e-Xploration
27.2K views | +2 today
Follow
e-Xploration
antropologiaNet, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Rescooped by luiy from Robótica Educativa!
Scoop.it!

Cyberdéfense : les espions vont disposer de capacités informatiques offensives - La Tribune.fr

Cyberdéfense : les espions vont disposer de capacités informatiques offensives - La Tribune.fr | e-Xploration | Scoop.it

  "Près de cinq ans après la réorganisation des services de renseignements français, La Tribune publie une série de quatre articles faisant le point sur leur évolution, les nouveaux enjeux auxquels ils doivent faire face, leurs succès et leurs manques. Deuxième épisode de cette série, les services de renseignements, qui se réorganisent pour mieux lutter contre les menaces de cyber-espionnage et la multiplication des opérations de cyber-sabotage."


Via Sami Azzouni, juandoming
luiy's insight:

La DCRI en pointe sur les questions de cyber-sécurité


Aux côtés de l'ANSSI, la Direction centrale du renseignement intérieur (DCRI) est « le seul service de renseignement de sécurité engagé dans ce domaine », estime son patron, Patrick Calvar, qui assure que « les attaques informatiques constituent à mon sens le danger le plus grave, et il ne fera que croître ». Car selon, lui « la cybercriminalité représente un danger majeur, dans tous les secteurs - criminalité de droit commun, terrorisme, espionnage et intelligence économique. Il n'est pas certain que le vrai bilan ait été fait des dégâts déjà commis, car de nombreuses entreprises ne souhaitent pas une contre-publicité de cet ordre. Nous devons définir une stratégie dans laquelle chacun joue un rôle complémentaire. Cela prendra du temps ».

 

A la direction nationale du renseignement et des enquêtes douanières (DNRED), le problème est également aigu. « Les bases de données, matériels informatiques et logiciels destinées à la surveillance du cybercommerce, représentent un poste budgétaire important », souligne le patron de la DNRED, Jean-Paul Garcia. « Nous devons encore améliorer nos performances en matière de lutte contre la cyberdélinquance, qui se développe beaucoup. La cellule Cyberdouane recevra avant la fin du mois de juin les moyens nécessaires pour développer la pratique des coups d'achat - nous en avons la capacité depuis 2012 - qui nous permet, sous une identité fictive, de pénétrer les réseaux ». Mais déjà la DNRED a déjà remporté quelques succès, en matière non seulement de médicaments et de cigarettes mais aussi de contrefaçons, « internet étant un lieu privilégié d'échanges », rappelle Jean-Paul Garcia.

more...
No comment yet.
Rescooped by luiy from visual data
Scoop.it!

Under the Radar: Keeping Ads from Ruining a Great Infographic...

Under the Radar: Keeping Ads from Ruining a Great Infographic... | e-Xploration | Scoop.it

There’s no mystery here: companies want to sell things. Increasingly, they’re turning to infographics to do it. But overt advertising undermines everything infographics do best. Instead of informing and delighting the viewer with valuable data portrayed with graphical verve, ads cheapen and annoy. More often than not, they land the project deep in the Internet’s vast wasteland of unshared content.


Infographics aren’t just ads dressed up in new shoes, they’re something else: a refreshing, informative, fun, and shareable tool for communication that we can actually enjoy consuming. Also, when done right, infographics can still help bolster a company or product’s public image.

Here are some oh so subtly advertorial infographics that show you how to get the balance right...


Via Lauren Moss
more...
Aurélia-Claire Jaeger's curator insight, March 21, 2013 12:52 PM

Il n'y a aucun mystère: les entreprises veulent vendre. De plus en plus, elles se tournent vers l'infographie pour le faire. 
Mais l'intention publicitaire trop clairement affichée couplée avec une réalisation à l'économie nuit souvent à ce que l'infographie peut faire de mieux. Au lieu d'informer et de ravir le "spectateur" avec des données précieuses dépeintes avec brio, de nombreuses publications ennuyeuses ou banales vont simplement rejoindre la vaste friche de contenus non partagés sur internet.

Nous sommes inondés de publicité tous les jours, partout où nous regardons. Les annonces sont si répandues qu'elles ont perdu beaucoup de leur pouvoir. Les Infographies ne sont pas simplement des publicités habillées de nouveaux costumes, elles sont quelque chose d'autre: un outil informatif, rafraîchissant, amusant et partageable. 
Lorsqu'elles sont bien faites, les infographies peuvent encore contribuer à renforcer une image ou un produit. Voici quelques exemples qui vous montrent comment obtenir le bon équilibre.

(Traduction faite maison)

Scooped by luiy
Scoop.it!

Big Data Implementation Best Practices | The Big Data Hub

Big Data Implementation Best Practices | The Big Data Hub | e-Xploration | Scoop.it
Top 10 best practices that implementation teams should follow to increase the chances of success with big data projects (10 Big Data Implementation Best Practices http://t.co/xd32urVMra #analytics...
luiy's insight:

1. Gather business requirements before gathering data. Begin big data implementations by first gathering, analyzing and understanding the business requirements; this is the first and most essential step in the big data analytics process. If you take away nothing else, remember this: Align big data projects with specific business goals.

2. “Implementing big data is a business decision not IT.” This is a wonderful quote that wraps up one of the most important best practices for implementing big data. Analytics solutions are most successful when approached from a business perspective and not from the IT/Engineering end. IT needs to get away from the model of “Build it and they will come” to “Solutions that fit defined business needs.”

3. Use Agile and Iterative Approach to Implementation. Typically, big data projects start with a specific use-case and data set. Over the course of implementations, we have observed that organization needs evolve as they understand the data – once they touch and feel and start harnessing its potential value. Use agile and iterative implementation techniques that deliver quick solutions based on current needs instead of a big bang application development. When it comes to the practicalities of big data analytics, the best practice is to start small by identifying specific, high-value opportunities, while not losing site of the big picture. We achieve these objectives with our big data framework: Think Big, Act Small.

4. Evaluate data requirements. Whether a business is ready for big data analytics or not, carrying out a full evaluation of data coming into a business and how it can best be used to the business’s advantage is advised. This process usually requires input from your business stakeholders. Together we analyze what data needs to be retained, managed and made accessible, and what data can be discarded.

5. Ease skills shortage with standards and governance. Since big data has so much potential, there’s a growing shortage of professionals who can manage and mine information. Short of offering huge signing bonuses, the best way to overcome potential skills issues is standardizing big data efforts within an IT governance program.

more...
No comment yet.
Rescooped by luiy from Anthropology, communication & technology
Scoop.it!

Anthropology and hacker culture « Quotulatiousness

Anthropology and hacker culture « Quotulatiousness | e-Xploration | Scoop.it

[Coleman's dissertation has been], edited and streamlined, under the title of Coding Freedom: The Ethics and Aesthetics of Hacking, which comes out today from Princeton University Press (Quinn Norton, also well known for her Wired reporting on Anonymous and Occupy, had a hand in the editing). Coding Freedom walks the fine line between popular accessibility and scholarly rigor, and does a very good job of expressing complex ideas without (too much) academic jargon.


Via jean lievens, Andrea Naranjo
more...
No comment yet.
Scooped by luiy
Scoop.it!

Big Data Reduction 1: Descriptive Analytics - Lithosphere Community

Now that SxSW interactive is over, it’s time to get back and do some serious business. For me, that means I’ll return to the world of big data . Bu
luiy's insight:

From Exploratory Play to Statistical Rigor

In my previous big data post, we discussed the first step when analyzing any complex data set, that is EDA. This is one of the most important steps in data analysis. However, it is often not given the attention it deserves, because the result of EDA is rarely the end result that businesses want. Rather than helping business answer a question, EDA often creates more questions for the analysts. Moreover, EDA is very challenging, because successful EDA requires both a deep knowledge in statistics and creative imagination. Hence, most data scientists don’t spend enough time doing EDA. However with the rare combination of knowledge and imagination, the result of EDA can be very valuable. It will guide subsequent analyses in a way that will most likely lead to the discovery of new insights.

 

Suppose you’ve done your homework as a good data scientist and played with the data sufficiently to get a sense of what might be interesting in the data set. What can you do next?

 

This is where the number-crunching analytics for data reduction begins. Sometimes, your big data may go from hundreds of terabytes down to just a few bytes or bits. Like EDA, there are an infinite number of analytics for data reduction, but they can be group into three classes:

Descriptive AnalyticsPredictive AnalyticsPrescriptive Analytics

In an attempt to write shorter and more digestible posts, we will only discuss the first class of data reduction techniques today—descriptive analytics. And we will cover predictive and prescriptive analytics in subsequent posts.

more...
No comment yet.
Rescooped by luiy from Influence et contagion
Scoop.it!

The Myth of Cyberspace – The New Inquiry

The Myth of Cyberspace – The New Inquiry | e-Xploration | Scoop.it

In the early 1980s, when personal computing first became a reality, the faces of glowing terminals had an almost magical aura, transubstantiating arcane passages of 1s and 0s into sensory experience. In fact, the seemingly impenetrable complexity of what was unfolding behind the screen created a sense of mystery and wonderment. We were in awe of the hackers who could unlock the code and conjure various illusions from it; they were modern magicians who seemed to travel between two worlds: reality and cyberspace. One day, we imagined, these sages of cyberspace would leave their bodies behind and fully immerse themselves in the secret world behind the screen. Such images manifested themselves through the decades in films like Tron, Hackers, and The Matrix and in the fiction narratives of the cyberpunk genre. When the public internet first emerged, images of cyberspace were already deeply embedded in our collective imagination; these images have become the primary lens through which we view and evaluate our online activity. For this reason, tracing the genealogy of the cyberspace concept reveals much about present cultural assumptions regarding our relationship with information technology.

more...
luiy's curator insight, March 18, 2013 1:38 PM

The great irony of the cyberspace concept is that, though we embraced it to resolve cognitive dissonance, it has come to cause only more of it. As Facebook, Twitter, and other social-networking sites have grown more popular, it has become undeniable that they play an important role in organizing our social lives. Our presence on these sites arguably has become so important that we begin to experience the world differently, tailoring our behavior toward producing desirable sorts of things to share on them. We all know intuitively that what we do online affects us offline and vice versa — that both comprise the same friends, the same conversations, the same events. Yet the collective fantasy of cyberspace and all its related vocabulary are so deeply embedded in our cultural logic that we cannot help but lapse into denial of these obvious truths. Our language betrays us; it obfuscates the truth of our experience.

Western culture has a long history of creating such dualisms when confronted with crises of meaning or identity. For example, we have long evaded questions regarding our mortality by conceptually separating matter and form, body and soul. As with cyberspace, this age-old dualism generated a subsequent need to imagine a space where soul could exist apart from body, so we imagined heaven and hell. Our uncritical acceptance of the cyberspace fantasy has imbued it with a similar sacredness; it has become part of a new secular religion, built on faith in something that is imagined but never experienced.

Religion, as Emile Durkheim famously defined it, “is a unified system of beliefs and practices relative to sacred things, that is to say, things set apart and surrounded by prohibitions — beliefs and practices that unite its adherents in a single moral community.” Cyberspace is exactly the sort of thing that we have set apart conceptually and subjected to ceaseless moralizing: It has become almost second nature to claim that “the virtual” is less intimate, authentic, or natural than “the real.” Despite its failure to compellingly describe the world we inhabit, cyberspace nevertheless thrives as a framework for making moral judgments about that same world. Cyberspace has become our Mount Olympus, the founding myth of the Internet Age. It is an article of faith, not the product of lived experience.

Of course, there is nothing intrinsically wrong with fantasy. Speculative fiction provides an important opportunity to anticipate and prepare for techno-cultural change. The problem arises when we begin to prioritize that fictional narrative over actual experience, when we let these speculations control the reality that emerges. We have allowed the myth of cyberspace to usurp reason and to shape perception in our increasingly digitally-mediated lives. Perhaps, this realization should not come as too much of a surprise. Gibson himself recognized that the creative capacities of human beings predispose us to supplanting concrete observation with abstract concepts. A passage from Memory Palace can be read almost as claiming that the cyberspace myth fulfills some broader human teleology:

You see, so we’ve always been on our way to this new place — that is no place, really — but it is real. It’s our nature to represent. We’re the animal that represents — the sole and only maker of maps. And, if our weakness has been to confuse the bright and bloody colors of our calendars with the true weather of days, and the parchment’s territory of our maps with the land spread out before us—never mind. We have always been on our way to this new place — that is no place, really — but it is real.

Support The New Inquiry. Subscribe to TNI Magazine for $2Cyberspace is not real per se but real in the sense of the Thomas theorem: “If [wo]men define situations as real, they are real in their consequences.” Real reality is not characterized by such dualisms; it is equally made of atoms and bits. The cost of upholding this mythical separation is that we have become disassociated with many aspects of our lives. If we hope to make ourselves whole again, we first need a new vocabulary, new myths, and new representations for the Web.

Rescooped by luiy from Complex Networks Everywhere
Scoop.it!

Defining and Modeling Complex Adaptive Systems

Defining and Modeling Complex Adaptive Systems | e-Xploration | Scoop.it
Almost all the critical problems of our time are problems of control and almost all of them concern complex adaptive systems. If we want to know more about our bodies, it is not just to increase knowledge but so that we can control our health.

 

CAS are  “systems that don’t yield compact forms of representation”1. In other words a complex system cannot be described by a simple set of equations. Why would this be the case? It is the “adaptive” nature of these systems that leads to this intractability. Agents within the system respond to each set of environmental conditions within a complex adaptive system with a different set of responses and the number of such environments and their corresponding agent responses that need to be accounted for to construct an accurate model of the system is simply too large. But is this simply a problem of impracticality? Could we, at least in theory, construct a model that takes into account all possible environmental conditions and all possible agent behaviours? Although some scientists may argue that such an approach is theoretically possible, there is ample evidence that the critical “adaptive” component of some complex adaptive systems may in fact be unmodelable


Via Anne Caspari, A. J. Alvarez-Socorro
luiy's insight:
What Is A Complex Adaptive System?

The first question that then needs to be answered is: What is a complex adaptive system? David Krakauer defines complex systems as “systems that don’t yield compact forms of representation”1. In other words a complex system cannot be described by a simple set of equations. Why would this be the case? As Krakauer notes, it is the “adaptive” nature of these systems that leads to this intractability. Agents within the system respond to each set of environmental conditions within a complex adaptive system with a different set of responses and the number of such environments and their corresponding agent responses that need to be accounted for to construct an accurate model of the system is simply too large. But is this simply a problem of impracticality? Could we, at least in theory, construct a model that takes into account all possible environmental conditions and all possible agent behaviours? Although some scientists may argue that such an approach is theoretically possible, there is ample evidence that the critical “adaptive” component of some complex adaptive systems may in fact be unmodelable. There is no better example of this than the problems faced by the economist Hyman Minsky in formalising many of his most important ideas.

more...
Anne Caspari's comment, March 14, 2013 2:56 PM
complex adaptive systems can often be identified by observing the critical role that disorderly processes play in maintaining system resilience. For example, the disorderly and often unpredictable nature of flooding is a vital factor in maintaining the productivity and resilience of many complex river-floodplain systems. But the same rarely holds for simpler systems such as small temperate streams... Interesting the examples on trying to manage CAS with the opposite effect of reducing resilience and robbing them of antifragility. Forests, rivers, ecnomic systems..
Luciano Lampi's curator insight, March 19, 2013 9:02 AM

Interesting to read!

Léonne Willems's curator insight, March 25, 2013 4:27 PM

Another way to think about environmental influences at the source of tensions at work (as opposed to individual lack of employee performance or motivational problems). Are these 'tensions' actually symptoms of a system out of balance? Are these tensions the real gems for organisational steering? Check out how Holacracy capitalises just on that! 

Rescooped by luiy from Didactics and Technology in Education
Scoop.it!

History of Human-Computer Interaction

Presented to the students at KULeuven on 11 March 2013.

Via Rui Guimarães Lima
more...
No comment yet.
Scooped by luiy
Scoop.it!

Data Analytics & Big Data | Visual.ly

Data Analytics & Big Data | Visual.ly | e-Xploration | Scoop.it
The quick reference guide to big data and data analytics; from the definition to the history and future applications of big data.
more...
No comment yet.
Rescooped by luiy from Anthropology, communication & technology
Scoop.it!

Internet of things: How machine-to-machine technology is making inroads into our lives

Internet of things: How machine-to-machine technology is making inroads into our lives | e-Xploration | Scoop.it

 

Imagine a situation where you are driving down the highway at night and your car hits a divider. It's not a major accident but you need help and there is virtually no network on your mobile phone. Wouldn't it be perfect if your car could send out a distress signal and your GPS co-ordinates as soon as it hit that divider so that help could reach you as soon as possible?


Via Jean-Philippe BOCQUENET, Andrea Naranjo
more...
No comment yet.
Rescooped by luiy from Communication à l'ère du numérique
Scoop.it!

Un ouvrage sur une approche plurielle du "journalisme 2.0"

Un ouvrage sur une approche plurielle du "journalisme 2.0" | e-Xploration | Scoop.it
Eric Scherer, directeur de la prospective et de la stratégie numérique de France Télévisions, voit ainsi trois grands débouchés dans le journalisme entrepreunarial : monter son projet en ligne, rejoindre un "pure player" et ...

Via Andrea Naranjo
more...
No comment yet.
Rescooped by luiy from History 2[+or less 3].0
Scoop.it!

Ruas do Porto / Streets of Porto by Jose Paulo Andrade

Ruas do Porto / Streets of Porto by Jose Paulo Andrade | e-Xploration | Scoop.it

Via Rui Guimarães Lima
more...
Scooped by luiy
Scoop.it!

Healthcare IT Pros Can Do Great Things with a Strong Infusion of Big Data | Attunity Blog

Healthcare IT Pros Can Do Great Things with a Strong Infusion of Big Data | Attunity Blog | e-Xploration | Scoop.it
Healthcare IT Pros Can Do Great Things with a Strong Infusion of Big Data (RT @attunity: Healthcare IT Pros Can Do Great Things w/ a Strong Infusion of #BigData http://t.co/9coxSZ2AbO [BLOG] #healthIT...
luiy's insight:

The potential for transformation-based big data analytics has become clear in nearly every field over the past few months. Modern organizations simply deal with more data on a regular basis than they did in recent years, meaning the resources needed to complete the transition are in place. This generated an interesting tension in sectors like healthcare. Professionals in these fields can do great things - even save lives - with a strong infusion of big data. However, they must make sure they have powerful ways to transfer the information they use. Without dedicated options like enterprise file replication, these firms could end up simply throwing away investment money.

 
more...
No comment yet.
Scooped by luiy
Scoop.it!

The Mermaid's Tale: Illness as big data problem? The bicameral mind

The Mermaid's Tale: Illness as big data problem? The bicameral mind | e-Xploration | Scoop.it
#Mermaidstale: Illness as big data problem? The bicameral mind: Supercomputer; WikimediaWe attended a very int... http://t.co/F9igvNYWbc
more...
No comment yet.
Rescooped by luiy from Visualisation
Scoop.it!

MOOC Course Infographics: A Study of the Effects of Penalties in the NFL

MOOC Course Infographics: A Study of the Effects of Penalties in the NFL | e-Xploration | Scoop.it

Here is the second MOOC Infographic class final project from one of my classmates that I wanted to share with you. It was a team project created by Jim Uden and Chad Luttrell. Here is my final proj...


Via Bas Kooter
more...
No comment yet.
Rescooped by luiy from Réseaux sociaux scientifiques
Scoop.it!

Elgg pour bâtir un réseau social de chercheurs : pourquoi ? comment ? | Deuxième labo

L’extension du domaine de la recherche, c’est utiliser les réseaux sociaux pour favoriser les fertilisations croisées à l’intérieur et à l’extérieur du laboratoire.

 

Les réseaux sociaux de chercheurs font beaucoup parler d’eux, et à raison. Le succès remporté par l’atelier que nous avons proposé à ce sujet lors du THATCamp 2012, animé par Nicolas de Lavergne et Olivier Le Deuff[1], le prouve. Les ResearchGate, Academia.edu, Mendeley et autres

 

MyScienceWork sont dans l’air du temps d’une science ultra-connectée, rapide, et mettant en œuvre tous les moyens à sa disposition pour améliorer sa visibilité et sa diffusion. Il faudrait également citer Facebook, dont les chercheurs font un usage professionnel et qui constitue pour certaines universités un moyen quasi-exclusif de mise en relation, à l’instar de l’université Lumière Lyon 2 (comme raconté ici).


Via Fondation MSH
more...
No comment yet.
Rescooped by luiy from Digital Innovations Hub
Scoop.it!

Kevin Kelly: The next 5,000 days of the web | Video on TED.com

At the 2007 EG conference, Kevin Kelly shares a fun stat: The World Wide Web, as we know it, is only 5,000 days old. Now, Kelly asks, how can we predict what's coming in the next 5,000 days? (Just over 5 yrs ago the web was 5000 days old.

Via Richard Kastelein , Vincent Bastide
more...
No comment yet.
Scooped by luiy
Scoop.it!

Surveillance and Digital Dualism: A Reflection on “Theorizing the Web” (#TtW13) | Technophilosophy

Surveillance and Digital Dualism: A Reflection on “Theorizing the Web” (#TtW13) | Technophilosophy | e-Xploration | Scoop.it
luiy's insight:

One example is collective intelligence according to philosopher Pierre Lévy (@plevy), whose ideas have, early on, orientated the French approach towards the logic of digital cooperation; the economy of contribution according to philosopher Bernard Stiegler, which is integrated into a global vision of the current hyper-industrial political economy and develops (in its way) this logic of cooperation; the psychological experience of new technologies according to psychoanalyst Serge Tisseron, who develops an empathic psychology of the relationship with machines but based on the extremely problematic concept of the ‘virtual’; the new opportunities of Internet democracy according to sociologist Dominique Cardon, in opposition to the demonization of the internet of which the media are so fond; or, in the younger generation, the new hybrid forms of sociability introduced by the digital liaisons according to the sociologist Antonio A. Casilli (@bodyspacesoc), the new ontology that emerges from the architecture of the Web according to Alexandre Monnin (@aamonnz) or the new structures of perception introduced by digital ontophany into the phenomeno-technological approach that I suggest (1).

I’m not saying that French thinkers are not interested in the issue of surveillance as it may be raised again or in a new way due to Internet technologies. What I’m saying is that it’s not what concerns them the most with regard to the internet, even if young philosophers such as Cléo Collomb (@CleoCollomb) are currently working on the ‘digital traces’ we leave behind us in the era of Big Data. Moreover, when discussing this with Lev Manovich (@manovich) during the After Party at Slattery’s Pub, I had the feeling that I was right to consider the theme of surveillance as excessive. Manovich was telling me that, according to him, this could be explained by the importance given to the individual and to ‘privacy’ in the culture of English speaking countries. For my part, I was thinking that a country that dominates the world like the United States does, and is so focused on performance, can only be extremely concerned about all forms of power that exist between individuals. But these reflections may be too simplistic in addressing this issue.

By the way, thanks to Theorizing the Web 2013, I am now more aware of surveillance issues in digital media and I even agree on the assholishness of Google Glass. 

more...
No comment yet.
Rescooped by luiy from Cooperation Theory & Practice
Scoop.it!

How Beer Gave Us Civilization

How Beer Gave Us Civilization | e-Xploration | Scoop.it
Humans may have found brew before they found bread. It’s a lucky thing.

Via Howard Rheingold
more...
Howard Rheingold's curator insight, March 17, 2013 2:56 PM

Evidence that humans started hanging out in settlements long enough for grain to ferment before settled agriculture -- in the fertile crescent and Oaxaca valley -- makes social sense. Agriculture -- an exaptation of beer brewing?

JoseAlvarezCornett's curator insight, March 18, 2013 9:09 AM

Long before Internet brought us together, beer did it first.

Scooped by luiy
Scoop.it!

Complex systems made simple

Just as the name implies, complex systems are difficult to tease apart. An organism's genome, a bio­chem­ical reac­tion, or even a social network all contain many interdependent components—and changing any one of them can have per­va­sive effects on all the others. In the case of a very large system, like the human genome, which contains 20,000 inter­con­nected genes, it's impossible to monitor the whole system at once. But that may not matter anymore. In a paper published in the prestigious multidisciplinary journal Proceedings of the National Academy of Science, North­eastern network scientific have developed an algorithm capable of iden­ti­fying the subset of components—or nodes—that are nec­es­sary to reveal a complex system's overall nature. The approach takes advan­tage of the inter­de­pen­dent nature of com­plexity to devise a method for observing sys­tems that are oth­er­wise beyond quan­ti­ta­tive scrutiny. "Con­nect­ed­ness is the essence of complex systems," said Albert-​​László Barabási, one of the paper's authors and a Distinguished Professor of Physics with joint appointments in biology and the Col­lege of Com­puter and Infor­ma­tion Sci­ence. "Thanks to the links between com­po­nents, infor­ma­tion is dis­trib­uted throughout a net­work. Hence I do not need to mon­itor everyone to have a full sense of what the system does." Barabási's col­lab­o­ra­tors com­prise Jean-​​Jacques Slo­tine of M.I.T. and Yang-​​Yu Liu, lead author and research asso­ciate pro­fessor in Northeastern's Center for Com­plex Net­work Research, for which Barabási is the founding director. Using their novel approach, the researchers first iden­tify all the math­e­mat­ical equa­tions that describe the system's dynamics. For example, in a bio­chem­ical reac­tion system, sev­eral smaller reac­tions between periph­er­ally related mol­e­cules may col­lec­tively account for the final product. By looking at how the vari­ables are affected by each of the reac­tions, the researchers can then draw a graph­ical map of the system. The nodes that form the foun­da­tion of the map reveal them­selves as indis­pen­sible to under­standing any other part of the whole. "What sur­prised me," said Liu, "was that the nec­es­sary nodes are also suf­fi­cient in most cases." That is, the indis­pen­sible nodes can tell the whole story without drawing on any of the other components. The meta­bolic system of any organism is a col­lec­tion of hun­dreds of mol­e­cules involved in thou­sands of bio­chem­ical reac­tions. The new method, which com­bines exper­tise from con­trol theory, graph theory, and net­work sci­ence, reduces large com­plex sys­tems like this to a set of essen­tial "sensor nodes." In the case of metab­o­lism, the researchers' algo­rithm could sim­plify the process of iden­ti­fying bio­markers, which are mol­e­cules in the blood that tell clin­i­cians whether an indi­vidual is healthy or sick. "Most of the cur­rent bio­markers were selected almost by chance," said Barabási. "Chemists and doc­tors found that they happen to work. Observ­ability offers a rational way to choose bio­markers, if we know the system we need to monitor."
more...
No comment yet.
Scooped by luiy
Scoop.it!

Vidéo de Michel Serres et Bernard Stiegler. Moteurs de recherche

Vidéo de Michel Serres et Bernard Stiegler. Moteurs de recherche | e-Xploration | Scoop.it
. Michel Serres et Bernard Stiegler. Moteurs de recherche
Video publiée dans la rubrique Les vidéos de Philosophie Magazine (version web).
luiy's insight:
Avec MICHEL SERRES

Né en 1930, pacifiste convaincu, il est le penseur de la communication et de la réconciliation. Observateur des grandes mutations de notre époque, il est tout sauf nostalgique. En témoigne son dernier ouvrage sur la culture digitale, Petite Poucette (Le Pommier, 2012).

Avec BERNARD STIEGLER

Philosophe, Bernard Stiegler dirige l’Institut de recherche et d’innovation (IRI) au sein du Centre Georges-Pompidou et préside l’association Ars industrialis. Il vient de signer États de choc. Bêtise et savoir au XXIe siècle (Mille et une nuits) et L’École, le Numérique et la Société qui vient (avec Julien Gautier, Denis Kambouchner, Philippe Meirieu et Guillaume Vergne ;

more...
No comment yet.
Rescooped by luiy from The World of Open
Scoop.it!

Clash of the Titans: Noam Chomsky & Michel ... - Open Culture

Clash of the Titans: Noam Chomsky & Michel ... - Open Culture | e-Xploration | Scoop.it
httpv://youtu.be/WveI_vgmPz8 Today, we're revisiting the clash of two intellectual titans, Noam Chomsky and Michel Foucault. In 1971, at the height of the.

Via cafonso
more...
No comment yet.
Scooped by luiy
Scoop.it!

lapdftext - Layout-Aware Text #Extraction from Full-text PDF of Scientific Articles | #semantic #scientometrics

lapdftext - Layout-Aware Text #Extraction from Full-text PDF of Scientific Articles | #semantic #scientometrics | e-Xploration | Scoop.it
luiy's insight:

Publications

 

If you use LA-PDFText in your project, please cite us as follows:

Ramakrishnan, C., A. Patnia, E. Hovy and G. Burns (2012). "Layout-Aware Text Extraction from Full-text PDF of Scientific Articles."Source Code for Biology and Medicine 7(1): 7. [http://www.scfbm.org/content/7/1/7/abstract]

 

Introduction

 

The Portable Document Format (PDF) is the almost universally used file format for online scientific publications. It is also notoriously difficult to read and handle computationally, presenting challenges for developers of biomedical text mining or biocuration informatics systems that use the published literature as an information source. To facilitate the effective use of scientific literature in such systems we introduce Layout-Aware PDF Text Extraction (LA-PDFText).

See Overview for a list of commands that you can execute with this tool. This includes simple and more detailed text extraction from PDF files.

 

LA-PDFText has been developed by members of the Biomedical Knowledge Engineering group @ the Information Sciences Institute. It is intended for use both scientists and NLP engineers interested in getting access to text within specific sections of research articles. The system is open-source and provides a simple baseline function for extracting text from primary research articles using rules that developers can customize. This means that the system works quite well for most applications (and might occasionally make mistakes and extract the wrong text), but it is always possible to 'hack' your own rules and improve performance.

 

For questions about future development or support of the current tool, please contact Gully Burns (gully@usc.edu). For discussions concerning the work contributing to this project, please contact any of the research team: Gully Burns, Cartic

 

Ramakrishnan (rcartic@gmail.com) or Ed Hovy (hovy@isi.edu).

more...
No comment yet.