844 research outputs found

    The European Union must have a closer link to national politics if it is to retain its legitimacy

    Get PDF
    National governments are still involved in negotiations over nominating a candidate for the next President of the European Commission. Anand Menon writes that while much of this debate has focused on the merits of individual candidates such as Jean-Claude Juncker, the real issue is a structural one concerning the future of the European Parliament. He argues that, whichever candidate is nominated, the European Parliament is no longer fit for purpose as a mechanism for legitimising the EU. Only by forging a stronger link between the Union and politics at the national level can the EU’s democratic legitimacy be ensured

    The next UK government must not let talk of a Brexit undermine its attempts to influence EU decision-making

    Get PDF
    With the UK going to the polls on Thursday, it is still far from certain which party will emerge with enough seats to form the next government. Anand Menon writes that regardless of whether Labour or the Conservatives win power, the issue of Europe will play a key role in the next parliament. He argues that there is a danger talk of a referendum on EU membership could undermine attempts by the UK to shape EU decision-making, which would be particularly undesirable given that the current EU agenda is more congruent with British interests than it has been at any time in recent memory

    UK in a changing Europe: injecting social science into a polarised political debate

    Get PDF
    Reflecting on seven years of UK in a Changing Europe, Anand Menon and Jill Rutter discuss how the project has brought social science insights into the mainstream of a polarised public debate. Highlighting how this mode of engagement falls outside of orthodox ‘REF Impact’ and lessons learned, they suggest there are further opportunities to deploy similar models to other socio-political challenges

    A hierarchy index for networks in the brain reveals a complex entangled organizational structure

    Full text link
    Networks involved in information processing often have their nodes arranged hierarchically, with the majority of connections occurring in adjacent levels. However, despite being an intuitively appealing concept, the hierarchical organization of large networks, such as those in the brain, are difficult to identify, especially in absence of additional information beyond that provided by the connectome. In this paper, we propose a framework to uncover the hierarchical structure of a given network, that identifies the nodes occupying each level as well as the sequential order of the levels. It involves optimizing a metric that we use to quantify the extent of hierarchy present in a network. Applying this measure to various brain networks, ranging from the nervous system of the nematode Caenorhabditis elegans to the human connectome, we unexpectedly find that they exhibit a common network architectural motif intertwining hierarchy and modularity. This suggests that brain networks may have evolved to simultaneously exploit the functional advantages of these two types of organizations, viz., relatively independent modules performing distributed processing in parallel and a hierarchical structure that allows sequential pooling of these multiple processing streams. An intriguing possibility is that this property we report may be common to information processing networks in general.Comment: 16 pages, 5 figures + 10 pages Supplementary Informatio

    Speaking for Britain? MPs broadly reflect the views of their supporters on Europe – but one side should worry a little more than the other

    Get PDF
    Do MPs’ views on Europe reflect those of their voters? Tim Bale (left), Sofia Vasilopoulou, Philip Cowley and Anand Menon asked both groups the same questions about the EU, and found some notable differences on the issues of freedom of movement and migrant benefits. In particular, Labour voters are significantly more Eurosceptic than the MPs they elect

    What are the economic consequences of May’s deal – and of no deal?

    Get PDF
    What will the economic impact of Theresa May’s deal be? And how does it compare to the no-deal scenario?The LSE’s Centre for Economic Performance, in association with The UK in a Changing Europe, has modelled both scenarios and examined the effects on migration, fiscal policy, trade and productivity. The authors – Anand Menon, Jonathan Portes (King’s College London), Peter Levell (Institute for Fiscal Studies) and Thomas Sampson (LSE) – also look at the relative cost of the ‘divorce bill’ – the payments the UK has agreed to make to the EU

    A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues

    Get PDF
    © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.Peer reviewe

    Brachial plexopathy in breast cancer: is it radiation related? An analysis technique and dose volume parameters to brachial plexus in breast cancer radiotherapy

    Get PDF
    Background: Brachial plexus dysfunction is a rare but well-recognized complication of breast cancer surgery and radiotherapy. Most of the time it presents as paraesthesia of the arm. In an earlier publication Dan Lundstedt et al from Sweden, quantitatively assessed the radiation related brachial plexopathy (mainly paraesthesia) with the help of dose volume histograms and its co relation between patient reported paraesthesia. Paraesthesia was reported by 25% after radiation therapy to the supraclavicular fossa, with a V40 Gy 13.5 cm3 and maximum dose to brachial plexus (Dmax) was not found to correlate with paraesthesia. In order to predict the risk brachial plexopathy in our patients we decided to analyze the dose volume parameters for brachial plexus in carcinoma breast patients treated at our institution with modern radiotherapy techniques.Methods: Twenty five consecutive patients who received post mastectomy radiation during the period September 2015 to January 2016 with a dose of 50Gy in 25 fractions were included for this analysis. Brachial plexus contoured using RTOG guidelines, and dose volume parameters for brachial plexus were documented from the existing treatment plans.Results: The maximum dose to the brachial plexus ranged from 5045cGy to 5679cGy with a mean value of 5312.8cGy. The mean dose received by the brachial plexus ranged from 3093cGy to 4714cGy and the mean value was 4137.28cGy. Volume receiving 40Gy, that is V40, ranged from 2.0078cc to 11.56cc with a mean value of 7.57cc.Conclusions: Maximum dose and V40 Gy values were well below the tolerance limit of plexus, and hence post mastectomy irradiation with modern techniques is unlikely to produce significant brachial plexus neuropathy

    Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment

    Get PDF
    © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/)Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019.Peer reviewe

    Sarcomatoid Carcinoma Metastasis to the Colon from a Small Renal Mass: Case Report with Review of Literature

    Get PDF
    A third of patients with renal cell carcinoma (RCC) present with metastatic disease. Metastasis in RCC from small renal mass (SRM) (≤4 cm) is rare. We report a case of stage cT1a clear-cell RCC with low-risk features on pathology presenting with disproportionately large synchronous solitary metastasis to the transverse colon. He underwent resection of the mass with the involved transverse colon and adjoining mesocolon. Intestinal continuity was restored, following which partial nephrectomy was performed for the right renal tumor. Final pathology of the right renal mass confirmed clear-cell RCC. The large mass after immunohistochemistry profile confirmed metastasis from the renal tumor
    • …
    corecore