TLS and GB-RAR Measurements of Vibration Frequencies and Oscillation Amplitudes of Tall Structures: An Application to Wind Towers

This article presents a methodology for the monitoring of tall structures based on the joint use of a terrestrial laser scanner (TLS), configured in line scanner mode, and a ground-based real aperture radar (GB-RAR) interferometer. The methodology provides both natural frequencies and oscillation amplitudes of tall structures. Acquisitions of the surface of the tall structure are performed by the TLS with a high sampling rate: each line scan provides an instantaneous longitudinal section.

NeuroPycon: An open-source python toolbox for fast multi-modal and reproducible brain connectivity pipelines

Recent years have witnessed a massive push towards reproducible research in neuroscience. Unfortunately, this endeavor is often challenged by the large diversity of tools used, project-specific custom code and the difficulty to track all user-defined parameters. NeuroPycon is an open-source multi-modal brain data analysis toolkit which provides Python-based template pipelines for advanced multi-processing of MEG, EEG, functional and anatomical MRI data, with a focus on connectivity and graph theoretical analyses.

Quantum Trajectories for the Dynamics in the Exact Factorization Framework: A Proof-of-Principle Test

In the framework of the exact factorization of the time-dependent electron-nuclear wave function, we investigate the possibility of solving the nuclear time-dependent Schrödinger equation based on trajectories. The nuclear equation is separated in a Hamilton-Jacobi equation for the phase of the wave function, and a continuity equation for its (squared) modulus. For illustrative adiabatic and nonadiabatic one-dimensional models, we implement a procedure to follow the evolution of the nuclear density along the characteristics of the Hamilton-Jacobi equation.

Cryptanalysis on GPUs with the Cube Attack: Design, Optimization and Performances Gains

The cube attack is a flexible cryptanalysis technique, with a simple and fascinating theoretical implant. It combines offline exhaustive searches over selected tweakable public/IV bits (the sides of the "cube"), with an online key-recovery phase. Although virtually applicable to any cipher, and generally praised by the research community, the real potential of the attack is still in question, and no implementation so far succeeded in breaking a real-world strong cipher. In this paper, we present, validate and analyze the first thorough implementation of the cube attack on a GPU cluster.

Security in wireless ad-hoc networks - A survey

Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there are two pillars that cannot be overlooked: security and privacy. Both properties are especially relevant if we focus on ad-hoc wireless networks, where devices are required to cooperate - e.g.

Cloud Detection: An Assessment Study from the ESA Round Robin Exercise for PROBA-V

A Round Robin exercise was implemented by ESA to compare different classification methods in detecting clouds from images taken by the PROBA-V sensor. A high-quality dataset of 1350 reflectances and Clear/Cloudy corresponding labels had been prepared by ESA in the framework of the exercise. Motivated by both the experience acquired by one of the authors in this exercise and the availability of such a reliable annotated dataset, we present a full assessment of the methodology proposed therein.

Multi-Word Structural Topic Modelling of ToR Drug Marketplaces

Topic Modelling (TM) is a widely adopted generative model used to infer the thematic organization of text corpora. When document-level covariate information is available, so-called Structural Topic Modelling (STM) is the state-of-the-art approach to embed this information in the topic mining algorithm. Usually, TM algorithms rely on unigrams as the basic text generation unit, whereas the quality and intelligibility of the identified topics would significantly benefit from the detection and usage of topical phrasemes.

An ERA5-Based Hourly Global Pressure and Temperature (HGPT) Model

The Global Navigation Satellite System (GNSS) meteorology contribution to the comprehension of the Earth's atmosphere's global and regional variations is essential. In GNSS processing, the zenith wet delay is obtained using the difference between the zenith total delay and the zenith hydrostatic delay. The zenith wet delay can also be converted into precipitable water vapor by knowing the atmospheric weighted mean temperature profiles.

ZBTB2 protein is a new partner of the Nucleosome Remodeling and Deacetylase (NuRD) complex

ZBTB2 is a protein belonging to the BTB/POZ zinc-finger family whose members typically contain a BTB/POZ domain at the N-terminus and several zinc-finger domains at the C-terminus. Studies have been carried out to disclose the role of ZBTB2 in cell proliferation, in human cancers and in regulating DNA methylation. Moreover, ZBTB2 has been also described as an ARF, p53 and p21 gene repressor as well as an activator of genes modulating pluripotency. In this scenario, ZBTB2 seems to play many functions likely associated with other proteins.