1,913 research outputs found
Designing a Semantically Rich Visual Iinterface for Cultural Digital Libraries Using the UNESCO Multilingual Thesaurus
This paper reports on the design of a visual user interface for the UNESCO digital portal. The interface makes use of the UNESCO multilingual thesaurus to provide visualized views of terms and their relationships and the way in which spaces associated with the thesaurus, the query and the results can be integrated into a single user interface.\u
How do LSE Blogs impact the academic sphere? Exploring the effects of blogging on published research
In the second of a series of posts on the Impact of LSE Blogs project, Carlos Arrebola and Amy Mollett share the first findings of an LSE study that sought to examine the effects of blogging on the success of published articles. While the study proved to be more exploratory than explanatory, with the positive effects on citations particularly difficult to demonstrate conclusively, data does show that blogging enhances the overall attention paid to published research
Introducing the Impact of LSE Blogs project!
Since launching in 2010, more than 2000 contributors have written for LSE’s public-facing academic blogs, reaching an ever-expanding, international audience. But how do we measure the impact of this particular form of research communication? In the first of a short series of posts, Carlos Arrebola and Amy Mollett introduce the Impact of LSE Blogs project. As well as following the progress of the project here on the Impact Blog, you are also invited to join us at a dedicated event at LSE on Wednesday 14 June
Aridec: an open database of litter mass loss from aridlands worldwide with recommendations on suitable model applications
Plant litter decomposition in terrestrial ecosystems involves the physical and chemical breakdown of organic matter. Development of databases is a promising tool for achieving a predictive understanding of organic matter degradation at regional and global scales. In this paper, we present aridec, a comprehensive open database containing litter mass loss data from aridlands across the world. We describe in detail the structure of the database and discuss general patterns in the data. Then, we explore what are the most appropriate model structures to integrate with data on litter decomposition from the database by conducting a collinearity analysis. The database includes 184 entries from aridlands across the world, representing a wide range of climates. For the majority of the data gathered in aridec, it is possible to fit models of litter decomposition that consider initial organic matter as a homogenous reservoir (one pool models), as well as models with two distinct types of organic compounds that decompose at different speeds (two pool models). Moreover, these two carbon pools can either decompose without interaction (parallel models) or with matter transfer from a labile pool to a slowly decomposing pool after transformation (series models). Although most entries in the database can be used to fit these models, we suggest that potential users of this database test identifiability for each individual case as well as the number of degrees of freedom. Other model applications that are not discussed in this publication might also be suitable for use with this database. Lastly, we give some recommendations for future decomposition studies to be potentially added to this database. The extent of the information included in aridec in addition to its open-science approach makes it a great platform for future collaborative efforts in the field of aridland biogeochemistry
Cuando el desarrollo importa: de la psicología evolucionista a la
This article presents evolutionary developmental psychology (EDP) as an emerging field of evolutionary psychology (EP). In describing the core tenets of both approaches and the differences between them, we emphasize the important roles that evolution and development have in understanding human behaviour. We suggest that developmental psychologists should pay more attention to evolutionary issues and, conversely, evolutionary psychologists should take development seriously. Key words: evolutionary developmental psychology, evolutionary psychology, developmental psychology, evolutionary theory.Este artículo presenta la psicología evolucionista del desarrollo (PED) como una perspectiva que emerge de la psicología evolucionista (PE). Al describir las asunciones principales de ambos enfoques, así como sus diferencias, se enfatiza la importancia que la evolución y el desarrollo tienen para la comprensión del comportamiento humano. Se sugiere que los psicólogos del desarrollo deberían prestar más atención a las cuestiones evolucionistas y, a la inversa, los psicólogos evolucionistas deberían tomar el desarrollo en serio. Palabras clave: psicología evolucionista del desarrollo, psicología evolucionista, psicología del desarrollo, teoría de la evolución
Cuando el desarrollo importa: de la psicología evolucionista a la
This article presents evolutionary developmental psychology (EDP) as an emerging field of evolutionary psychology (EP). In describing the core tenets of both approaches and the differences between them, we emphasize the important roles that evolution and development have in understanding human behaviour. We suggest that developmental psychologists should pay more attention to evolutionary issues and, conversely, evolutionary psychologists should take development seriously. Key words: evolutionary developmental psychology, evolutionary psychology, developmental psychology, evolutionary theory.Este artículo presenta la psicología evolucionista del desarrollo (PED) como una perspectiva que emerge de la psicología evolucionista (PE). Al describir las asunciones principales de ambos enfoques, así como sus diferencias, se enfatiza la importancia que la evolución y el desarrollo tienen para la comprensión del comportamiento humano. Se sugiere que los psicólogos del desarrollo deberían prestar más atención a las cuestiones evolucionistas y, a la inversa, los psicólogos evolucionistas deberían tomar el desarrollo en serio. Palabras clave: psicología evolucionista del desarrollo, psicología evolucionista, psicología del desarrollo, teoría de la evolución
Promoting VCU Community Solutions
This promotional project focuses on VCU Community Solutions — the new interdisciplinary initiative for education, research, and service. Since this initiative demonstrates the synergy that students, faculty, and community members can create by working together, the promotional video captures their perspectives. Through interviews and footage of community programs, the video shows how VCU Community Solutions engages university and community partners in addressing critical social issues — creating more imovative approaches by working together
Implementación de un virus enfocado en dispositivos móviles Android. Un evento de hacking ético
Mobile devices have become part of daily social life. However, the vulnerabilities of this equipment are widespread, affecting information or damaging the system internally. Within this problem, this research proposes the implementation of a virus that allows affecting the Android victim device focusing on finding the vulnerabilities through penetration tests. The virus was designed through the principle of thread programming to a generation of scripts. Furthermore, the attack on Android devices’ vulnerable systems is conducted, applying social engineering techniques. Thus, through imperative programming techniques and functional, the access and use have been achieved, given that the virus had classes that allow connection and communication with the device. Each class was developed together so that in this way, there is a precise relationship between them. In this study, Kali Linux, with different Metasploit commands, was used. The proofs of concept were conducted using controlled virtual network environments. For this, a server and a platform were used to use the IP and the Ngrok host, which allows us to generate a link with the application that will violate Android’s services and security over secure tunnels. The results show that the operating system tends to be prone to internal damage. At the same time, users can be affected when their security and privacy are compromised. The proposal contributes significantly to a new version of Android’s security patches, implementing a malware model that will integrate techniques to mitigate this problem in the future.Los dispositivos móviles se han convertido en parte de la vida social diaria. Sin embargo, las vulnerabilidades de este equipo están muy extendidas, afectando la información o dañando el sistema internamente. Dentro de esta problemática, esta investigación propone la implementación de un virus que permita afectar al dispositivo Android víctima enfocándose en encontrar las vulnerabilidades mediante pruebas de penetración. El virus fue diseñado a través del principio de programación de subprocesos para una generación de scripts. Además, se realiza el ataque a los sistemas vulnerables de los dispositivos Android, aplicando técnicas de ingeniería social. Así, mediante técnicas de programación imperativas y funcionales, se ha logrado el acceso y uso, dado que el virus contaba con clases que permiten la conexión y comunicación con el dispositivo. Cada clase se desarrolló en conjunto para que de esta manera, haya una relación precisa entre ellas. En este estudio se utilizó Kali Linux, con diferentes comandos de Metasploit. Las pruebas de concepto se realizaron utilizando entornos de red virtual controlados. Para ello se utilizó un servidor y una plataforma para utilizar la IP y el host Ngrok, lo que nos permite generar un enlace con la aplicación que vulnerara´ los servicios y la seguridad de Android sobre túneles seguros. Los resultados muestran que el sistema operativo tiende a ser propenso a sufrir daños internos. Al mismo tiempo, los usuarios pueden verse afectados cuando su seguridad y privacidad se ven comprometidas. La propuesta contribuye significativamente a una nueva versión de los parches de seguridad de Android, implementando un modelo de malware que integrara´ técnicas para mitigar este problema en el futuro
- …