The data of this study indicate that the acetate recovery factor, used in stable isotope research, needs to be deteremined in every subject, under similar conditions as used for the tracer-derived determination of substrate oxidation.
This letter to the editor argues that the assumption of a single value for the acetate recovery factor in carbon-13 stable isotope research for different individuals, can lead to significant errors in the outcomes of substrate utilization measurements.
We show how to estimate a Cronbach's alpha reliability coefficient in Stata after running a principal component or factor analysis. Alpha evaluates to what extent items measure the same underlying content when the items are combined into a scale or used for latent variable. Stata allows for testing the reliability coefficient (alpha) of a scale only when all items receive homogenous weights. We present a user-written program that computes reliability coefficients when implementation of principal component or factor analysis shows heterogeneous item loadings. We use data on management practices from Bloom and Van Reenen (2010) to explain how to implement and interpret the adjusted internal consistency measure using afa.
In order to stay competitive and respond to the increasing demand for steady and predictable aircraft turnaround times, process optimization has been identified by Maintenance, Repair and Overhaul (MRO) SMEs in the aviation industry as their key element for innovation. Indeed, MRO SMEs have always been looking for options to organize their work as efficient as possible, which often resulted in applying lean business organization solutions. However, their aircraft maintenance processes stay characterized by unpredictable process times and material requirements. Lean business methodologies are unable to change this fact. This problem is often compensated by large buffers in terms of time, personnel and parts, leading to a relatively expensive and inefficient process. To tackle this problem of unpredictability, MRO SMEs want to explore the possibilities of data mining: the exploration and analysis of large quantities of their own historical maintenance data, with the meaning of discovering useful knowledge from seemingly unrelated data. Ideally, it will help predict failures in the maintenance process and thus better anticipate repair times and material requirements. With this, MRO SMEs face two challenges. First, the data they have available is often fragmented and non-transparent, while standardized data availability is a basic requirement for successful data analysis. Second, it is difficult to find meaningful patterns within these data sets because no operative system for data mining exists in the industry. This RAAK MKB project is initiated by the Aviation Academy of the Amsterdam University of Applied Sciences (Hogeschool van Amsterdan, hereinafter: HvA), in direct cooperation with the industry, to help MRO SMEs improve their maintenance process. Its main aim is to develop new knowledge of - and a method for - data mining. To do so, the current state of data presence within MRO SMEs is explored, mapped, categorized, cleaned and prepared. This will result in readable data sets that have predictive value for key elements of the maintenance process. Secondly, analysis principles are developed to interpret this data. These principles are translated into an easy-to-use data mining (IT)tool, helping MRO SMEs to predict their maintenance requirements in terms of costs and time, allowing them to adapt their maintenance process accordingly. In several case studies these products are tested and further improved. This is a resubmission of an earlier proposal dated October 2015 (3rd round) entitled ‘Data mining for MRO process optimization’ (number 2015-03-23M). We believe the merits of the proposal are substantial, and sufficient to be awarded a grant. The text of this submission is essentially unchanged from the previous proposal. Where text has been added – for clarification – this has been marked in yellow. Almost all of these new text parts are taken from our rebuttal (hoor en wederhoor), submitted in January 2016.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.
The projectThe overarching goal of DIGNITY, DIGital traNsport In and for socieTY, is to foster a sustainable, integrated and user-friendly digital travel eco-system that improves accessibility and social inclusion, along with the travel experience and daily life of all citizens. The project delves into the digital transport eco-system to grasp the full range of factors that might lead to disparities in the uptake of digitalised mobility solutions by different user groups in Europe. Analysing the digital transition from both a user and provider’s perspective, DIGNITY looks at the challenges brought about by digitalisation, to then design, test and validate the DIGNITY approach, a novel concept that seeks to become the ‘ABCs for a digital inclusive travel system’. The approach combines proven inclusive design methodologies with the principles of foresight analysis to examine how a structured involvement of all actors – local institutions, market players, interest groups and end users – can help bridge the digital gap by co-creating more inclusive mobility solutions and by formulating user-centred policy frameworks.The objectivesThe idea is to support public and private mobility providers in conceiving mainstream digital products or services that are accessible to and usable by as many people as possible, regardless of their income, social situation or age; and to help policy makers formulate long-term strategies that promote innovation in transport while responding to global social, demographic and economic changes, including the challenges of poverty and migration.The missionBy focusing on and involving end-users throughout the process of designing policies, products, or services, it is possible to reduce social exclusion while boosting new business models and social innovation. The end result that DIGNITY is aiming for is an innovative decision support tool that can help local and regional decision-makers formulate digitally inclusive policies and strategies, and digital providers design more inclusive products and services.The approachThe DIGNITY approach combines analysis with concrete actions to make digital mobility services inclusive over the long term. The approach connects users’ needs and requirements with the provision of mobility services, and at the same time connects those services to the institutional framework. It is a multi-phase process that first seeks to understand and bridge the digital gap, and then to test, evaluate and fine-tune the approach, so that it can be applied in other contexts even after the project’s end.Partners: ISINNOVA (Italy), Mobiel 21 (Belgium), Universitat Politechnica deCatalunya Spain), IZT (Germany), University of Cambridge (UK), Factualconsulting (Spain), Barcelona Regional Agencia (Spain), City of Tilburg(Netherlands), Nextbike (Germany), City of Ancona (Italy), MyCicero (Italy),Conerobus (Italy), Vlaams Gewest (Belgium)