3,766 research outputs found

    Geant4 based simulations for novel neutron detector development

    Full text link
    A Geant4-based Python/C++ simulation and coding framework, which has been developed and used in order to aid the R&D efforts for thermal neutron detectors at neutron scattering facilities, is described. Built upon configurable geometry and generator modules, it integrates a general purpose object oriented output file format with meta-data, developed in order to facilitate a faster turn-around time when setting up and analysing simulations. Also discussed are the extensions to Geant4 which have been implemented in order to include the effects of low-energy phenomena such as Bragg diffraction in the polycrystalline support materials of the detector. Finally, an example application of the framework is briefly shown.Comment: Proceedings for the 20th International Conference on Computing in High Energy and Nuclear Physics (CHEP

    A review on Natural Language Processing Models for COVID-19 research

    Get PDF
    This survey paper reviews Natural Language Processing Models and their use in COVID-19 research in two main areas. Firstly, a range of transformer-based biomedical pretrained language models are evaluated using the BLURB benchmark. Secondly, models used in sentiment analysis surrounding COVID-19 vaccination are evaluated. We filtered literature curated from various repositories such as PubMed and Scopus and reviewed 27 papers. When evaluated using the BLURB benchmark, the novel T-BPLM BioLinkBERT gives groundbreaking results by incorporating document link knowledge and hyperlinking into its pretraining. Sentiment analysis of COVID-19 vaccination through various Twitter API tools has shown the public’s sentiment towards vaccination to be mostly positive. Finally, we outline some limitations and potential solutions to drive the research community to improve the models used for NLP tasks

    Making Slicing Mainstream How can we be Weiser?

    Get PDF
    By now, the concept of program slicing has been known in the research community for around 25 years. As a research topic, it has enjoyed a fair share of popularity, evidenced by the number of articles published on the topic following Mark Weiser\u27s seminal paper. However, outside research circles, program slicing appears to be virtually unknown. In this report, we take the premise that program slicing is both technically relevant, and has a sufficient theoretical foundation, to be applied in practice within the software industry. With this premise in mind, we ask ourselves, ``what are the mechanisms by which we as a community could make program slicing mainstream\u27\u27

    Tannic Acid Effects on Raphanus Raphanistrum Root Acid Phospatase

    Get PDF
    Author Institution: Department of Biology and Department of Chemistry, Hiram CollegeThe effects of tannic acid (TA) on acid phosphatase (APase) (E.C.3.1.3-2) from root extracts of fertilized or unfertilized Raphanus raphanistrum plants were examined. TA inhibited APase activity non-competitively; Vmax was reduced, but the apparent K^ was unaffected in the presence of added TA. Endogenous tannin content ranged between 0.26 and 0.56 (Imoleg fresh weight * of root tissue. Enzyme activity data was extrapolated to provide estimates of activity in the absence of any TA; uncorrected APase activity of R. raphanistrum was underestimated by an average of 25%. Addition of polyvinylpyrrolidone (PVP) did not affect measured enzyme rates in a consistent manner

    Rate of recession of Niagara Falls /

    Get PDF
    Includes bibliographical references

    3rd international workshop on advances and applications of problem frames

    Get PDF
    Michael Jackson's Problem Frames are a highly promising approach to early life-cycle software engineering. Their focus moves the engineer back to the problem to be solved rather than forward to the software and solving a poorly defined problem. By applying the Problem Frames approach, the software engineer can understand the problem context and how it is to be affected by the proposed software, and ultimately work towards the right solution for the problem. The influence of the Problem Frames approach and related work is spreading in the fields of domain modelling, business process modelling, requirements engineering, software architecture as well as software engineering in general

    The heterogeneous soil environment:are there preferential pathways for fungal spread?

    Get PDF
    Most studies with soil-borne pathogenic fungi have been done with little explicit characterisation of soil structure within which fungi spread and biotic interactions occur. Soil, however, constitutes a framework of surfaces formed by old root channels, cracks or biopores in combination with aggregates. Using epidemiological and soil biological techniques in controlled environments we investigated the effect of soil heterogeneity on fungal growth dynamics. We show that cracks and larger pores can act either as preferential pathways or barriers for the spread of fungal plant pathogens through soil. Understanding the effect of soil structure on pathogen and antagonist dynamics is therefore critical for our understanding of epidemics and the development of control strategies in a heterogeneous environment

    Final radiocarbon investigation of Platland tree, the biggest African baobab

    Get PDF
    Author Posting. © Studia Chemia, 2017. This article is posted here by permission of Studia Chemia for personal use, not for redistribution. The definitive version was published in Studia Universitatis Babes-Bolyai, Seria Chemia 62, no. 2, Tom 2 (2017): 347-354, doi:10.24193/subbchem.2017.2.27.The article discloses the main results of our new investigation of Platland tree, a.k.a. Sunland baobab, the largest known African baobab. Our recent research was motivated by the three successive splits of 2016 and 2017, which determined the collapse and demise of the stems that have built the main unit of the tree. According to our new findings concerning the architecture of large and old baobabs, we established that Platland tree has a double closed-ring shaped structure and consists of two units/rings that close two separate false cavities. The larger unit was composed of five fused stems, out of which four toppled and died, while the fifth stem is already broken. The smaller unit, which is still standing, consists of three fused stems. We also determined that the larger unit had an age of 800 yr, while the smaller unit is 1100 yr old.The research was funded by the Romanian Ministry of Scientific Research CNCS-UEFISCDI under grant PN-II-ID-PCE-2013-76

    Comparative evaluation of [(99m)tc]tilmanocept for sentinel lymph node mapping in breast cancer patients: results of two phase 3 trials.

    Get PDF
    BackgroundSentinel lymph node (SLN) surgery is used worldwide for staging breast cancer patients and helps limit axillary lymph node dissection. [(99m)Tc]Tilmanocept is a novel receptor-targeted radiopharmaceutical evaluated in 2 open-label, nonrandomized, within-patient, phase 3 trials designed to assess the lymphatic mapping performance.MethodsA total of 13 centers contributed 148 patients with breast cancer. Each patient received [(99m)Tc]tilmanocept and vital blue dye (VBD). Lymph nodes identified intraoperatively as radioactive and/or blue stained were excised and histologically examined. The primary endpoint, concordance (lower boundary set point at 90 %), was the proportion of nodes detected by VBD and [(99m)Tc]tilmanocept.ResultsA total of 13 centers contributed 148 patients who were injected with both agents. Intraoperatively, 207 of 209 nodes detected by VBD were also detected by [(99m)Tc]tilmanocept for a concordance rate of 99.04 % (p < 0.0001). [(99m)Tc]tilmanocept detected a total of 320 nodes, of which 207 (64.7 %) were detected by VBD. [(99m)Tc]Tilmanocept detected at least 1 SLN in more patients (146) than did VBD (131, p < 0.0001). In 129 of 131 patients with ≥1 blue node, all blue nodes were radioactive. Of 33 pathology-positive nodes (18.2 % patient pathology rate), [(99m)Tc]tilmanocept detected 31 of 33, whereas VBD detected only 25 of 33 (p = 0.0312). No pathology-positive SLNs were detected exclusively by VBD. No serious adverse events were attributed to [(99m)Tc]tilmanocept.Conclusion[(99m)Tc]Tilmanocept demonstrated success in detecting a SLN while meeting the primary endpoint. Interestingly, [(99m)Tc]tilmanocept was additionally noted to identify more SLNs in more patients. This localization represented a higher number of metastatic breast cancer lymph nodes than that of VBD

    A Survey on Intrusion Detection Systems for Fog and Cloud Computing

    Get PDF
    The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures from the harm that cyber-attacks can cause. Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. The goal of the security policy and framework for cloud and fog computing is to protect the end-users and their information, reduce task-based operations, aid in compliance, and create standards for expected user actions, all of which are based on the use of established rules for cloud computing. Moreover, intrusion detection systems are widely adopted solutions to monitor and analyze network traffic and detect anomalies that can help identify ongoing adversarial activities, trigger alerts, and automatically block traffic from hostile sources. This survey paper analyzes factors, including the application of technologies and techniques, which can enable the deployment of security policy on fog and cloud computing successfully. The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations. Our survey aims to provide a framework for a cloud and fog computing security policy, while addressing the required security tools, policies, and services, particularly for cloud and fog environments for organizational adoption. While developing the essential linkage between requirements, legal aspects, analyzing techniques and systems to reduce intrusion detection, we recommend the strategies for cloud and fog computing security policies. The paper develops structured guidelines for ways in which organizations can adopt and audit the security of their systems as security is an essential component of their systems and presents an agile current state-of-the-art review of intrusion detection systems and their principles. Functionalities and techniques for developing these defense mechanisms are considered, along with concrete products utilized in operational systems. Finally, we discuss evaluation criteria and open-ended challenges in this area
    • …
    corecore