for publicatio
Improving Reachability and Navigability in Recommender Systems
In this paper, we investigate recommender systems from a network perspective
and investigate recommendation networks, where nodes are items (e.g., movies)
and edges are constructed from top-N recommendations (e.g., related movies). In
particular, we focus on evaluating the reachability and navigability of
recommendation networks and investigate the following questions: (i) How well
do recommendation networks support navigation and exploratory search? (ii) What
is the influence of parameters, in particular different recommendation
algorithms and the number of recommendations shown, on reachability and
navigability? and (iii) How can reachability and navigability be improved in
these networks? We tackle these questions by first evaluating the reachability
of recommendation networks by investigating their structural properties.
Second, we evaluate navigability by simulating three different models of
information seeking scenarios. We find that with standard algorithms,
recommender systems are not well suited to navigation and exploration and
propose methods to modify recommendations to improve this. Our work extends
from one-click-based evaluations of recommender systems towards multi-click
analysis (i.e., sequences of dependent clicks) and presents a general,
comprehensive approach to evaluating navigability of arbitrary recommendation
networks
Online Influence Maximization (Extended Version)
Social networks are commonly used for marketing purposes. For example, free
samples of a product can be given to a few influential social network users (or
"seed nodes"), with the hope that they will convince their friends to buy it.
One way to formalize marketers' objective is through influence maximization (or
IM), whose goal is to find the best seed nodes to activate under a fixed
budget, so that the number of people who get influenced in the end is
maximized. Recent solutions to IM rely on the influence probability that a user
influences another one. However, this probability information may be
unavailable or incomplete. In this paper, we study IM in the absence of
complete information on influence probability. We call this problem Online
Influence Maximization (OIM) since we learn influence probabilities at the same
time we run influence campaigns. To solve OIM, we propose a multiple-trial
approach, where (1) some seed nodes are selected based on existing influence
information; (2) an influence campaign is started with these seed nodes; and
(3) users' feedback is used to update influence information. We adopt the
Explore-Exploit strategy, which can select seed nodes using either the current
influence probability estimation (exploit), or the confidence bound on the
estimation (explore). Any existing IM algorithm can be used in this framework.
We also develop an incremental algorithm that can significantly reduce the
overhead of handling users' feedback information. Our experiments show that our
solution is more effective than traditional IM methods on the partial
information.Comment: 13 pages. To appear in KDD 2015. Extended versio
The patterning of finance/security : a designerly walkthrough of challenger banking apps
Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps
Must-Take Cards: Merchant Discounts and Avoided Costs
Antitrust authorities often argue that merchants cannot reasonably turn down payment cards and therefore must accept excessively high merchant discounts. The paper
attempts to shed light on this “must-take cards” view from two angles.
First, the paper gives some operational content to the notion of “must-take card” through the “avoided-cost test” or “tourist test”: would the merchant want to refuse a
card payment when a non-repeat customer with enough cash in her pocket is about to pay at the cash register? It analyzes its relevance as an indicator of excessive interchange fees.
Second, it identifies four key sources of potential social biases in the payment card systems’ determination of interchange fees: internalization by merchants of a fraction of cardholder surplus, issuers’ per-transaction markup, merchant heterogeneity, and extent of cardholder multi-homing. It compares the industry and social optima both in the short term (fixed number of issuers) and the long term (in which issuer offerings and entry
respond to profitability)
- …
