240 research outputs found
The microcosm of scientific knowledge: scientists are talking, but mostly to each other
Communication of results has long been recognized as the final step in the scientific process. Publication in scientific journals has been the accepted method of communication. In the years 1990-1991 there were over 5,300 accredited scientific journals in print indexed by ISI. However, far less than 1 % of the papers published in those journals were subsequently reported on in the top mainstream printed news media. Well over 99% of the scientific papers published failed to be noticed by mainstream publications and mainstream audiences. This begs the question, that as scientists, is it sufficient to publish results in highly technical formats with only scientists as the intended audience? Or, has this trend caused a great disparity between the knowledgeable elite and the general public? This paper examines the highest circulated news magazines and newspapers during the period of 1990-1991. Every paper reported on, and the general topic of every scientific news article, as well as the scientists referenced, were compiled. Those results were compared to the top papers that were published in scientific journals during that same time period. The goal was to determine if there was any correlation between the two based on popularity of topics or likelihood of being cited and reported on. The results show that overwhelmingly, nearly every paper reported on appeared only in either the New England Journal of Medicine, the Journal of the American Medical Association, Science or Nature. Further, this study shows that there was some correlation among popularity of topics covered in mainstream publications and journals, but in the key fields of the environment and science education, 11 there was a sizable disparity. Most striking was the extremely low number of papers that ever made it to the general public. At a time when disciplines are scratching their heads and wondering "what next?" for their fields, once hot topics such as evolution and global warming are fighting to keep a foothold in popular scientific understanding. This paper highlights the major chasm that exists between academia and the mainstream. It points to a clear need for scientists to make new efforts to communicate not just to a captive audience of fellow researchers, but to the mainstream decision-makers of the world. Since the majority of the public looks to mass media for scientific news, it is essential that the scientific community open channels of communication with media and learn alternate forms of communication. As Albert Einstein astutely pointed out in 1954, "It is just as important to make knowledge live and to keep it alive as to solve specific problems."No embarg
Daily Life for the Common People of China
In this book Ronald Suleski introduces a new category of source material, ''chaoben'' 抄本, for understanding the lives of China’s semi-literate masses before 1950. It links the documents now flooding the antiques markets in China, with the hopes and fears of China’s people at the end of the pre-modern era
Anomalous scaling law for noise variance and spatial resolution in differential phase contrast computed tomography
In conventional absorption based x-ray computed tomography (CT), the noise
variance in reconstructed CT images scales with spatial resolution following an
inverse cubic relationship. Without reconstruction, in x-ray absorption
radiography, the noise variance scales as an inverse square with spatial
resolution. In this letter we report that while the inverse square relationship
holds for differential phase contrast projection imaging, there exists an
anomalous scaling law in differential phase contrast CT, where the noise
variance scales with spatial resolution following an inverse linear
relationship. The anomalous scaling law is theoretically derived and
subsequently validated with phantom results from an experimental Talbot-Lau
interferometer system
A data taxonomy for adaptive multifactor authentication in the internet of health care things
The health care industry has faced various challenges over the past decade as we move toward a digital future where services and data are available on demand. The systems of interconnected devices, users, data, and working environments are referred to as the Internet of Health Care Things (IoHT). IoHT devices have emerged in the past decade as cost-effective solutions with large scalability capabilities to address the constraints on limited resources. These devices cater to the need for remote health care services outside of physical interactions. However, IoHT security is often overlooked because the devices are quickly deployed and configured as solutions to meet the demands of a heavily saturated industry. During the COVID-19 pandemic, studies have shown that cybercriminals are exploiting the health care industry, and data breaches are targeting user credentials through authentication vulnerabilities. Poor password use and management and the lack of multifactor authentication security posture within IoHT cause a loss of millions according to the IBM reports. Therefore, it is important that health care authentication security moves toward adaptive multifactor authentication (AMFA) to replace the traditional approaches to authentication. We identified a lack of taxonomy for data models that particularly focus on IoHT data architecture to improve the feasibility of AMFA. This viewpoint focuses on identifying key cybersecurity challenges in a theoretical framework for a data model that summarizes the main components of IoHT data. The data are to be used in modalities that are suited for health care users in modern IoHT environments and in response to the COVID-19 pandemic. To establish the data taxonomy, a review of recent IoHT papers was conducted to discuss the related work in IoHT data management and use in next-generation authentication systems. Reports, journal articles, conferences, and white papers were reviewed for IoHT authentication data technologies in relation to the problem statement of remote authentication and user management systems. Only publications written in English from the last decade were included (2012-2022) to identify key issues within the current health care practices and their management of IoHT devices. We discuss the components of the IoHT architecture from the perspective of data management and sensitivity to ensure privacy for all users. The data model addresses the security requirements of IoHT users, environments, and devices toward the automation of AMFA in health care. We found that in health care authentication, the significant threats occurring were related to data breaches owing to weak security options and poor user configuration of IoHT devices. The security requirements of IoHT data architecture and identified impactful methods of cybersecurity for health care devices, data, and their respective attacks are discussed. Data taxonomy provides better understanding, solutions, and improvements of user authentication in remote working environments for security features
Fabrication of two-layer integrated phase mask for single-beam and single-exposure fabrication of three-dimensional photonic crystal
In this paper, we report a new design and fabrication of an integrated two-layer phase mask for five-beam holographic fabrication of three-dimensional photonic crystal templates. The phase mask consists of two layers of orthogonally oriented gratings produced in a polymer. The vertical spatial separation between two layers produces a phase shift among diffractive laser beams, which enables the holographic fabrication of interconnected three-dimensional photonic structures. A three-dimensional photonic crystal template was fabricated using the two-layer phase mask and was consistent with simulations based on the five beam interference. The reported method simplifies the fabrication of photonic crystals and is amendable for massive production and chip-scale integration of three-dimensional photonic structures. © 2008 Optical Society of American
Assessment of Seagrass Floral Community Structure from Two Caribbean Marine Protected Areas
Seagrass communities represent spatially complex and biomass producing systems comprised of intermixed seagrass and algal species. We investigated shallow water communities from two Marine Protected Areas (MPAs) in the Caribbean: St. John, United States Virgin Islands and Cayos Cochinos, Honduras. St. John sites (4) lie within the Virgin Islands National Park and the Coral Reef National Monument and are designated within an UNESCO Biosphere Reserve. Honduran sites (4) lie within the designated Marine National Monument. Our results indicate that both MPAs were dominated by Thalassia testudinum with spatial coverage and shoot density significantly greater in Honduras. Many sites also showed substantial cover of Syringodium filiforme, which was significantly greater in St. John. Most major algal groups showed significant differences between MPAs and among sites within locations. Specifically, Halimeda, Penicillus, Udotea, Galaxaura, and Dictyosphaeria were significantly more abundant in Honduras, while Padina and Avrainvillea were significantly greater from St. John. Additionally, only Honduran sites showed the presence of coral colonies (Montastrea and Porites) within their seagrass beds. Floral community level analyses demonstrated significant differences among almost all site comparisons suggesting relatively distinct floral communities exist within each of these regions, but both MPAs maintain high spatial coverage of seagrasses providing critical ecosystem services
A review of multi-factor authentication in the internet of healthcare things
Objective: This review paper aims to evaluate existing solutions in healthcare authentication and provides an insight into the technologies incorporated in Internet of Healthcare Things (IoHT) and multi-factor authentication (MFA) applications for next-generation authentication practices. Our review has two objectives: (a) Review MFA based on the challenges, impact and solutions discussed in the literature; and (b) define the security requirements of the IoHT as an approach to adapting MFA solutions in a healthcare context. Methods: To review the existing literature, we indexed articles from the IEEE Xplore, ACM Digital Library, ScienceDirect, and SpringerLink databases. The search was refined to combinations of ‘authentication’, ‘multi-factor authentication’, ‘Internet of Things authentication’, and ‘medical authentication’ to ensure that the retrieved journal articles and conference papers were relevant to healthcare and Internet of Things-oriented authentication research. Results: The concepts of MFA can be applied to healthcare where security can often be overlooked. The security requirements identified result in stronger methodologies of authentication such as hardware solutions in combination with biometric data to enhance MFA approaches. We identify the key vulnerabilities of weaker approaches to security such as password use against various cyber threats. Cyber threats and MFA solutions are categorised in this paper to facilitate readers’ understanding of them in healthcare domains. Conclusions: We contribute to an understanding of up-to-date MFA approaches and how they can be improved for use in the IoHT. This is achieved by discussing the challenges, benefits, and limitations of current methodologies and recommendations to improve access to eHealth resources through additional layers of security
Study on the temperature field loaded by a shaped laser beam on the top surface of a cylinder head for thermal fatigue test
In thermal fatigue test, the key point is whether the temperature field on the top surface of cylinder head induced by the heat source can well match it in real service. In order to produce the target temperature field in service which is measured by thermocouples, shaped laser beam generated by diffractive optics element (DOE) is chosen as the heat source to irradiate on the top surface of cylinder head. The DOE is designed based on the Gerchberg-Saxton (GS) algorithm and the simulated temperature field is calculated by finite element model (FEM). The results show that the simulated and experimental temperature field can well match the target one which demonstrates that this method is feasible to produce the target temperature field and can be used in thermal fatigue test
- …
