5,634 research outputs found
Direct observation of voids in the vacancy excess region of ion bombarded silicon
The results reported in this letter indicate that the spatial separation of the vacancy and interstitial excesses which result from ion bombardment gives rise to stable voids upon annealing at 850 °C even for implants where the projected ion range is only of the order of a few thousand Ångstrom. Such voids have been observed directly by transmission electron microscopy. Furthermore, in cases where both voids and interstitial-based defects are present at different depths, it is found that Au has a strong preference for decorating void surfaces and hence Au can, indeed, be used as a selective detector of open volume defects in Si.One of the authors ~J.W.-L.!
acknowledges the Australian Research Council for financial
support
Increasing Access To Bioinformatics Resources: Increase Community Curation by Increasing Your Community
The amount of biological data has risen exponentially over the last decade. Along with this rise, the number and types of bioinformatics resources has risen such that the sheer number of bioinformatics resources is overwhelming. For these resources to attain their full potential, they must be efficiently and extensively utilized. But in such a plethora of resources, how does a researcher new to a field find the resources that will meet their needs. Once a resource is found, how does the researcher quickly learn to utilize that resource fully? There are resource lists such as those provided by the journal Nucleic Acid Research (NAR), BioMed Central and the Univ. of Pittsburgh Health Sciences Library, and most resources include their own documentation. But lists and site documentation don’t always cast a wide enough net to catch all users. 

For a resource to truly maximize their user community, it often takes multiple different outreach approaches. OpenHelix specializes in providing customized outreach services to bioinformatics resources, including those featured on this poster. 

Based on the conclusions from our Phase I SBIR grant, which tested the efficiency of several methods for training researchers on the use of genomic resources, OpenHelix ("www.openhelix.com":http://www.openhelix.com) has developed, and currently provides up-to-date online training materials on a large number of bioinformatics resources, covering major providers and research areas. 

Through a Phase II SBIR grant from NHGRI and other funding, we are developing a search portal for online bioinformatics resources. With the search portal, researchers will be able to find the bioinformatics and genomics online databases and resources most relevant to their needs. The search portal will contain an index of hundreds of the most popular and powerful resources, as well as the content of over 100 OpenHelix tutorials. Using various ranking techniques, the portal will be able to provide more relevant results than a simple keyword search. Additionally, as part of an extension of our Phase II grant, we are providing a sponsored suite of Model Organism Database trainings that include GBrowse, FlyBase, MGI, RGD, SGD, WormBase and ZFIN. We are also developing, and will be offering, sponsored live trainings on resources at NCBI as a way of filling the void left by the demise of the NCBI Field Guide outreach programs. 

Conclusion: OpenHelix aims to increase community curation by helping resources increase their user communit
Nanoindentation-induced deformation of Ge
The deformation mechanisms of crystalline (100) Ge were studied using nanoindentation, cross sectional transmission electron microscopy (XTEM) and Raman microspectroscopy. For a wide range of indentation conditions using both spherical and pointed indenters, multiple discontinuities were found in the force–displacement curves on loading, but no discontinuities were found on unloading. Raman microspectroscopy, measured from samples which had plastically deformed on loading, showed a spectrum shift from that in pristine Ge, suggesting only residual strain. No evidence (such as extra Raman bands) was found to suggest that any pressure-induced phase transformations had occurred, despite the fact that the material had undergone severe plastic deformation.Selected area diffraction pattern studies of the mechanically damaged regions also confirmed the absence of additional phases. Moreover, XTEM showed that, at low loads, plastic deformation occurs by twinning and dislocation motion. This indicates that the hardness of Gemeasured by indentation is not primarily dominated by phase transformation, rather by the nucleation and propagation of twin bands and/or dislocations
The human fear-circuitry and fear-induced fainting in healthy individuals The paleolithic-threat hypothesis
The Paleolithic-Threat
hypothesis reviewed here posits
that habitual efferent fainting can
be traced back to fear-induced
allelic polymorphisms that were
selected into some genomes of
anatomically, mitochondrially, and
neurally modern humans (Homo
sapiens sapiens) in the Mid-Paleolithic because of the survival
advantage they conferred during
periods of inescapable threat. We
posit that during Mid-Paleolithic
warfare an encounter with “a
stranger holding a sharp object”
was consistently associated with
threat to life. A heritable hard-
wired or firm-wired (prepotentiated) predisposition to abruptly
increase vagal tone and collapse
flaccidly rather than freeze or
attempt to flee or fight in response
to an approaching sharp object, a
minor injury, or the sight of blood,
polymorphism for the hemodynamically “paradoxical” flaccid-
immobility in response to these
stimuli may have increased some
non-combatants’ chances of survival. This is consistent with the
unusual age and sex pattern of
fear-induced fainting. The Paleolithic-Threat hypothesis also predicts a link to various hypo-androgenic states (e.g. low dehydroxyepiandrosterone-sulfate. We offer
five predictions testable via epidemiological, clinical, and ethological/primatological methods. The
Paleolithic-Threat hypothesis has
implications for research in the
aftermath of man-made disasters,
such as terrorism against civilians,
a traumatic event in which this
hypothesis predicts epidemics of
fear-induced faintin
Human Perception of Audio Deepfakes
The recent emergence of deepfakes has brought manipulated and generated
content to the forefront of machine learning research. Automatic detection of
deepfakes has seen many new machine learning techniques, however, human
detection capabilities are far less explored. In this paper, we present results
from comparing the abilities of humans and machines for detecting audio
deepfakes used to imitate someone's voice. For this, we use a web-based
application framework formulated as a game. Participants were asked to
distinguish between real and fake audio samples. In our experiment, 472 unique
users competed against a state-of-the-art AI deepfake detection algorithm for
14912 total of rounds of the game. We find that humans and deepfake detection
algorithms share similar strengths and weaknesses, both struggling to detect
certain types of attacks. This is in contrast to the superhuman performance of
AI in many application areas such as object detection or face recognition.
Concerning human success factors, we find that IT professionals have no
advantage over non-professionals but native speakers have an advantage over
non-native speakers. Additionally, we find that older participants tend to be
more susceptible than younger ones. These insights may be helpful when
designing future cybersecurity training for humans as well as developing better
detection algorithms.Comment: Published at ACM Multimedia 2022 Workshop DDAM First International
Workshop on Deepfake Detection for Audio Multimedia at ACM Multimedia 202
The STRS (shortness of breath, tremulousness, racing heart, and sweating): A brief checklist for acute distress with panic-like autonomic indicators; development and factor structure
Background: Peritraumatic response, as currently assessed by Posttraumatic Stress Disorder (PTSD) diagnostic criterion A2, has weak positive predictive value (PPV) with respect to PTSD diagnosis. Research suggests that indicators of peritraumatic autonomic activation may supplement the PPV of PTSD criterion A2. We describe the development and factor structure of the STRS (Shortness of Breath, Tremulousness, Racing Heart, and Sweating), a one page, two-minute checklist with a five-point Likert-type response format based on a previously unpublished scale. It is the first validated self-report measure of peritraumatic activation of the autonomic nervous system.\ud
\ud
Methods: We selected items from the Potential Stressful Events Interview (PSEI) to represent two latent variables: 1) PTSD diagnostic criterion A, and 2) acute autonomic activation. Participants (a convenience sample of 162 non-treatment seeking young adults) rated the most distressing incident of their lives on these items. We examined the factor structure of the STRS in this sample using factor and cluster analysis.\ud
\ud
Results: Results confirmed a two-factor model. The factors together accounted for 68% of the variance. The variance in each item accounted for by the two factors together ranged from 41% to 74%. The item loadings on the two factors mapped precisely onto the two proposed latent variables.\ud
\ud
Conclusion: The factor structure of the STRS is robust and interpretable. Autonomic activation signs tapped by the STRS constitute a dimension of the acute autonomic activation in response to stress that is distinct from the current PTSD criterion A2. Since the PTSD diagnostic criteria are likely to change in the DSM-V, further research is warranted to determine whether signs of peritraumatic autonomic activation such as those measured by this two-minute scale add to the positive predictive power of the current PTSD criterion A2. Additionally, future research is warranted to explore whether the four automatic activation items of the STRS can be useful as the basis for a possible PTSD criterion A3 in the DSM-V
Implementing non-traditional assessment strategies in teacher preparation: Opportunities and challenges
Assessment and grading in higher education have traditionally focused on “A” through “F”, or point-based alpha-numeric letter grades and subjective, independent grading systems. Despite the ubiquity of this system, there are no universal guidelines on how to assess student learning on that scale. What can be problematic about “the way things have always been” is that students are frequently de-humanized; higher education faculty often focus on compliance and authoritarian teaching rather than engaging in the learning process alongside the students. In contrast, some faculty members have explored non-traditional assessment practices in their coursework to enhance the learning process and improve individualized student support. This article offers strategies for implementing non-traditional assessments, specifically mediated office hours, mastery learning, and ungrading strategies are addressed
Shortcut Removal for Improved OOD-Generalization
Machine learning is a data-driven discipline, and learning success is largely
dependent on the quality of the underlying data sets. However, it is becoming
increasingly clear that even high performance on held-out test data does not
necessarily mean that a model generalizes or learns anything meaningful at all.
One reason for this is the presence of machine learning shortcuts, i.e., hints
in the data that are predictive but accidental and semantically unconnected to
the problem. We present a new approach to detect such shortcuts and a technique
to automatically remove them from datasets. Using an adversarially trained
lens, any small and highly predictive clues in images can be detected and
removed. We show that this approach 1) does not cause degradation of model
performance in the absence of these shortcuts, and 2) reliably identifies and
neutralizes shortcuts from different image datasets. In our experiments, we are
able to recover up to 93,8% of model performance in the presence of different
shortcuts. Finally, we apply our model to a real-world dataset from the medical
domain consisting of chest x-rays and identify and remove several types of
shortcuts that are known to hinder real-world applicability. Thus, we hope that
our proposed approach fosters real-world applicability of machine learning
- …