Browse Articles

Analysis of complement system gene expression and outcome across the subtypes of glioma

Mudda et al. | May 17, 2023

Analysis of complement system gene expression and outcome across the subtypes of glioma
Image credit: National Cancer Institute

Here the authors sought to better understand glioma, cancer that occurs in the glial cells of the brain with gene expression profile analysis. They considered the expression of complement system genes across the transcriptional and IDH-mutational subtypes of low-grade glioma and glioblastoma. Based on their results of their differential gene expression analysis, they found that outcomes vary across different glioma subtypes, with evidence suggesting that categorization of the transcriptional subtypes could help inform treatment by providing an expectation for treatment responses.

Read More...

Tomato disease identification with shallow convolutional neural networks

Trinh et al. | Mar 03, 2023

Tomato disease identification with shallow convolutional neural networks

Plant diseases can cause up to 50% crop yield loss for the popular tomato plant. A mobile device-based method to identify diseases from photos of symptomatic leaves via computer vision can be more effective due to its convenience and accessibility. To enable a practical mobile solution, a “shallow” convolutional neural networks (CNNs) with few layers, and thus low computational requirement but with high accuracy similar to the deep CNNs is needed. In this work, we explored if such a model was possible.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...

Correlation of Prominent Intelligence Type & Coworker Relations

Rasmus et al. | Mar 29, 2022

Correlation of Prominent Intelligence Type & Coworker Relations

Ashley Moulton & Joseph Rasmus investigate 9 controversial categories of intelligence as predicted by Multiple Intelligence Theory, originally proposed in the mid-1980s. By collecting data from 56 participants, they record that there may not actually be a correlation between these categorical types when it comes to workplace atmosphere and project efficiency.

Read More...

Reimagize – a digital card-based roleplaying game to improve adolescent girls’ body image

Kumar et al. | Oct 04, 2021

Reimagize – a digital card-based roleplaying game to improve adolescent girls’ body image

Reimagize, a role-playing with decision-making, was conjured, implementing social psychological concepts like counter-stereotyping and perspective-taking. As the game works implicitly to influence body image, it even counters image issues beyond personal body dissatisfaction. This study explored whether a digital role-playing card game, incorporating some of the most common prejudices of body image (like size prejudice, prejudices from the media, etc.) as identified by a digital survey/questionnaire completed by Indian girls aged 11-21, could counter these issues and reduce personal body dissatisfaction.

Read More...

Search Articles

Search articles by title, author name, or tags

Clear all filters

Popular Tags

Browse by school level