5,634 research outputs found

    Direct observation of voids in the vacancy excess region of ion bombarded silicon

    Get PDF
    The results reported in this letter indicate that the spatial separation of the vacancy and interstitial excesses which result from ion bombardment gives rise to stable voids upon annealing at 850 °C even for implants where the projected ion range is only of the order of a few thousand Ångstrom. Such voids have been observed directly by transmission electron microscopy. Furthermore, in cases where both voids and interstitial-based defects are present at different depths, it is found that Au has a strong preference for decorating void surfaces and hence Au can, indeed, be used as a selective detector of open volume defects in Si.One of the authors ~J.W.-L.! acknowledges the Australian Research Council for financial support

    Increasing Access To Bioinformatics Resources: Increase Community Curation by Increasing Your Community

    Get PDF
    The amount of biological data has risen exponentially over the last decade. Along with this rise, the number and types of bioinformatics resources has risen such that the sheer number of bioinformatics resources is overwhelming. For these resources to attain their full potential, they must be efficiently and extensively utilized. But in such a plethora of resources, how does a researcher new to a field find the resources that will meet their needs. Once a resource is found, how does the researcher quickly learn to utilize that resource fully? There are resource lists such as those provided by the journal Nucleic Acid Research (NAR), BioMed Central and the Univ. of Pittsburgh Health Sciences Library, and most resources include their own documentation. But lists and site documentation don’t always cast a wide enough net to catch all users. 

For a resource to truly maximize their user community, it often takes multiple different outreach approaches. OpenHelix specializes in providing customized outreach services to bioinformatics resources, including those featured on this poster. 

Based on the conclusions from our Phase I SBIR grant, which tested the efficiency of several methods for training researchers on the use of genomic resources, OpenHelix ("www.openhelix.com":http://www.openhelix.com) has developed, and currently provides up-to-date online training materials on a large number of bioinformatics resources, covering major providers and research areas. 

Through a Phase II SBIR grant from NHGRI and other funding, we are developing a search portal for online bioinformatics resources. With the search portal, researchers will be able to find the bioinformatics and genomics online databases and resources most relevant to their needs. The search portal will contain an index of hundreds of the most popular and powerful resources, as well as the content of over 100 OpenHelix tutorials. Using various ranking techniques, the portal will be able to provide more relevant results than a simple keyword search. Additionally, as part of an extension of our Phase II grant, we are providing a sponsored suite of Model Organism Database trainings that include GBrowse, FlyBase, MGI, RGD, SGD, WormBase and ZFIN. We are also developing, and will be offering, sponsored live trainings on resources at NCBI as a way of filling the void left by the demise of the NCBI Field Guide outreach programs. 

Conclusion: OpenHelix aims to increase community curation by helping resources increase their user communit

    Nanoindentation-induced deformation of Ge

    Get PDF
    The deformation mechanisms of crystalline (100) Ge were studied using nanoindentation, cross sectional transmission electron microscopy (XTEM) and Raman microspectroscopy. For a wide range of indentation conditions using both spherical and pointed indenters, multiple discontinuities were found in the force–displacement curves on loading, but no discontinuities were found on unloading. Raman microspectroscopy, measured from samples which had plastically deformed on loading, showed a spectrum shift from that in pristine Ge, suggesting only residual strain. No evidence (such as extra Raman bands) was found to suggest that any pressure-induced phase transformations had occurred, despite the fact that the material had undergone severe plastic deformation.Selected area diffraction pattern studies of the mechanically damaged regions also confirmed the absence of additional phases. Moreover, XTEM showed that, at low loads, plastic deformation occurs by twinning and dislocation motion. This indicates that the hardness of Gemeasured by indentation is not primarily dominated by phase transformation, rather by the nucleation and propagation of twin bands and/or dislocations

    The human fear-circuitry and fear-induced fainting in healthy individuals The paleolithic-threat hypothesis

    Get PDF
    The Paleolithic-Threat hypothesis reviewed here posits that habitual efferent fainting can be traced back to fear-induced allelic polymorphisms that were selected into some genomes of anatomically, mitochondrially, and neurally modern humans (Homo sapiens sapiens) in the Mid-Paleolithic because of the survival advantage they conferred during periods of inescapable threat. We posit that during Mid-Paleolithic warfare an encounter with “a stranger holding a sharp object” was consistently associated with threat to life. A heritable hard- wired or firm-wired (prepotentiated) predisposition to abruptly increase vagal tone and collapse flaccidly rather than freeze or attempt to flee or fight in response to an approaching sharp object, a minor injury, or the sight of blood, polymorphism for the hemodynamically “paradoxical” flaccid- immobility in response to these stimuli may have increased some non-combatants’ chances of survival. This is consistent with the unusual age and sex pattern of fear-induced fainting. The Paleolithic-Threat hypothesis also predicts a link to various hypo-androgenic states (e.g. low dehydroxyepiandrosterone-sulfate. We offer five predictions testable via epidemiological, clinical, and ethological/primatological methods. The Paleolithic-Threat hypothesis has implications for research in the aftermath of man-made disasters, such as terrorism against civilians, a traumatic event in which this hypothesis predicts epidemics of fear-induced faintin

    Human Perception of Audio Deepfakes

    Full text link
    The recent emergence of deepfakes has brought manipulated and generated content to the forefront of machine learning research. Automatic detection of deepfakes has seen many new machine learning techniques, however, human detection capabilities are far less explored. In this paper, we present results from comparing the abilities of humans and machines for detecting audio deepfakes used to imitate someone's voice. For this, we use a web-based application framework formulated as a game. Participants were asked to distinguish between real and fake audio samples. In our experiment, 472 unique users competed against a state-of-the-art AI deepfake detection algorithm for 14912 total of rounds of the game. We find that humans and deepfake detection algorithms share similar strengths and weaknesses, both struggling to detect certain types of attacks. This is in contrast to the superhuman performance of AI in many application areas such as object detection or face recognition. Concerning human success factors, we find that IT professionals have no advantage over non-professionals but native speakers have an advantage over non-native speakers. Additionally, we find that older participants tend to be more susceptible than younger ones. These insights may be helpful when designing future cybersecurity training for humans as well as developing better detection algorithms.Comment: Published at ACM Multimedia 2022 Workshop DDAM First International Workshop on Deepfake Detection for Audio Multimedia at ACM Multimedia 202

    The STRS (shortness of breath, tremulousness, racing heart, and sweating): A brief checklist for acute distress with panic-like autonomic indicators; development and factor structure

    Get PDF
    Background: Peritraumatic response, as currently assessed by Posttraumatic Stress Disorder (PTSD) diagnostic criterion A2, has weak positive predictive value (PPV) with respect to PTSD diagnosis. Research suggests that indicators of peritraumatic autonomic activation may supplement the PPV of PTSD criterion A2. We describe the development and factor structure of the STRS (Shortness of Breath, Tremulousness, Racing Heart, and Sweating), a one page, two-minute checklist with a five-point Likert-type response format based on a previously unpublished scale. It is the first validated self-report measure of peritraumatic activation of the autonomic nervous system.\ud \ud Methods: We selected items from the Potential Stressful Events Interview (PSEI) to represent two latent variables: 1) PTSD diagnostic criterion A, and 2) acute autonomic activation. Participants (a convenience sample of 162 non-treatment seeking young adults) rated the most distressing incident of their lives on these items. We examined the factor structure of the STRS in this sample using factor and cluster analysis.\ud \ud Results: Results confirmed a two-factor model. The factors together accounted for 68% of the variance. The variance in each item accounted for by the two factors together ranged from 41% to 74%. The item loadings on the two factors mapped precisely onto the two proposed latent variables.\ud \ud Conclusion: The factor structure of the STRS is robust and interpretable. Autonomic activation signs tapped by the STRS constitute a dimension of the acute autonomic activation in response to stress that is distinct from the current PTSD criterion A2. Since the PTSD diagnostic criteria are likely to change in the DSM-V, further research is warranted to determine whether signs of peritraumatic autonomic activation such as those measured by this two-minute scale add to the positive predictive power of the current PTSD criterion A2. Additionally, future research is warranted to explore whether the four automatic activation items of the STRS can be useful as the basis for a possible PTSD criterion A3 in the DSM-V

    Implementing non-traditional assessment strategies in teacher preparation: Opportunities and challenges

    Get PDF
    Assessment and grading in higher education have traditionally focused on “A” through “F”, or point-based alpha-numeric letter grades and subjective, independent grading systems. Despite the ubiquity of this system, there are no universal guidelines on how to assess student learning on that scale. What can be problematic about “the way things have always been” is that students are frequently de-humanized; higher education faculty often focus on compliance and authoritarian teaching rather than engaging in the learning process alongside the students. In contrast, some faculty members have explored non-traditional assessment practices in their coursework to enhance the learning process and improve individualized student support. This article offers strategies for implementing non-traditional assessments, specifically mediated office hours, mastery learning, and ungrading strategies are addressed

    Shortcut Removal for Improved OOD-Generalization

    Full text link
    Machine learning is a data-driven discipline, and learning success is largely dependent on the quality of the underlying data sets. However, it is becoming increasingly clear that even high performance on held-out test data does not necessarily mean that a model generalizes or learns anything meaningful at all. One reason for this is the presence of machine learning shortcuts, i.e., hints in the data that are predictive but accidental and semantically unconnected to the problem. We present a new approach to detect such shortcuts and a technique to automatically remove them from datasets. Using an adversarially trained lens, any small and highly predictive clues in images can be detected and removed. We show that this approach 1) does not cause degradation of model performance in the absence of these shortcuts, and 2) reliably identifies and neutralizes shortcuts from different image datasets. In our experiments, we are able to recover up to 93,8% of model performance in the presence of different shortcuts. Finally, we apply our model to a real-world dataset from the medical domain consisting of chest x-rays and identify and remove several types of shortcuts that are known to hinder real-world applicability. Thus, we hope that our proposed approach fosters real-world applicability of machine learning
    • …
    corecore