26,171 research outputs found

    Openness as Infrastructure

    Get PDF
    Openness at the layer of cultural works and data is the key to the data infrastructure we need to accelerate science. This article lays out three key elements of data infrastructure - collaboration, classification, and openness - which draw us inevitably towards the long-claimed, but rarely-achieved, goal of the scientific method: to make claims that are reproducible under similar circumstances by someone other than the claimant, to be reproducible

    Estimating An Optimal Backpropagation Algorithm for Training An ANN with the EGFR Exon 19 Nucleotide Sequence: An Electronic Diagnostic Basis for Non–Small Cell Lung Cancer(NSCLC)

    Get PDF
    One of the most common forms of medical malpractices globally is an error in diagnosis. An improper diagnosis occurs when a doctor fails to identify a disease or report a disease when the patient is actually healthy. A disease that is commonly misdiagnosed is lung cancer. This cancer type is a major health problem internationally because it is responsible for 15% of all cancer diagnosis and 29% of all cancer deaths. The two major sub-types of lung cancer are; small cell lung cancer (about 13%) and non-small cell lung cancer (%SCLC- about 87%). The chance of surviving lung cancer depends on its correct diagnosis and/or the stage at the time it is diagnosed. However, recent studies have identified somatic mutations in the epidermal growth factor receptor (EGFR) gene in a subset of non-small cell lung cancer (%SCLC) tumors. These mutations occur in the tyrosine kinase domain of the gene. The most predominant of the mutations in all %SCLC patients examined is deletion mutation in exon 19 and it accounts for approximately 90% of the EGFR-activating mutations. This makes EGFR genomic sequence a good candidate for implementing an electronic diagnostic system for %SCLC. In this study aimed at estimating an optimum backpropagation training algorithm for a genomic based A%% system for %SCLC diagnosis, the nucleotide sequences of EGFR’s exon 19 of a noncancerous cell were used to train an artificial neural network (A%%). Several A%% back propagation training algorithms were tested in MATLAB R2008a to obtain an optimal algorithm for training the network. Of the nine different algorithms tested, we achieved the best performance (i.e. the least mean square error) with the minimum epoch (training iterations) and training time using the Levenberg-Marquardt algorithm

    Mathematical practice, crowdsourcing, and social machines

    Full text link
    The highest level of mathematics has traditionally been seen as a solitary endeavour, to produce a proof for review and acceptance by research peers. Mathematics is now at a remarkable inflexion point, with new technology radically extending the power and limits of individuals. Crowdsourcing pulls together diverse experts to solve problems; symbolic computation tackles huge routine calculations; and computers check proofs too long and complicated for humans to comprehend. Mathematical practice is an emerging interdisciplinary field which draws on philosophy and social science to understand how mathematics is produced. Online mathematical activity provides a novel and rich source of data for empirical investigation of mathematical practice - for example the community question answering system {\it mathoverflow} contains around 40,000 mathematical conversations, and {\it polymath} collaborations provide transcripts of the process of discovering proofs. Our preliminary investigations have demonstrated the importance of "soft" aspects such as analogy and creativity, alongside deduction and proof, in the production of mathematics, and have given us new ways to think about the roles of people and machines in creating new mathematical knowledge. We discuss further investigation of these resources and what it might reveal. Crowdsourced mathematical activity is an example of a "social machine", a new paradigm, identified by Berners-Lee, for viewing a combination of people and computers as a single problem-solving entity, and the subject of major international research endeavours. We outline a future research agenda for mathematics social machines, a combination of people, computers, and mathematical archives to create and apply mathematics, with the potential to change the way people do mathematics, and to transform the reach, pace, and impact of mathematics research.Comment: To appear, Springer LNCS, Proceedings of Conferences on Intelligent Computer Mathematics, CICM 2013, July 2013 Bath, U

    Toward an Ecology of Gaming

    Get PDF
    In her introduction to the Ecology of Games, Salen argues for the need for an increasingly complex and informed awareness of the meaning, significance, and practicalities of games in young people's lives. The language of the media is replete with references to the devil (and heavy metal) when it comes to the ill-found virtues of videogames, while a growing movement in K-12 education casts them as a Holy Grail in the uphill battle to keep kids learning. Her essay explores the different ways the volume's contributors add shades of grey to this often black-and-white mix, pointing toward a more sophisticated understanding of the myriad ways in which gaming could and should matter to those considering the future of learning

    Strategies for protecting intellectual property when using CUDA applications on graphics processing units

    Get PDF
    Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering

    Modularity in action.GNU/Linux and free/Open source sotfware development model unleashed.

    Get PDF
    Organizational and managerial theories of modularity applied to the design and production of complex artifacts are used to interpret the rise and success of Free/Open Source Software methodologies and practices in software engineeringmodularity; software project management; free/open source software; division of labor; coordination; information hiding

    Championing the extended schools social workers role – prevention and practice

    Get PDF
    Introduction The Every Child Matters (ecm) policy and rollout of Extended Schools agenda, has massively changed the social agenda in schools and there an industry of practitioners working in schools has arisen. Enter professional social workers into the arena and the Extended Schools Social Worker (ESSW) role is born. This report charts the development and progress of this role and explores its remit and scope. Methodology Five participants included a team colleague, school link person, school manager, educational psychologist and social care manager were interviewed to obtain a rounded view of the ESSW role. A composite case study was constructed based on generic details that typify issues tackled in this preventative role. This served as a basis for discussion about the role. A series of reflections linked to how the policies were implemented in practice, termed ‘reflective policy’ were then grouped in themes. Findings: The findings suggest that social workers do have an important role to play in prevention and are having a positive effect on the profession’s image. Referrals are seen to arrive in social care by a circuitous route and ESSWs are bringing social work skills and knowledge to improve safeguarding approaches in schools. The level of severity of casework has been on the rise, in a climate of increasing demand on social care systems. There are risks associated with the role and although the acknowledgment of consent prior to family engagement is a helpful one, it brings a new risk of managing what is known prior to consent. There is a need for greater management resources and sustainability. A more equal partnership with schools promoted. Strengths include the range of activities tailored to local community needs, the scope of the role and opportunities to link with and promote CAF (Common Assessment Framework) systems including TACs (Team Around the Child)
    • …
    corecore