Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text)
(Updated article of the week text)
 
(171 intermediate revisions by the same user not shown)
Line 1: Line 1:
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Mehrnezhad Informatics2019 6-1.png|240px]]</div>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Berezin PLoSCompBio23 19-12.png|240px]]</div>
'''"[[Journal:What is this sensor and does this app need access to it?|What is this sensor and does this app need access to it?]]"'''
'''"[[Journal:Ten simple rules for managing laboratory information|Ten simple rules for managing laboratory information]]"'''
 
[[Information]] is the cornerstone of [[research]], from experimental data/[[metadata]] and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging [[laboratory information management system]]s (LIMS) to transform this large information load into useful scientific findings. The development of [[mathematical model]]s that can predict the properties of biological systems is the holy grail of [[computational biology]]. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... ('''[[Journal:Ten simple rules for managing laboratory information|Full article...]]''')<br />


Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end-users and makes the task of sensor management more complex. In this paper, we first discuss the issues around the security and privacy of mobile sensors. We investigate the available sensors on mainstream mobile devices and study the permission policies that Android, iOS and mobile web browsers offer for them. Second, we reflect on the results of two workshops that we organized on mobile sensor security. In these workshops, the participants were introduced to mobile sensors by working with sensor-enabled apps. We evaluated the risk levels perceived by the participants for these sensors after they understood the functionalities of these sensors. The results showed that knowing sensors by working with sensor-enabled apps would not immediately improve the users’ security inference of the actual risks of these sensors. However, other factors such as the prior general knowledge about these sensors and their risks had a strong impact on the users’ perception.  ('''[[Journal:What is this sensor and does this app need access to it?|Full article...]]''')<br />
<br />
''Recently featured'':
''Recently featured'':
: ▪ [[Journal:AI meets exascale computing: Advancing cancer research with large-scale high-performance computing|AI meets exascale computing: Advancing cancer research with large-scale high-performance computing]]
{{flowlist |
: ▪ [[Journal:Building infrastructure for African human genomic data management|Building infrastructure for African human genomic data management]]
* [[Journal:Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology|Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology]]
: ▪ [[Journal:Process variation detection using missing data in a multihospital community practice anatomic pathology laboratory|Process variation detection using missing data in a multihospital community practice anatomic pathology laboratory]]
* [[Journal:Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study|Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study]]
* [[Journal:Judgements of research co-created by generative AI: Experimental evidence|Judgements of research co-created by generative AI: Experimental evidence]]
}}

Latest revision as of 18:03, 10 June 2024

Fig2 Berezin PLoSCompBio23 19-12.png

"Ten simple rules for managing laboratory information"

Information is the cornerstone of research, from experimental data/metadata and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging laboratory information management systems (LIMS) to transform this large information load into useful scientific findings. The development of mathematical models that can predict the properties of biological systems is the holy grail of computational biology. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... (Full article...)

Recently featured: