135,882 research outputs found

    CBmeter- a new medical device for early screening of metabolic diseases

    Get PDF
    Type 2 diabetes mellitus (T2DM) is a highly prevalent disease worldwide which is asymptomatic in about 44% of patients being critical to search for new ways of early diagnosis. Recent studies have demonstrated that the etiology of this disease may be associated with alterations in the function of the carotid body (CB), a chemosensor organ located within the bifurcation of the carotid artery. In animal models of metabolic syndrome it was observed that the CBs are overactivated, underlying diseases such as obesity, hypertension and T2DM. This discovery provided a new paradigm in the neuroendocrinology field, suggesting that diagnostic function of the CBs has predictive value for the development of metabolic diseases. Despite this fact, it is not common in clinical practice to look at the CBs as organs associated with endocrine dysfunction and we believe this is probably due to the nonexistence of a user-friendly, portable medical device that diagnosis the function of the CBs.info:eu-repo/semantics/publishedVersio

    Nowcasting Thunderstorms for Munich Airport

    Get PDF
    The successful demonstration and assessment of the DLR thunderstorm nowcasting algorithms at Munich Airport during two campaigns in the summers of 2010 and 2011 are described. The algorithms Cb-TRAM and Rad-TRAM, that detect, monitor, and forecast up to one hour (nowcast) thunderstorm cells from satellite and radar data, run in real time and provided new thunderstorm products for users at the airport. The products were presented on displays the users were already familiar with as well as on webpages designed by DLR. On the webpages, also additional information like measurements with DLR’s polarimetric radar and model forecasts was shown. Moreover, thunderstorm warnings were is-sued and sent via email to the users whenever a thunderstorm was detected in the terminal manoeu-vring area of the airport of Munich. The nowcasting skills of Rad-TRAM and Cb-TRAM are encouraging, especially for lead times up to 30 minutes, and the user feedback on the DLR thunderstorm products was very positive. The Rad-TRAM and Cb-TRAM products provide a good overview on the situation and its future development, and the thunderstorm warnings were very helpful for the collaborative decision making at the airport. However, some suggestions for improvements were made like the demand for nowcasts beyond one hour. This will be considered within the integrated weather forecast system, WxFUSION, which has been further developed during the campaigns

    Elements of Cellular Blind Interference Alignment --- Aligned Frequency Reuse, Wireless Index Coding and Interference Diversity

    Full text link
    We explore degrees of freedom (DoF) characterizations of partially connected wireless networks, especially cellular networks, with no channel state information at the transmitters. Specifically, we introduce three fundamental elements --- aligned frequency reuse, wireless index coding and interference diversity --- through a series of examples, focusing first on infinite regular arrays, then on finite clusters with arbitrary connectivity and message sets, and finally on heterogeneous settings with asymmetric multiple antenna configurations. Aligned frequency reuse refers to the optimality of orthogonal resource allocations in many cases, but according to unconventional reuse patterns that are guided by interference alignment principles. Wireless index coding highlights both the intimate connection between the index coding problem and cellular blind interference alignment, as well as the added complexity inherent to wireless settings. Interference diversity refers to the observation that in a wireless network each receiver experiences a different set of interferers, and depending on the actions of its own set of interferers, the interference-free signal space at each receiver fluctuates differently from other receivers, creating opportunities for robust applications of blind interference alignment principles

    An Ontario Libraries' Network, or Cooperative Entanglement

    Get PDF
    While I accepted the invitation to discuss the College Bibliocentre at this Clinic, I cannot say that I did so with equanimity. Quite apart from many organizational difficulties, the systems both in operation and in varying stages of development at the College Bibliocentre, have evolved from practical emersion without the benefit of the finite planning or initial test and research proce- dures from grant aids that many others have experienced. This is why I adopted the latter part of my title for this paper. I was asked particularly to discuss the techniques we are using to acquire the necessary input to the various systems. However, if I was asked to underline what I considered to be the major problems facing the development of a central technical service unit, the technicalities of how to input would be the least concern. The major problems are those beyond the technological requirements how to achieve the degree of coordination required and, in particular, how to overcome the financial hazards which face such an organiza- tion.published or submitted for publicatio

    Improving Reachability and Navigability in Recommender Systems

    Full text link
    In this paper, we investigate recommender systems from a network perspective and investigate recommendation networks, where nodes are items (e.g., movies) and edges are constructed from top-N recommendations (e.g., related movies). In particular, we focus on evaluating the reachability and navigability of recommendation networks and investigate the following questions: (i) How well do recommendation networks support navigation and exploratory search? (ii) What is the influence of parameters, in particular different recommendation algorithms and the number of recommendations shown, on reachability and navigability? and (iii) How can reachability and navigability be improved in these networks? We tackle these questions by first evaluating the reachability of recommendation networks by investigating their structural properties. Second, we evaluate navigability by simulating three different models of information seeking scenarios. We find that with standard algorithms, recommender systems are not well suited to navigation and exploration and propose methods to modify recommendations to improve this. Our work extends from one-click-based evaluations of recommender systems towards multi-click analysis (i.e., sequences of dependent clicks) and presents a general, comprehensive approach to evaluating navigability of arbitrary recommendation networks

    Online Influence Maximization (Extended Version)

    Full text link
    Social networks are commonly used for marketing purposes. For example, free samples of a product can be given to a few influential social network users (or "seed nodes"), with the hope that they will convince their friends to buy it. One way to formalize marketers' objective is through influence maximization (or IM), whose goal is to find the best seed nodes to activate under a fixed budget, so that the number of people who get influenced in the end is maximized. Recent solutions to IM rely on the influence probability that a user influences another one. However, this probability information may be unavailable or incomplete. In this paper, we study IM in the absence of complete information on influence probability. We call this problem Online Influence Maximization (OIM) since we learn influence probabilities at the same time we run influence campaigns. To solve OIM, we propose a multiple-trial approach, where (1) some seed nodes are selected based on existing influence information; (2) an influence campaign is started with these seed nodes; and (3) users' feedback is used to update influence information. We adopt the Explore-Exploit strategy, which can select seed nodes using either the current influence probability estimation (exploit), or the confidence bound on the estimation (explore). Any existing IM algorithm can be used in this framework. We also develop an incremental algorithm that can significantly reduce the overhead of handling users' feedback information. Our experiments show that our solution is more effective than traditional IM methods on the partial information.Comment: 13 pages. To appear in KDD 2015. Extended versio

    The patterning of finance/security : a designerly walkthrough of challenger banking apps

    Get PDF
    Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps

    Must-Take Cards: Merchant Discounts and Avoided Costs

    Get PDF
    Antitrust authorities often argue that merchants cannot reasonably turn down payment cards and therefore must accept excessively high merchant discounts. The paper attempts to shed light on this “must-take cards” view from two angles. First, the paper gives some operational content to the notion of “must-take card” through the “avoided-cost test” or “tourist test”: would the merchant want to refuse a card payment when a non-repeat customer with enough cash in her pocket is about to pay at the cash register? It analyzes its relevance as an indicator of excessive interchange fees. Second, it identifies four key sources of potential social biases in the payment card systems’ determination of interchange fees: internalization by merchants of a fraction of cardholder surplus, issuers’ per-transaction markup, merchant heterogeneity, and extent of cardholder multi-homing. It compares the industry and social optima both in the short term (fixed number of issuers) and the long term (in which issuer offerings and entry respond to profitability)
    corecore