26,171 research outputs found
Openness as Infrastructure
Openness at the layer of cultural works and data is the key to the data infrastructure we need to accelerate science. This article lays out three key elements of data infrastructure - collaboration, classification, and openness - which draw us inevitably towards the long-claimed, but rarely-achieved, goal of the scientific method: to make claims that are reproducible under similar circumstances by someone other than the claimant, to be reproducible
Estimating An Optimal Backpropagation Algorithm for Training An ANN with the EGFR Exon 19 Nucleotide Sequence: An Electronic Diagnostic Basis for Non–Small Cell Lung Cancer(NSCLC)
One of the most common forms of medical malpractices globally is an error in diagnosis. An improper
diagnosis occurs when a doctor fails to identify a disease or report a disease when the patient is actually
healthy. A disease that is commonly misdiagnosed is lung cancer. This cancer type is a major health problem
internationally because it is responsible for 15% of all cancer diagnosis and 29% of all cancer deaths. The two
major sub-types of lung cancer are; small cell lung cancer (about 13%) and non-small cell lung cancer
(%SCLC- about 87%). The chance of surviving lung cancer depends on its correct diagnosis and/or the stage at
the time it is diagnosed. However, recent studies have identified somatic mutations in the epidermal growth
factor receptor (EGFR) gene in a subset of non-small cell lung cancer (%SCLC) tumors. These mutations occur
in the tyrosine kinase domain of the gene. The most predominant of the mutations in all %SCLC patients
examined is deletion mutation in exon 19 and it accounts for approximately 90% of the EGFR-activating
mutations. This makes EGFR genomic sequence a good candidate for implementing an electronic diagnostic
system for %SCLC. In this study aimed at estimating an optimum backpropagation training algorithm for a
genomic based A%% system for %SCLC diagnosis, the nucleotide sequences of EGFR’s exon 19 of a noncancerous
cell were used to train an artificial neural network (A%%). Several A%% back propagation training
algorithms were tested in MATLAB R2008a to obtain an optimal algorithm for training the network. Of the nine
different algorithms tested, we achieved the best performance (i.e. the least mean square error) with the
minimum epoch (training iterations) and training time using the Levenberg-Marquardt algorithm
Mathematical practice, crowdsourcing, and social machines
The highest level of mathematics has traditionally been seen as a solitary
endeavour, to produce a proof for review and acceptance by research peers.
Mathematics is now at a remarkable inflexion point, with new technology
radically extending the power and limits of individuals. Crowdsourcing pulls
together diverse experts to solve problems; symbolic computation tackles huge
routine calculations; and computers check proofs too long and complicated for
humans to comprehend.
Mathematical practice is an emerging interdisciplinary field which draws on
philosophy and social science to understand how mathematics is produced. Online
mathematical activity provides a novel and rich source of data for empirical
investigation of mathematical practice - for example the community question
answering system {\it mathoverflow} contains around 40,000 mathematical
conversations, and {\it polymath} collaborations provide transcripts of the
process of discovering proofs. Our preliminary investigations have demonstrated
the importance of "soft" aspects such as analogy and creativity, alongside
deduction and proof, in the production of mathematics, and have given us new
ways to think about the roles of people and machines in creating new
mathematical knowledge. We discuss further investigation of these resources and
what it might reveal.
Crowdsourced mathematical activity is an example of a "social machine", a new
paradigm, identified by Berners-Lee, for viewing a combination of people and
computers as a single problem-solving entity, and the subject of major
international research endeavours. We outline a future research agenda for
mathematics social machines, a combination of people, computers, and
mathematical archives to create and apply mathematics, with the potential to
change the way people do mathematics, and to transform the reach, pace, and
impact of mathematics research.Comment: To appear, Springer LNCS, Proceedings of Conferences on Intelligent
Computer Mathematics, CICM 2013, July 2013 Bath, U
Toward an Ecology of Gaming
In her introduction to the Ecology of Games, Salen argues for the need for an increasingly complex and informed awareness of the meaning, significance, and practicalities of games in young people's lives. The language of the media is replete with references to the devil (and heavy metal) when it comes to the ill-found virtues of videogames, while a growing movement in K-12 education casts them as a Holy Grail in the uphill battle to keep kids learning. Her essay explores the different ways the volume's contributors add shades of grey to this often black-and-white mix, pointing toward a more sophisticated understanding of the myriad ways in which gaming could and should matter to those considering the future of learning
Strategies for protecting intellectual property when using CUDA applications on graphics processing units
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering
Recommended from our members
Climate Change and Television: What the Paris Agreement means for broadcasters
In December 2015, the Paris Agreement was signed and governments committed themselves to major reductions in their carbon emissions. These commitments imply far reaching changes to everyday life.
In this report, Joe Smith talks to a range of broadcasters, independent producers and academics. He argues that television has a good track record of making issues related
to climate change accessible to mainstream audiences and he makes some concrete suggestions for ways in which it could continue to tell a range of stories about climate change
that will engage audiences and better equip them to respond to this dynamic story
Modularity in action.GNU/Linux and free/Open source sotfware development model unleashed.
Organizational and managerial theories of modularity applied to the design and production of complex artifacts are used to interpret the rise and success of Free/Open Source Software methodologies and practices in software engineeringmodularity; software project management; free/open source software; division of labor; coordination; information hiding
Championing the extended schools social workers role – prevention and practice
Introduction
The Every Child Matters (ecm) policy and rollout of Extended Schools agenda, has massively changed the social agenda in schools and there an industry of practitioners working in schools has arisen. Enter professional social workers into the arena and the Extended Schools Social Worker (ESSW) role is born. This report charts the development and progress of this role and explores its remit and scope.
Methodology
Five participants included a team colleague, school link person, school manager, educational psychologist and social care manager were interviewed to obtain a rounded view of the ESSW role. A composite case study was constructed based on generic details that typify issues tackled in this preventative role. This served as a basis for discussion about the role. A series of reflections linked to how the policies were implemented in practice, termed ‘reflective policy’ were then grouped in themes.
Findings:
The findings suggest that social workers do have an important role to play in prevention and are having a positive effect on the profession’s image. Referrals are seen to arrive in social care by a circuitous route and ESSWs are bringing social work skills and knowledge to improve safeguarding approaches in schools. The level of severity of casework has been on the rise, in a climate of increasing demand on social care systems. There are risks associated with the role and although the acknowledgment of consent prior to family engagement is a helpful one, it brings a new risk of managing what is known prior to consent. There is a need for greater management resources and sustainability. A more equal partnership with schools promoted. Strengths include the range of activities tailored to local community needs, the scope of the role and opportunities to link with and promote CAF (Common Assessment Framework) systems including TACs (Team Around the Child)
- …