Grossmanwoods7822

Z Iurium Wiki

Geographical indication (GI) is used to identify a product's origin when its characteristics or quality are a result of geographical origin, which includes agricultural products and foodstuff. Metabolomics is an "omics" technique that can support product authentication by providing a chemical fingerprint of a biological system, such as plant and plant-derived products. The main purpose of this article is to verify possible contributions of metabolomic studies to the marketing field, mainly for certified regions, through an integrative review of the literature and maps produced by VOSviewer software. The results indicate that studies based on metabolomics approaches can relate specific food attributes to the region's terroir and know-how. The evidence of this connection, marketing of GIs and metabolomics methods, is viewed as potential tool for marketing purposes (e.g., to assist communication of positive aspects and quality), and legal protection. In addition, our results provide a taxonomic categorization that can guide future marketing research involving metabolomics. Moreover, the results are also useful to government agencies to improve GIs registration systems and promotion strategies.

The online version contains supplementary material available at 10.1007/s00217-021-03782-2.

The online version contains supplementary material available at 10.1007/s00217-021-03782-2.Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users' cognitive characteristics, needs and motivations. This paper presents a holistic/Human Factors (HF) approach, where the individual, organisational and technological factors are investigated in pilot healthcare organisations to show how HF vulnerabilities may impact on cybersecurity risks. An overview of current challenges in relation to cybersecurity is first provided, followed by the presentation of an integrated top-down and bottom-up methodology using qualitative and quantitative research methods to assess the level of maturity of the pilot organisations with respect to their capability to face and tackle cyber threats and attacks. This approach adopts a user-centred perspective, involving both the organisations' management and employees, The results show that a better cyber-security culture does not always correspond with more rule compliant behaviour. In addition, conflicts among cybersecurity rules and procedures may trigger human vulnerabilities. In conclusion, the integration of traditional technical solutions with guidelines to enhance CIS systems by leveraging HF in cybersecurity may lead to the adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organisations.Tumor vaccine has shown outstanding advantages and good therapeutic effects in tumor immunotherapy. However, antigens in tumor vaccines can be easily cleared by the reticuloendothelium system in advance, which leads to poor therapeutic effect of tumor vaccines. Moreover, it was still hard to monitor the fate and distribution of antigens. To address these limitations, we synthesized a traceable nanovaccine based on gold nanocluster-labeled antigens and upconversion nanoparticles (UCNPs) for the treatment of melanoma in this study. PH-sensitive Schiff base bond is introduced between UCNPs and gold nanocluster-labeled ovalbumin antigens for monitoring antigens release. Our studies demonstrated that UCNPs conjugated metallic antigen showed excellent biocompatibility, pH-sensitive and therapeutic effect.Marital status is recognized as an important social determinant of health, income, and social support, but is rarely available in administrative data. We assessed the feasibility of using exact address data and zip code history to identify cohabiting couples using the 2018 Medicare Vital Status file and ZIP codes in the 2011-2014 Master Beneficiary Summary Files. Medicare beneficiaries meeting our algorithm displayed characteristics consistent with assortative mating and resembled known married couples in the Health and Retirement Study linked to Medicare claims. Address information represents a promising strategy for identifying cohabiting couples in administrative data including healthcare claims and other data types.As the use of electronic health records (EHR) to estimate treatment effects has become widespread, concern about bias introduced by error in EHR-derived covariates has also grown. While methods exist to address measurement error in individual covariates, little prior research has investigated the implications of using propensity scores for confounder control when the propensity scores are constructed from a combination of accurate and error-prone covariates. We reviewed approaches to account for error in propensity scores and used simulation studies to compare their performance. These comparisons were conducted across a range of scenarios featuring variation in outcome type, validation sample size, main sample size, strength of confounding, and structure of the error in the mismeasured covariate. We then applied these approaches to a real-world EHR-based comparative effectiveness study of alternative treatments for metastatic bladder cancer. This head-to-head comparison of measurement error correction methods in the context of a propensity score-adjusted analysis demonstrated that multiple imputation for propensity scores performs best when the outcome is continuous and regression calibration-based methods perform best when the outcome is binary.Existing deep learning technologies generally learn the features of chest X-ray data generated by Generative Adversarial Networks (GAN) to diagnose COVID-19 pneumonia. However, the above methods have a critical challenge data privacy. GAN will leak the semantic information of the training data which can be used to reconstruct the training samples by attackers, thereby this method will leak the privacy of the patient. Furthermore, for this reason, that is the limitation of the training data sample, different hospitals jointly train the model through data sharing, which will also cause privacy leakage. To solve this problem, we adopt the Federated Learning (FL) framework, a new technique being used to protect data privacy. Under the FL framework and Differentially Private thinking, we propose a Federated Differentially Private Generative Adversarial Network (FedDPGAN) to detect COVID-19 pneumonia for sustainable smart cities. Specifically, we use DP-GAN to privately generate diverse patient data in which differential privacy technology is introduced to make sure the privacy protection of the semantic information of the training dataset. Furthermore, we leverage FL to allow hospitals to collaboratively train COVID-19 models without sharing the original data. Under Independent and Identically Distributed (IID) and non-IID settings, the evaluation of the proposed model is on three types of chest X-ray (CXR)images dataset (COVID-19, normal, and normal pneumonia). A large number of truthful reports make the verification of our model can effectively diagnose COVID-19 without compromising privacy.In the initial pandemic phase, effluents from wastewater treatment facilities were reported mostly free from Severe Acute Respiratory Coronavirus 2 (SARS-CoV-2) RNA, and thus conventional wastewater treatments were generally considered effective. However, there is a lack of first-hand data on i) comparative efficacy of various treatment processes for SARS-CoV-2 RNA removal; and ii) temporal variations in the removal efficacy of a given treatment process in the backdrop of active COVID-19 cases. This work provides a comparative account of the removal efficacy of conventional activated sludge (CAS) and root zone treatments (RZT) based on weekly wastewater surveillance data, consisting of forty-four samples, during a two-month period. The average genome concentration was higher in the inlets of CAS-based wastewater treatment plant (WWTP) in the Sargasan ward (1.25 × 103 copies/ L), than that of RZT-based WWTP (7.07 × 102 copies/ L) in an academic institution campus of Gandhinagar, Gujarat, India. ORF 1ab and S genes appeared to be more sensitive to treatment i.e., significantly reduced (p 0.05). CAS treatment exhibited better RNA removal efficacy (p = 0.014) than RZT (p = 0.032). Multivariate analyses suggested that the effective genome concentration should be calculated based on the presence/absence of multiple genes. The present study stresses that treated effluents are not always free from SARS-CoV-2 RNA, and the removal efficacy of a given WWTP is prone to exhibit temporal variability owing to variations in active COVID-19 cases in the vicinity and genetic material accumulation over the time. Disinfection seems less effective than the adsorption and coagulation processes for SARS-CoV-2 removal. Results stress the need for further research on mechanistic insight on SARS-CoV-2 removal through various treatment processes taking solid-liquid partitioning into account.As the COVID-19 pandemic emerged in early 2020, a number of malicious actors have started capitalizing the topic. Although a few media reports mentioned the existence of coronavirus-themed mobile malware, the research community lacks the understanding of the landscape of the coronavirus-themed mobile malware. In this paper, we present the first systematic study of coronavirus-themed Android malware. We first make efforts to create a daily growing COVID-19 themed mobile app dataset, which contains 4,322 COVID-19 themed apk samples (2,500 unique apps) and 611 potential malware samples (370 unique malicious apps) by the time of mid-November, 2020. We then present an analysis of them from multiple perspectives including trends and statistics, installation methods, malicious behaviors and malicious actors behind them. We observe that the COVID-19 themed apps as well as malicious ones began to flourish almost as soon as the pandemic broke out worldwide. Most malicious apps are camouflaged as benign apps using the same app identifiers (e.g., app name, package name and app icon). Their main purposes are either stealing users' private information or making profit by using tricks like phishing and extortion. BayK8644 Furthermore, only a quarter of the COVID-19 malware creators are habitual developers who have been active for a long time, while 75% of them are newcomers in this pandemic. The malicious developers are mainly located in the US, mostly targeting countries including English-speaking countries, China, Arabic countries and Europe. To facilitate future research, we have publicly released all the well-labelled COVID-19 themed apps (and malware) to the research community. Till now, over 30 research institutes around the world have requested our dataset for COVID-19 themed research.The outbreak of the novel Coronavirus in late 2019 brought severe devastation to the world. The pandemic spread across the globe, infecting more than ten million people and disrupting several businesses. Although social distancing and the use of protective masks were suggested all over the world, the cases seem to rise, which led to worldwide lockdown in different phases. The rampant escalation in the number of cases, the global effects, and the lockdown may have a severe effect on the psychology of people. The emergency protocols implemented by the authorities also lead to increased use in the number of multimedia devices. Excessive use of such devices may also contribute to psychological disorders. Hence, hence it is necessary to analyze the state of mind of people during the lockdown. In this paper, we perform a sentiment analysis of Twitter data during the pandemic lockdown, i.e., two weeks and four weeks after the lockdown was imposed. Investigating the sentiments of people in the form of positive, negative, and neutral tweets would assist us in determining how people are dealing with the pandemic and its effects on a psychological level.

Autoři článku: Grossmanwoods7822 (Ward Grimes)