...but never dared to ask
Presented at the Norwich Research Park, October 2, 2015.
Notes about this talk are at http://kamounlab.tumblr.com/post/130328881710/everything-you-wanted-to-know-about-research
seminar on how to write research papers without being called plagiaristAboul Ella Hassanien
Abstract: It’s easy to find information for most research papers, but it’s not always easy to add that information into your paper without falling into the plagiarism trap. There are easy ways to avoid plagiarism. Follow some simple steps while writing your research paper to ensure that your document will be free of plagiarism. This seminar will discusses the ways to avoid plagiarism in research papers including types of plagiarism, some effective tips to avoid plagiarism as well as discusses the citations.
This is an instance of fabrication. Abo created fake data and reports about preliminary studies that were never actually conducted.
The consequences could include retraction of any publications containing the fabricated data, loss of funding, loss of job or position, loss of trust and credibility in the research community, and possible legal or institutional sanctions.
To avoid this situation, Abo should have been upfront with the grant agency that preliminary studies had not yet been conducted, but that he believed his proposed methods would be successful based on related work and scientific rationale. He could have requested pilot or feasibility funding to conduct initial studies before applying for a larger grant. Fabricating data is never acceptable.
This document provides an agenda for a workshop on research skills and ethics. It begins with an introduction and dedication to the late Dr. Ahmed Zewail, then discusses the differences between scientists and researchers. The second part introduces the Scientific Research Group in Egypt, its members and activities. The third part covers important research skills like reading, referencing, and using social media. The fourth part defines research misconduct behaviors. The fifth part discusses authorship issues and the sixth presents the Committee on Publication Ethics. The document provides guidance on responsible research practices.
Research misconduct: science's self-administered poisonLeonid Schneider
Microb&Co Workshop 7ICME, October 2016,
Catania October 2016 Talk 1
How research misconduct happens and how it can be prevented. The roles of universities, journals and funders
This document summarizes key findings from the genome sequencing of the oomycete plant pathogen Magnaporthe grisea, which causes rice blast disease. Some key points:
- The draft genome sequence was 38.8 megabases in length and contained a large number of genes encoding secreted proteins and carbohydrate-binding domains that help the pathogen infect plants.
- The genome also contained an expanded family of G-protein coupled receptors and many genes involved in secondary metabolism, both of which are important for fungal pathogenesis.
- Expression of several of these genes increased during early infection, suggesting they play a role in M. grisea's ability to infect rice plants and cause disease.
"Keeping up with the plant destroyers." My talk at The Royal Society, 7 March...Sophien Kamoun
Tackling emerging threats to animal health, food security and ecosystem resilience, The Royal Society, Monday 7 – Tuesday 8 March 2016. https://royalsociety.org/events/2016/03/emerging-fungal-threats/
seminar on how to write research papers without being called plagiaristAboul Ella Hassanien
Abstract: It’s easy to find information for most research papers, but it’s not always easy to add that information into your paper without falling into the plagiarism trap. There are easy ways to avoid plagiarism. Follow some simple steps while writing your research paper to ensure that your document will be free of plagiarism. This seminar will discusses the ways to avoid plagiarism in research papers including types of plagiarism, some effective tips to avoid plagiarism as well as discusses the citations.
This is an instance of fabrication. Abo created fake data and reports about preliminary studies that were never actually conducted.
The consequences could include retraction of any publications containing the fabricated data, loss of funding, loss of job or position, loss of trust and credibility in the research community, and possible legal or institutional sanctions.
To avoid this situation, Abo should have been upfront with the grant agency that preliminary studies had not yet been conducted, but that he believed his proposed methods would be successful based on related work and scientific rationale. He could have requested pilot or feasibility funding to conduct initial studies before applying for a larger grant. Fabricating data is never acceptable.
This document provides an agenda for a workshop on research skills and ethics. It begins with an introduction and dedication to the late Dr. Ahmed Zewail, then discusses the differences between scientists and researchers. The second part introduces the Scientific Research Group in Egypt, its members and activities. The third part covers important research skills like reading, referencing, and using social media. The fourth part defines research misconduct behaviors. The fifth part discusses authorship issues and the sixth presents the Committee on Publication Ethics. The document provides guidance on responsible research practices.
Research misconduct: science's self-administered poisonLeonid Schneider
Microb&Co Workshop 7ICME, October 2016,
Catania October 2016 Talk 1
How research misconduct happens and how it can be prevented. The roles of universities, journals and funders
This document summarizes key findings from the genome sequencing of the oomycete plant pathogen Magnaporthe grisea, which causes rice blast disease. Some key points:
- The draft genome sequence was 38.8 megabases in length and contained a large number of genes encoding secreted proteins and carbohydrate-binding domains that help the pathogen infect plants.
- The genome also contained an expanded family of G-protein coupled receptors and many genes involved in secondary metabolism, both of which are important for fungal pathogenesis.
- Expression of several of these genes increased during early infection, suggesting they play a role in M. grisea's ability to infect rice plants and cause disease.
"Keeping up with the plant destroyers." My talk at The Royal Society, 7 March...Sophien Kamoun
Tackling emerging threats to animal health, food security and ecosystem resilience, The Royal Society, Monday 7 – Tuesday 8 March 2016. https://royalsociety.org/events/2016/03/emerging-fungal-threats/
My talk to the PhD students NRP at the Doctoral Training Programme Summer Conference 2015, The Assembly House, Norwich, Thursday 18th June.
Notes and acknowledgments at http://kamounlab.tumblr.com/post/121748816600/what-are-world-class-science-outputs
Sophien's lectures on Oomycetes, UEA BIO 6007B, January 2016Sophien Kamoun
This document discusses the genome of the oomycete Phytophthora infestans, the causal agent of potato late blight. It finds that the P. infestans genome is large, containing many repetitive elements. It has expanded protein families related to pathogenesis, including hundreds of effector proteins similar to known avirulence genes. Comparison to the P. ramorum genome showed the two species genomes have diverged, with rapid expansion and diversification of gene families for plant infection mechanisms. This supports an evolutionary history of these oomycete pathogens adapting through genomic changes to infect different host plants.
Undang-Undang Nomor 13 Tahun 2003 tentang Ketenagakerjaan mengatur tentang:
1. Landasan, asas, dan tujuan pembangunan ketenagakerjaan berdasarkan Pancasila dan UUD 1945
2. Kesempatan kerja dan perlakuan yang sama tanpa diskriminasi
3. Perencanaan tenaga kerja dan informasi ketenagakerjaan untuk penyusunan kebijakan dan program pembangunan SDM
4. Pelatihan kerja untuk meningkatkan kompetensi
The document discusses how influential forces in the U.S. government and media aided Fidel Castro in his rise to power in Cuba in the 1950s. It describes how the State Department and CIA refused to acknowledge Castro's early communist affiliations. It also discusses how the New York Times painted Castro positively while undermining the Batista government. This helped Castro gain power while keeping up the appearance of being non-communist. The document argues that without this support from the U.S., Castro would not have been able to establish communist rule in Cuba.
This document summarizes a meeting of the Health Information, Technology and Measurement work stream of the Rhode Island Quality Institute. The meeting agenda included reviewing themes from a previous meeting, providing updates on major health IT and measurement initiatives in Rhode Island, identifying priority technologies and functions to support payment reform, and making an initial identification of barriers and gaps. Major initiatives discussed included the state's health information exchange (CurrentCare), all-payer claims database, unified health infrastructure project, and a trailblazers action plan. Priority areas identified for supporting payment reform included improved data sharing and communication, timely claims and clinical data, standardized measures, and linking clinical and claims data. Barriers mentioned included legal issues, an evolving environment, and CurrentCare's
Letters of Oliver Cowdery to W. W. Phelps on the origin of the Book of Mormon and the rise of the Church of Jesus Christ of Latter-day Saints. Includes the famous (to those interested in Book of Mormon geography) Letter VII.
This report was submitted by the Health Care Planning and Accountability Advisory Council to the Rhode Island General Assembly. It includes an assessment of inpatient hospital services needs in Rhode Island based on reports from The Lewin Group and The Graham Center. It also reviews the state's Certificate of Need program and Hospital Conversions Act, making recommendations to improve efficiency, effectiveness, and transparency. Key findings include that hospital inpatient demand is expected to decline due to preventive care improving health, and that reforms to Certificate of Need and Hospital Conversions Act could better tie the programs to their original goals.
The document summarizes the history of Apple from its founding by Steve Jobs, Steve Wozniak, and Ronald Wayne in 1976 to develop the Apple I computer. It outlines the development of subsequent Apple products including the Apple II, Macintosh, iMac, iPod, iPhone, and iPad. It also provides biographies of the three founders and describes some of Apple's latest products such as the iPhone 6 and iPhone 6 Plus.
Tieng Anh Grade 8 (UNIT FOUR) speakingRizza Mae Go
The document provides information and examples about interviews, including defining an interview as a conversation where an interviewer asks questions to obtain facts from an interviewee. It then provides an example role play interview between an interviewer and interviewee, where the interviewer asks questions about the interviewee's past school and subjects to practice conducting an interview. The role play interview is used to demonstrate asking clear and relevant questions to obtain accurate answers from the interviewee.
FARROT - Filter Amazon Review Ratings Over Timealtens123
This document describes a project called FARROT that filters and aggregates Amazon product review ratings and totals by state or time period. It ingests review and member location data from Stanford and Illinois datasets, transforms the data using MapReduce, and stores aggregated results in an HBase database with schemas organized by product, state, and time dimension for efficient querying. The design uses HBase and bucketing to optimize for reads, scans and scalability at the cost of additional storage.
Everything you wanted to know about research integrity but never dared to askSophien Kamoun
Everything you wanted to know about research integrity but never dared to ask discusses research misconduct, standards of professional conduct, and principles of good research practice. It defines research misconduct as misrepresentation, falsification, or fabrication of data. While honest errors are not misconduct, failure to address errors could be. The importance of admitting when one is wrong and making timely corrections is emphasized. Research integrity is supported by high professional standards, good practices, appropriate oversight systems, and a culture of open discussion.
This document discusses scientific misconduct and responsible research practices. It defines scientific misconduct as fabrication, falsification, or plagiarism in research. This includes making up data, manipulating research materials to misrepresent results, and using other's ideas without credit. Responsible research involves following approved protocols, protecting participants, accurately recording and sharing results, and publishing ethically. Maintaining integrity is important to ensure reliable research and public trust.
This document discusses factual integrity and proper use of quotes and data in writing. It provides tips for using quotes and data accurately and avoiding plagiarism. Specifically, it advises not taking quotes or data out of context, falsifying information, or combining multiple sources inaccurately. The document emphasizes allowing enough time for thorough research, understanding sources fully before writing, and asking for help from references librarians or professors if needed. It notes that inaccurate or falsified information damages credibility and can undermine arguments. Finally, it provides resources for avoiding plagiarism and getting writing help.
My talk to the PhD students NRP at the Doctoral Training Programme Summer Conference 2015, The Assembly House, Norwich, Thursday 18th June.
Notes and acknowledgments at http://kamounlab.tumblr.com/post/121748816600/what-are-world-class-science-outputs
Sophien's lectures on Oomycetes, UEA BIO 6007B, January 2016Sophien Kamoun
This document discusses the genome of the oomycete Phytophthora infestans, the causal agent of potato late blight. It finds that the P. infestans genome is large, containing many repetitive elements. It has expanded protein families related to pathogenesis, including hundreds of effector proteins similar to known avirulence genes. Comparison to the P. ramorum genome showed the two species genomes have diverged, with rapid expansion and diversification of gene families for plant infection mechanisms. This supports an evolutionary history of these oomycete pathogens adapting through genomic changes to infect different host plants.
Undang-Undang Nomor 13 Tahun 2003 tentang Ketenagakerjaan mengatur tentang:
1. Landasan, asas, dan tujuan pembangunan ketenagakerjaan berdasarkan Pancasila dan UUD 1945
2. Kesempatan kerja dan perlakuan yang sama tanpa diskriminasi
3. Perencanaan tenaga kerja dan informasi ketenagakerjaan untuk penyusunan kebijakan dan program pembangunan SDM
4. Pelatihan kerja untuk meningkatkan kompetensi
The document discusses how influential forces in the U.S. government and media aided Fidel Castro in his rise to power in Cuba in the 1950s. It describes how the State Department and CIA refused to acknowledge Castro's early communist affiliations. It also discusses how the New York Times painted Castro positively while undermining the Batista government. This helped Castro gain power while keeping up the appearance of being non-communist. The document argues that without this support from the U.S., Castro would not have been able to establish communist rule in Cuba.
This document summarizes a meeting of the Health Information, Technology and Measurement work stream of the Rhode Island Quality Institute. The meeting agenda included reviewing themes from a previous meeting, providing updates on major health IT and measurement initiatives in Rhode Island, identifying priority technologies and functions to support payment reform, and making an initial identification of barriers and gaps. Major initiatives discussed included the state's health information exchange (CurrentCare), all-payer claims database, unified health infrastructure project, and a trailblazers action plan. Priority areas identified for supporting payment reform included improved data sharing and communication, timely claims and clinical data, standardized measures, and linking clinical and claims data. Barriers mentioned included legal issues, an evolving environment, and CurrentCare's
Letters of Oliver Cowdery to W. W. Phelps on the origin of the Book of Mormon and the rise of the Church of Jesus Christ of Latter-day Saints. Includes the famous (to those interested in Book of Mormon geography) Letter VII.
This report was submitted by the Health Care Planning and Accountability Advisory Council to the Rhode Island General Assembly. It includes an assessment of inpatient hospital services needs in Rhode Island based on reports from The Lewin Group and The Graham Center. It also reviews the state's Certificate of Need program and Hospital Conversions Act, making recommendations to improve efficiency, effectiveness, and transparency. Key findings include that hospital inpatient demand is expected to decline due to preventive care improving health, and that reforms to Certificate of Need and Hospital Conversions Act could better tie the programs to their original goals.
The document summarizes the history of Apple from its founding by Steve Jobs, Steve Wozniak, and Ronald Wayne in 1976 to develop the Apple I computer. It outlines the development of subsequent Apple products including the Apple II, Macintosh, iMac, iPod, iPhone, and iPad. It also provides biographies of the three founders and describes some of Apple's latest products such as the iPhone 6 and iPhone 6 Plus.
Tieng Anh Grade 8 (UNIT FOUR) speakingRizza Mae Go
The document provides information and examples about interviews, including defining an interview as a conversation where an interviewer asks questions to obtain facts from an interviewee. It then provides an example role play interview between an interviewer and interviewee, where the interviewer asks questions about the interviewee's past school and subjects to practice conducting an interview. The role play interview is used to demonstrate asking clear and relevant questions to obtain accurate answers from the interviewee.
FARROT - Filter Amazon Review Ratings Over Timealtens123
This document describes a project called FARROT that filters and aggregates Amazon product review ratings and totals by state or time period. It ingests review and member location data from Stanford and Illinois datasets, transforms the data using MapReduce, and stores aggregated results in an HBase database with schemas organized by product, state, and time dimension for efficient querying. The design uses HBase and bucketing to optimize for reads, scans and scalability at the cost of additional storage.
Everything you wanted to know about research integrity but never dared to askSophien Kamoun
Everything you wanted to know about research integrity but never dared to ask discusses research misconduct, standards of professional conduct, and principles of good research practice. It defines research misconduct as misrepresentation, falsification, or fabrication of data. While honest errors are not misconduct, failure to address errors could be. The importance of admitting when one is wrong and making timely corrections is emphasized. Research integrity is supported by high professional standards, good practices, appropriate oversight systems, and a culture of open discussion.
This document discusses scientific misconduct and responsible research practices. It defines scientific misconduct as fabrication, falsification, or plagiarism in research. This includes making up data, manipulating research materials to misrepresent results, and using other's ideas without credit. Responsible research involves following approved protocols, protecting participants, accurately recording and sharing results, and publishing ethically. Maintaining integrity is important to ensure reliable research and public trust.
This document discusses factual integrity and proper use of quotes and data in writing. It provides tips for using quotes and data accurately and avoiding plagiarism. Specifically, it advises not taking quotes or data out of context, falsifying information, or combining multiple sources inaccurately. The document emphasizes allowing enough time for thorough research, understanding sources fully before writing, and asking for help from references librarians or professors if needed. It notes that inaccurate or falsified information damages credibility and can undermine arguments. Finally, it provides resources for avoiding plagiarism and getting writing help.
This document discusses the moral foundations of research ethics and various issues that can arise, such as research misconduct, collaboration problems, peer review conflicts, and conflicts of interest. It explains that research ethics is about imperfect people making mistakes unintentionally as well as intentionally unethical actions. Research ethics violations can occur through fabrication, falsification, plagiarism, issues with authorship, data ownership, rigor of experiments, and conflicts of interest with funders. Thinking about research ethics provides tools for handling tricky ethical situations that may have unclear right answers.
This document provides an introduction to research integrity, also known as responsible conduct of research or research ethics. It outlines some of the main areas of focus, including research misconduct, collaboration issues, peer review, conflicts of interest, and human/animal subject research. The document discusses how research ethics is not just about intentionally bad acts, but also imperfect or questionable practices that may seem justified. It provides examples of issues that have arisen in areas like authorship, data sharing and ownership, and socially acceptable practices that are now deemed unethical. Overall, the document provides an overview of the moral foundations and key considerations of research integrity.
This document provides an overview of ethics in engineering research. It discusses key concepts like ethics versus morals, voluntary participation and informed consent, avoiding harm, privacy and confidentiality. Guidelines from organizations like ESRC and Elsevier on research integrity are summarized. Principles of engineering research ethics around topics like deception, risks/benefits, covert research, data issues, authorship disputes and intellectual property rights are also outlined. The goal is to introduce students to applying ethical standards in their own research.
This document provides an overview of ethics in engineering research. It discusses key concepts like ethics versus morals, voluntary participation and informed consent, avoiding harm, privacy and confidentiality. Guidelines from organizations like ESRC and Elsevier on research integrity are summarized. Principles of engineering research ethics around topics like deception, risks/benefits, covert research, data issues, authorship disputes and intellectual property rights are also outlined. The goal is to introduce students to applying ethical standards in their own research.
This document provides an overview and review of key topics in research ethics that will be covered in Chapter 4, including the relationship between society and science, professional issues in research, and the ethical treatment of research participants. It announces an upcoming exam on chapters 4, 5, and 6 that will include multiple choice, short answer, and possibly matching questions. A discounted membership to the Association for Psychological Science is also announced.
The document discusses academic honesty and misconduct in the International Baccalaureate (IB) program. It defines key terms like plagiarism, collusion, and exam misconduct. It notes that over half of investigated cases involve plagiarism while a quarter involve collusion. The document warns students about the consequences of getting caught cheating, like being banned from future exams or failing their diploma. It emphasizes that students are responsible for knowing what constitutes academic dishonesty and how to properly cite sources to avoid plagiarism.
This document discusses fact checking scholarly sources by defining fact checking practices, contextualizing sources, and examining information evaluation resources. It suggests investigating the author, discourse community, theoretical approach, methodology, and critiques to better understand a source. Examples are provided about checking the methodology, ethics, and replication of a study on autism and vaccines. Resources like author websites, citations, and critiques can help fact check. The goal is for students to think about creating their own information evaluation products.
This document discusses research ethics. It defines ethics and research ethics, and explains the importance of ethics in promoting valid research, building trust, and accountability. Key stakeholders in research like participants, researchers, funding agencies are discussed. Important ethical issues related to participants include informed consent, privacy and preventing harm. Ethical issues for researchers include honesty, objectivity, and appropriate methodology. Ethical issues for funders include restricting research and potential misuse of findings. The conclusion emphasizes balancing these issues, following guidelines, and acting ethically despite challenges to uphold scientific integrity.
This document discusses online research skills and the strengths and weaknesses of internet research. It provides tips for effective online research, such as evaluating sources for currency, accuracy, and authority. It also recommends asking good questions, going beyond surface-level information, being patient, respecting intellectual property rights, and using social networks to gather information. Regarding internet research specifically, it notes the speed and accessibility as strengths, but also the potential for incorrect information and personal data leaks as weaknesses.
The document discusses open data policies and the value of data. It outlines risks and challenges of open data like re-valuing data, ensuring data standards, and maintaining confidentiality. The document proposes initial training resources on topics like data quality, data collection methods, metadata, and archiving. It asks what capacities and skills researchers need to comply with open data policies and take advantage of them. Feedback on the training topics is requested.
Investigating allegations against employees - Liz Shread and Rachel Kirk - Ju...Browne Jacobson LLP
In this webinar Rachel and Liz went through a step by step guide on how to carry out investigations. They explain the process as well as providing some useful tips to deal with some of the issues you may encounter along the way.
Meyer-Practical tips for responsible and effective data sharingMichelle N. Meyer
This document discusses best practices for sharing research data. It begins by noting that data sharing is often required by journals, funders, and professional societies. It then provides guidance on several key aspects of planning for data sharing:
1) Do not promise to destroy data or limit its future use or access. Instead, plan to use a reputable data repository.
2) Consider risks of re-identification and invest in de-identification. Get consent to retain and broadly share data that explains the benefits and protections.
3) Work with your IRB to incorporate data sharing plans and get approval for previously collected data where consent was silent on sharing. Factors like feasibility of recontact and sensitivity of data can increase
Ethical Publishing for Academic and Research Integrity.pdfsangeetadhamdhere
The talk is given at the National Institute of Informatics, Tokyo, Japan on 24th January 2019 by Dr. Sangeeta Dhamdhere, Librarian, PES Modern College of Arts, Science and Commerce, Ganeshkhind, Pune, India
Similar to Everything you wanted to know about research integrity... (20)
Don’t perish! A step by step guide to writing a scientific paperSophien Kamoun
Sophien Kamoun's presentation to the Norwich research Park PhD student. A step by step guide to writing scientific papers. April 1, 2020.
This presentation is part of a workshop about writing scientific papers. It describes a 10 step guide for writing papers.
1. Create a folder
2. Write a story line
3. Make list of Figures
4. Finalize Figures
5. Write the Results
6. Write the Intro
7. Write the Discussion
8. Assemble the Abstract
9. Write the Title
10. Post it on bioRxiv
Faites de la Science: Mes aventures de BiologisteSophien Kamoun
Science Festival in Tunis “Fête de la science Tunisie” at the cité des Sciences de Tunis with my presentation “Faites de la Science: Mes aventures de Biologiste.”
The document discusses the research interests and vision of the Kamoun Lab, which aims to integrate evolutionary and mechanistic approaches to studying plant-microbe interactions. Specifically, the lab seeks to understand how pathogens evolve and adapt following host jumps, and how plants evolve immune responses and disease resistance. The lab uses various plant and pathogen systems combined with skills such as protein analysis, genome sequencing, CRISPR, and microscopy to answer questions about how pathogens traffic effectors into cells and how plants recognize effectors with NLR sensors.
The Edge of Tomorrow — Plant Health in the 21st CenturySophien Kamoun
Presented at the ICPP2018 International Congress of Plant Pathology Plenary Session - Plant Health is Earth’s Wealth, Monday, July 30, 2018. See notes and acknowledgments at http://kamounlab.tumblr.com/post/176385835530/the-edge-of-tomorrow-plant-health-in-the-21st
From sequence to phenotype: Functional genomics of the oomycete PhytophthoraSophien Kamoun
Sophien Kamoun's talk at the 2002 Gordon Research Conference "Cellular and Molecular Mycology", June 16-21, Holderness School, New Hampshire, USA. https://www.grc.org/cellular-and-molecular-mycology-conference/2002/
Pathogenomics of emerging plant pathogens: too little, too lateSophien Kamoun
This document discusses the threat posed by emerging plant pathogens to global food security. It notes how the potato late blight pathogen caused the Irish potato famine and continues to cause devastating crop losses. The emergence and spread of new, aggressive lineages of plant pathogens like the "blue 13" lineage of Phytophthora infestans can outcompete other lineages and overcome plant resistance. Genomic analysis of the invasive "blue 13" lineage revealed genetic changes in effector genes that enhance its virulence and allow it to infect potato cultivars. However, this lineage possesses effectors that are targets of plant immune receptors, indicating potential strategies for deploying genetic resistance. The document stresses the importance of rapidly sequencing pathogen genomes to inform management of
PPT on Direct Seeded Rice presented at the three-day 'Training and Validation Workshop on Modules of Climate Smart Agriculture (CSA) Technologies in South Asia' workshop on April 22, 2024.
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...Scintica Instrumentation
Targeting Hsp90 and its pathogen Orthologs with Tethered Inhibitors as a Diagnostic and Therapeutic Strategy for cancer and infectious diseases with Dr. Timothy Haystead.
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Sérgio Sacani
Context. The observation of several L-band emission sources in the S cluster has led to a rich discussion of their nature. However, a definitive answer to the classification of the dusty objects requires an explanation for the detection of compact Doppler-shifted Brγ emission. The ionized hydrogen in combination with the observation of mid-infrared L-band continuum emission suggests that most of these sources are embedded in a dusty envelope. These embedded sources are part of the S-cluster, and their relationship to the S-stars is still under debate. To date, the question of the origin of these two populations has been vague, although all explanations favor migration processes for the individual cluster members. Aims. This work revisits the S-cluster and its dusty members orbiting the supermassive black hole SgrA* on bound Keplerian orbits from a kinematic perspective. The aim is to explore the Keplerian parameters for patterns that might imply a nonrandom distribution of the sample. Additionally, various analytical aspects are considered to address the nature of the dusty sources. Methods. Based on the photometric analysis, we estimated the individual H−K and K−L colors for the source sample and compared the results to known cluster members. The classification revealed a noticeable contrast between the S-stars and the dusty sources. To fit the flux-density distribution, we utilized the radiative transfer code HYPERION and implemented a young stellar object Class I model. We obtained the position angle from the Keplerian fit results; additionally, we analyzed the distribution of the inclinations and the longitudes of the ascending node. Results. The colors of the dusty sources suggest a stellar nature consistent with the spectral energy distribution in the near and midinfrared domains. Furthermore, the evaporation timescales of dusty and gaseous clumps in the vicinity of SgrA* are much shorter ( 2yr) than the epochs covered by the observations (≈15yr). In addition to the strong evidence for the stellar classification of the D-sources, we also find a clear disk-like pattern following the arrangements of S-stars proposed in the literature. Furthermore, we find a global intrinsic inclination for all dusty sources of 60 ± 20◦, implying a common formation process. Conclusions. The pattern of the dusty sources manifested in the distribution of the position angles, inclinations, and longitudes of the ascending node strongly suggests two different scenarios: the main-sequence stars and the dusty stellar S-cluster sources share a common formation history or migrated with a similar formation channel in the vicinity of SgrA*. Alternatively, the gravitational influence of SgrA* in combination with a massive perturber, such as a putative intermediate mass black hole in the IRS 13 cluster, forces the dusty objects and S-stars to follow a particular orbital arrangement. Key words. stars: black holes– stars: formation– Galaxy: center– galaxies: star formation
Travis Hills of MN is Making Clean Water Accessible to All Through High Flux ...Travis Hills MN
By harnessing the power of High Flux Vacuum Membrane Distillation, Travis Hills from MN envisions a future where clean and safe drinking water is accessible to all, regardless of geographical location or economic status.
Describing and Interpreting an Immersive Learning Case with the Immersion Cub...Leonel Morgado
Current descriptions of immersive learning cases are often difficult or impossible to compare. This is due to a myriad of different options on what details to include, which aspects are relevant, and on the descriptive approaches employed. Also, these aspects often combine very specific details with more general guidelines or indicate intents and rationales without clarifying their implementation. In this paper we provide a method to describe immersive learning cases that is structured to enable comparisons, yet flexible enough to allow researchers and practitioners to decide which aspects to include. This method leverages a taxonomy that classifies educational aspects at three levels (uses, practices, and strategies) and then utilizes two frameworks, the Immersive Learning Brain and the Immersion Cube, to enable a structured description and interpretation of immersive learning cases. The method is then demonstrated on a published immersive learning case on training for wind turbine maintenance using virtual reality. Applying the method results in a structured artifact, the Immersive Learning Case Sheet, that tags the case with its proximal uses, practices, and strategies, and refines the free text case description to ensure that matching details are included. This contribution is thus a case description method in support of future comparative research of immersive learning cases. We then discuss how the resulting description and interpretation can be leveraged to change immersion learning cases, by enriching them (considering low-effort changes or additions) or innovating (exploring more challenging avenues of transformation). The method holds significant promise to support better-grounded research in immersive learning.
The cost of acquiring information by natural selectionCarl Bergstrom
This is a short talk that I gave at the Banff International Research Station workshop on Modeling and Theory in Population Biology. The idea is to try to understand how the burden of natural selection relates to the amount of information that selection puts into the genome.
It's based on the first part of this research paper:
The cost of information acquisition by natural selection
Ryan Seamus McGee, Olivia Kosterlitz, Artem Kaznatcheev, Benjamin Kerr, Carl T. Bergstrom
bioRxiv 2022.07.02.498577; doi: https://doi.org/10.1101/2022.07.02.498577
Anti-Universe And Emergent Gravity and the Dark UniverseSérgio Sacani
Recent theoretical progress indicates that spacetime and gravity emerge together from the entanglement structure of an underlying microscopic theory. These ideas are best understood in Anti-de Sitter space, where they rely on the area law for entanglement entropy. The extension to de Sitter space requires taking into account the entropy and temperature associated with the cosmological horizon. Using insights from string theory, black hole physics and quantum information theory we argue that the positive dark energy leads to a thermal volume law contribution to the entropy that overtakes the area law precisely at the cosmological horizon. Due to the competition between area and volume law entanglement the microscopic de Sitter states do not thermalise at sub-Hubble scales: they exhibit memory effects in the form of an entropy displacement caused by matter. The emergent laws of gravity contain an additional ‘dark’ gravitational force describing the ‘elastic’ response due to the entropy displacement. We derive an estimate of the strength of this extra force in terms of the baryonic mass, Newton’s constant and the Hubble acceleration scale a0 = cH0, and provide evidence for the fact that this additional ‘dark gravity force’ explains the observed phenomena in galaxies and clusters currently attributed to dark matter.
Anti-Universe And Emergent Gravity and the Dark Universe
Everything you wanted to know about research integrity...
1. Everything you wanted to know about
research integrity but never dared to ask
Sophien Kamoun
http:KamounLab.net
@KamounLab
2. We have a duty to our profession, to our funders, to our
colleagues to conduct research according to the best
scientific practice and highest professional standards
3. We have a duty to our profession, to our funders, to our
colleagues to conduct research according to the best
scientific practice and highest professional standards
4. We have a duty to our profession, to our funders, to our
colleagues to conduct research according to the best
scientific practice and highest professional standards
NO
T
5. What is research misconduct?
• Mis‐representation, falsification or fabrication of
data
• Appropriation of other’s work
• Conduct that deviates from accepted standards
• Failure to follow accepted procedures
• Mismanagement or inadequate preservation of data
and materials
• Inappropriate conduct in peer review
• Misrepresentation of involvement or authorship
6. Research misconduct is not…
• …honest error
• …honest differences in the
interpretation or assessment
of data
• However, failure to address an
error and fix the record in a
timely fashion could be
construed as research
misconduct
7. The importance
of wrong
• Our goal is to
generate robust
knowledge to
advance science
• “I was wrong” should
not be taboo
• Respond quickly,
admit error, make
correction
8. Research misconduct is less likely to arise
in an environment with…
• …high professional standards
• …good practices
• …appropriate managerial
systems
• …a culture of open
discussion and sharing
9. Standards of professional conduct
• Honesty and fairness
• Accuracy and rigour
• Accountability
• Openness and transparency
• Independence
• Respect
• Co‐operation and collegiality
10. Principles of good research practice
• A Critical Approach
• Documenting Results
• Storage and Disposal of Data
• Authorship and Publication
• Collaborators and Partners
• Exploitation and Protection of
Intellectual Assets
11. Support and oversight
• Training on research
integrity
• UEA research integrity
portal http://
www.uea.ac.uk/research/
our-research-integrity
• Procedure for reporting
allegations (whistleblowing)
• Procedure for dealing with
allegations