Architecture specifications such as Armv8-A and RISC-V are the ultimate foundation for software verification and the correctness criteria for hardware verification. They should define the allowed... | Continue reading
We develop machine-checked verifications of the full functional correctness of C implementations of the eponymous graph algorithms of Dijkstra, Kruskal, and Prim. We extend Wang et al.’s CertiGraph... | Continue reading
The publish or perish culture of scholarly communication results in quality and relevance to be are subordinate to quantity. Scientific events such as conferences play an important role in scholarly communication and knowledge exchange. Researchers in many fields, such as compute … | Continue reading
Lean 4 is a reimplementation of the Lean interactive theorem prover (ITP) in Lean itself. It addresses many shortcomings of the previous versions and contains many new features. Lean 4 is fully... | Continue reading
Objectives This study aimed to investigate the effects of raw red beetroot consumption on metabolic markers and cognitive function in type 2 diabetes patients. Methods In a quasi-experimental study, 44 type 2 diabetes patients (57 ± 4.5 years) consumed raw red beetroot (100 g, da … | Continue reading
This paper presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, we show that the initial state of GEA-1can be... | Continue reading
Over the two last decades, coronaviruses have affected human life in different ways, especially in terms of health and economy. Due to the profound effects of novel coronaviruses, growing tides of research are emerging in various research fields. This paper employs a co-word anal … | Continue reading
Traditionally, reasoning about programs under varying evaluation regimes (call-by-value, call-by-name etc.) was done at the meta-level, treating them as term rewriting systems. Levy’s... | Continue reading
Although every emerging infectious disease occurs in a unique context, the behaviour of previous pandemics offers an insight into the medium- and long-term outcomes of the current threat. Where an informative historical analogue exists, epidemiologists and policymakers should con … | Continue reading
Objectives Several studies show that severe social stressors, e.g., in the form of exposure to workplace bullying in humans, is associated with negative mental health effects such as depression and anxiety among those targeted. However, the understanding of the underlying biologi … | Continue reading
An edited transcript of a video created for the Intertwingled conference. | Continue reading
New technological ability is leading postdigital science, where biology as digital information, and digital information as biology, are now dialectically interconnected. In this article we firstly explore a philosophy of biodigitalism as a new paradigm closely linked to bioinform … | Continue reading
Interval estimates – estimates of parameters that include an allowance for sampling uncertainty – have long been touted as a key component of statistical analyses. There are several kinds of interval estimates, but the most popular are confidence intervals (CIs): intervals that c … | Continue reading
This analysis makes use of economic forecasts for 2020 issued by the European Commission in Autumn 2019 and Spring 2020, and of a counterfactual under a no-policy change assumption, to analyse the impact of the COVID-19 crisis on EU households´ income. Additionally, our analysis … | Continue reading
Recently, the discussion regarding the consequences of cutting the corpus callosum (“split-brain”) has regained momentum (Corballis, Corballis, Berlucchi, & Marzi, Brain, 141(6), e46, 2018; Pinto et al., Brain, 140(5), 1231–1237, 2017a; Pinto, Lamme, & de Haan, Brain, 140(11), e6 … | Continue reading
The potential etiological role of early acetaminophen exposure on Autism Spectrum Conditions (ASC) and Attention-Deficit/Hyperactivity Disorder (ADHD) is inconclusive. We aimed to study this association in a collaborative study of six European population-based birth/child cohorts … | Continue reading
Aims/hypothesis We determined whether the time of day of exercise training (morning vs evening) would modulate the effects of consumption of a high-fat diet (HFD) on glycaemic control, whole-body health markers and serum metabolomics. Methods In this three-armed parallel-group ra … | Continue reading
We show that algorithmic thinking is a key ability in informatics that can be developed independently from learning programming. For this purpose we use problems that are not easy to solve but have... | Continue reading
Over the past 20 years, open source has become a widely adopted approach to develop software. Code repositories provide software to power cars, phones, and other things that are considered... | Continue reading
While anecdotal evidence suggests that select 5-hydroxytryptamine 2A (5-HT2A) receptor ligands, including psilocybin, may have long-lasting therapeutic effects after limited dosing in headache disorders, controlled investigations are lacking. In an exploratory double-blind, place … | Continue reading
Background Precision medicine, space exploration, drug discovery to characterization of dark chemical space of habitats and organisms, metabolomics takes a centre stage in providing answers to diverse biological, biomedical, and environmental questions. With technological advance … | Continue reading
Taboo words represent a potent subset of natural language. It has been hypothesized that “tabooness” reflects an emergent property of negative valence and high physiological arousal of word referents. Many taboo words (e.g., dick, shit) are indeed consistent with this claim. Neve … | Continue reading
Logically, and by most common standards, academics would be pleased to be cited, considering it a form of recognition of their intellect. In return, especially those with high citation counts, such as Clarivate Analytics’ Highly Cited Researchers, can benefit through peer recogni … | Continue reading
Teaching Machine Learning in school helps students to be better prepared for a society rapidly changing due to the impact of Artificial Intelligence. This requires age-appropriate tools that allow students to develop a comprehensive understanding of Machine Learning in order to b … | Continue reading
The likely near future creation of artificial superintelligence carries significant risks to humanity. These risks are difficult to conceptualise and quantify, but malicious use of existing artificial intelligence by criminals and state actors is already occurring and poses risks … | Continue reading
App stores include an increasing amount of user feedback in form of app ratings and reviews. Research and recently also tool vendors have proposed analytics and data mining solutions to leverage this feedback to developers and analysts, e.g., for supporting release decisions. Res … | Continue reading
CMOS image sensor cameras are integral part of modern hand held devices. Traditionally, CMOS image sensors are affected by many types of noises which reduce the quality of image generated. These... | Continue reading
Based on a computational analysis of a large dataset, this study explores if there is a significant longevity effect of intercessory prayer for a named individual’s well-being, if he receives a very high number of prayers per annum for an extended period. We relied on an observat … | Continue reading
Using an informal presentation of the specification techniques being used in COBWEB-2's design, this paper has described the machine and the principles of its operation. An on-wafer communications... | Continue reading
Historically, the existence of dark matter has been postulated to resolve discrepancies between astrophysical observations and accepted theories of gravity. In particular, the measured rotation curve of galaxies provided much experimental support to the dark matter concept. Howev … | Continue reading
When talking about blockchain technology in academia, business, and society, frequently generalizations are still heared about its – supposedly inherent – enormous energy consumption. This perception inevitably raises concerns about the further adoption of blockchain technology, … | Continue reading
In this paper, we present an innovative and effective method for remote monitoring of mosquitoes and their neutralization. We explain in detail how we leverage modern advances in neural networks to use a powerful laser to neutralize mosquitoes. The paper presented the experimenta … | Continue reading
A straightforward method for microfluidic devices fabrication using sunlight as the ultraviolet (UV) source is established in this work. This method is based on photolithography, but obviates the need for specialized UV exposure facility. Substrates coated with photoresist were p … | Continue reading
When there are disasters in our society, whether on an individual, organizational or systemic level, individuals or groups of individuals are often singled out for blame, and commonly it is assumed that the alleged culprits engaged in deliberate misdeeds. But sometimes, at least, … | Continue reading
The Mars 2020 Perseverance rover is equipped with a next-generation engineering camera imaging system that represents an upgrade over previous Mars rover missions. These upgrades will improve the operational capabilities of the rover with an emphasis on drive planning, robotic ar … | Continue reading
Background 5-methoxy-N,N-dimethyltryptamine (hereinafter referred to as 5-MeO-DMT) is a psychedelic substance found in the secretion from the parotoid glands of the Bufo alvarius toad. Inhalation of vapor from toad secretion containing 5-MeO-DMT has become popular in naturalistic … | Continue reading
Using serum samples routinely collected in 9144 adults from a French general population-based cohort, we identified 353 participants with a positive anti-SARS-CoV-2 IgG test, among whom 13 were sampled between November 2019 and January 2020 and were confirmed by neutralizing anti … | Continue reading
Ancient, veteran and notable trees are ecologically important keystone organisms and have tangible connections to folklore, history and sociocultural practices. Although found worldwide, few countries have such a rich history of recording and treasuring these trees as the UK, wit … | Continue reading
When the costs of acquiring knowledge outweigh the benefits of possessing it, ignorance is rational. In this paper I clarify and explore a related but more neglected phenomenon: cases in which ignorance is motivated by the anticipated costs of possessing knowledge, not acquiring … | Continue reading
Bitcoin exchanges are a vital component of the Bitcoin ecosystem. They are a gateway from the classical economy to the cryptocurrency economy, facilitating the exchange between fiat currency and... | Continue reading
The study of entrepreneurial cognitive bias emerged about two decades ago and has received growing attention in entrepreneurial research. However, this is the first comprehensive review of the studies published in this field and therefore describes the current state of the art of … | Continue reading