1,913 research outputs found

    Designing a Semantically Rich Visual Iinterface for Cultural Digital Libraries Using the UNESCO Multilingual Thesaurus

    Get PDF
    This paper reports on the design of a visual user interface for the UNESCO digital portal. The interface makes use of the UNESCO multilingual thesaurus to provide visualized views of terms and their relationships and the way in which spaces associated with the thesaurus, the query and the results can be integrated into a single user interface.\u

    How do LSE Blogs impact the academic sphere? Exploring the effects of blogging on published research

    Get PDF
    In the second of a series of posts on the Impact of LSE Blogs project, Carlos Arrebola and Amy Mollett share the first findings of an LSE study that sought to examine the effects of blogging on the success of published articles. While the study proved to be more exploratory than explanatory, with the positive effects on citations particularly difficult to demonstrate conclusively, data does show that blogging enhances the overall attention paid to published research

    Introducing the Impact of LSE Blogs project!

    Get PDF
    Since launching in 2010, more than 2000 contributors have written for LSE’s public-facing academic blogs, reaching an ever-expanding, international audience. But how do we measure the impact of this particular form of research communication? In the first of a short series of posts, Carlos Arrebola and Amy Mollett introduce the Impact of LSE Blogs project. As well as following the progress of the project here on the Impact Blog, you are also invited to join us at a dedicated event at LSE on Wednesday 14 June

    Aridec: an open database of litter mass loss from aridlands worldwide with recommendations on suitable model applications

    Get PDF
    Plant litter decomposition in terrestrial ecosystems involves the physical and chemical breakdown of organic matter. Development of databases is a promising tool for achieving a predictive understanding of organic matter degradation at regional and global scales. In this paper, we present aridec, a comprehensive open database containing litter mass loss data from aridlands across the world. We describe in detail the structure of the database and discuss general patterns in the data. Then, we explore what are the most appropriate model structures to integrate with data on litter decomposition from the database by conducting a collinearity analysis. The database includes 184 entries from aridlands across the world, representing a wide range of climates. For the majority of the data gathered in aridec, it is possible to fit models of litter decomposition that consider initial organic matter as a homogenous reservoir (one pool models), as well as models with two distinct types of organic compounds that decompose at different speeds (two pool models). Moreover, these two carbon pools can either decompose without interaction (parallel models) or with matter transfer from a labile pool to a slowly decomposing pool after transformation (series models). Although most entries in the database can be used to fit these models, we suggest that potential users of this database test identifiability for each individual case as well as the number of degrees of freedom. Other model applications that are not discussed in this publication might also be suitable for use with this database. Lastly, we give some recommendations for future decomposition studies to be potentially added to this database. The extent of the information included in aridec in addition to its open-science approach makes it a great platform for future collaborative efforts in the field of aridland biogeochemistry

    Cuando el desarrollo importa: de la psicología evolucionista a la

    Get PDF
    This article presents evolutionary developmental psychology (EDP) as an emerging field of evolutionary psychology (EP). In describing the core tenets of both approaches and the differences between them, we emphasize the important roles that evolution and development have in understanding human behaviour. We suggest that developmental psychologists should pay more attention to evolutionary issues and, conversely, evolutionary psychologists should take development seriously. Key words: evolutionary developmental psychology, evolutionary psychology, developmental psychology, evolutionary theory.Este artículo presenta la psicología evolucionista del desarrollo (PED) como una perspectiva que emerge de la psicología evolucionista (PE). Al describir las asunciones principales de ambos enfoques, así como sus diferencias, se enfatiza la importancia que la evolución y el desarrollo tienen para la comprensión del comportamiento humano. Se sugiere que los psicólogos del desarrollo deberían prestar más atención a las cuestiones evolucionistas y, a la inversa, los psicólogos evolucionistas deberían tomar el desarrollo en serio. Palabras clave: psicología evolucionista del desarrollo, psicología evolucionista, psicología del desarrollo, teoría de la evolución

    Cuando el desarrollo importa: de la psicología evolucionista a la

    Get PDF
    This article presents evolutionary developmental psychology (EDP) as an emerging field of evolutionary psychology (EP). In describing the core tenets of both approaches and the differences between them, we emphasize the important roles that evolution and development have in understanding human behaviour. We suggest that developmental psychologists should pay more attention to evolutionary issues and, conversely, evolutionary psychologists should take development seriously. Key words: evolutionary developmental psychology, evolutionary psychology, developmental psychology, evolutionary theory.Este artículo presenta la psicología evolucionista del desarrollo (PED) como una perspectiva que emerge de la psicología evolucionista (PE). Al describir las asunciones principales de ambos enfoques, así como sus diferencias, se enfatiza la importancia que la evolución y el desarrollo tienen para la comprensión del comportamiento humano. Se sugiere que los psicólogos del desarrollo deberían prestar más atención a las cuestiones evolucionistas y, a la inversa, los psicólogos evolucionistas deberían tomar el desarrollo en serio. Palabras clave: psicología evolucionista del desarrollo, psicología evolucionista, psicología del desarrollo, teoría de la evolución

    Promoting VCU Community Solutions

    Get PDF
    This promotional project focuses on VCU Community Solutions — the new interdisciplinary initiative for education, research, and service. Since this initiative demonstrates the synergy that students, faculty, and community members can create by working together, the promotional video captures their perspectives. Through interviews and footage of community programs, the video shows how VCU Community Solutions engages university and community partners in addressing critical social issues — creating more imovative approaches by working together

    Implementación de un virus enfocado en dispositivos móviles Android. Un evento de hacking ético

    Get PDF
    Mobile devices have become part of daily social life. However, the vulnerabilities of this equipment are widespread, affecting information or damaging the system internally. Within this problem, this research proposes the implementation of a virus that allows affecting the Android victim device focusing on finding the vulnerabilities through penetration tests. The virus was designed through the principle of thread programming to a generation of scripts. Furthermore, the attack on Android devices’ vulnerable systems is conducted, applying social engineering techniques. Thus, through imperative programming techniques and functional, the access and use have been achieved, given that the virus had classes that allow connection and communication with the device. Each class was developed together so that in this way, there is a precise relationship between them. In this study, Kali Linux, with different Metasploit commands, was used.  The proofs of concept were conducted using controlled virtual network environments. For this, a server and a platform were used to use the IP and the Ngrok host, which allows us to generate       a link with the application that will violate Android’s services and security over secure tunnels. The results show that the operating system tends to be prone to internal damage. At the same time, users can be affected when their security and privacy are compromised. The proposal contributes significantly to a new version of Android’s security patches, implementing   a malware model that will integrate techniques to mitigate this problem in the future.Los dispositivos  móviles se  han convertido  en parte de la vida social diaria. Sin embargo, las vulnerabilidades de este equipo están muy extendidas, afectando la información o dañando el sistema internamente. Dentro de esta problemática, esta investigación propone la implementación de un virus que permita  afectar  al  dispositivo  Android  víctima  enfocándose en encontrar las vulnerabilidades mediante pruebas de penetración.   El   virus   fue   diseñado   a   través   del   principio   de programación de subprocesos para una generación de scripts. Además,  se  realiza  el  ataque  a  los  sistemas  vulnerables  de los  dispositivos  Android,  aplicando  técnicas  de  ingeniería  social.  Así,  mediante  técnicas  de  programación  imperativas  y funcionales, se ha logrado el acceso y uso, dado que el virus contaba  con  clases  que  permiten  la  conexión  y  comunicación con  el  dispositivo.  Cada  clase  se  desarrolló  en  conjunto  para que de esta manera, haya una relación precisa entre ellas. En este estudio se utilizó  Kali Linux, con diferentes comandos de Metasploit. Las pruebas de concepto se realizaron utilizando entornos  de  red  virtual  controlados.  Para  ello  se  utilizó  un servidor y una plataforma para utilizar la IP y el host Ngrok, lo  que  nos  permite  generar  un  enlace  con  la  aplicación  que vulnerara´ los servicios y la seguridad de Android sobre túneles seguros. Los resultados muestran que el sistema operativo tiende a ser propenso a sufrir daños internos. Al mismo tiempo, los usuarios pueden verse afectados cuando su seguridad y privacidad se ven comprometidas. La propuesta contribuye significativamente   a   una   nueva   versión   de   los   parches   de seguridad de Android, implementando un modelo de malware que integrara´ técnicas para mitigar este problema en el futuro
    corecore