並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 21 件 / 21件

新着順 人気順

united arab emirates universityの検索結果1 - 21 件 / 21件

  • 本学教員による研究活動に係る不正行為について

    3月27日付で、本学国際学術院所属の助教1名を訓戒といたしました。 1.経緯 対象教員が、助教として採用される前の若手研究者の時の行為に関して、2022年6月に文部科学省および日本学術振興会に対して通報がなされ、本学において調査した結果、研究者としてわきまえるべき基本的な注意義務を著しく怠っていたとして、研究活動に係る不正行為であったと認定いたしました。 2.概要 次の論文A,B,Cおよび学会発表Cにおいて、各研究成果の中に示されたデータや調査結果等に関して、不適切な取扱い(論文の内容と分析したデータの内容との齟齬や、インタビューにおける発言と反訳データの不一致が複数箇所あること等)が指摘されており、これを「改ざん」と認定しました。また、論文Aで示した分析結果の表を、論文B,Cに出典を明記せずに引用していることから、「その他の不正行為」として、「自己盗用」と認定しました。 これらの不正行為

      本学教員による研究活動に係る不正行為について
    • GitHub - CSSEGISandData/COVID-19: Novel Coronavirus (COVID-19) Cases, provided by JHU CSSE

      On March 10, 2023, the Johns Hopkins Coronavirus Resource Center ceased its collecting and reporting of global COVID-19 data. For updated cases, deaths, and vaccine data please visit the following sources: Global: World Health Organization (WHO) U.S.: U.S. Centers for Disease Control and Prevention (CDC) For more information, visit the Johns Hopkins Coronavirus Resource Center. This is the data re

        GitHub - CSSEGISandData/COVID-19: Novel Coronavirus (COVID-19) Cases, provided by JHU CSSE
      • 資料2-1:豊田先生御講演資料

        鈴鹿医療科学大学 豊田長康 2024/04/22 日本学術会議 「研究力強化と学術会議への期待」 2024/04/22 1 日本の研究競争力低下の因果推論 (事前配布資料) 資料2-1 論文データ Clarivate社の文献データベース(以下DB)であるWeb of Science Core Collection のデータを、分析ツール InCites Benchmarking & Analytics(以下InCites)を 用いて分析 なお、発表者はInCitesとSciValの両方を利用できる環境にある が、所期の目的の分析はSciValでは困難なため、InCitesで分析 した。 文部科学省 科学技術・学術政策研究所(以下NISTEP) の分析データ 他のデータ OECD.Statの公開データ 文部科学省、国立大学法人等のデータ 2 本発表のデータの入手元 2024/0

        • Revealed: leak uncovers global abuse of cyber-surveillance weapon

          Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016. Forbidden Stories, a Paris-based nonprofit media organi

            Revealed: leak uncovers global abuse of cyber-surveillance weapon
          • World University Rankings

            Everything you need for each step of your study abroad journey The Times Higher Education World University Rankings 2024 include 1,906 universities across 108 countries and regions. The table is based on our new WUR 3.0 methodology, which includes 18 carefully calibrated performance indicators that measure an institution’s performance across five areas: teaching, research environment, research qua

              World University Rankings
            • Coronavirus: the first three months as it happened

              Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript. The first US deaths related to coronavirus might have occurred wee

                Coronavirus: the first three months as it happened
              • 2021 Trafficking in Persons Report - United States Department of State

                Message From the Secretary of State Dear Reader: This year’s Trafficking in Persons Report sends a strong message to the world that global crises, such as the COVID-19 pandemic, climate change, and enduring discriminatory policies and practices, have a disproportionate effect on individuals already oppressed by other injustices.  These challenges further compound existing vulnerabilities to exploi

                  2021 Trafficking in Persons Report - United States Department of State
                • Japan Cites ‘National Security’ in Free Trade Crackdown. Sound Familiar? (Published 2019)

                  South Korea’s president, Moon Jae-in, left, with Prime Minister Shinzo Abe of Japan at the Group of 20 nations meeting in Japan last month. Credit...Brendan Smialowski/Agence France-Presse — Getty Images Last month, before an audience of world leaders, Prime Minister Shinzo Abe of Japan forcefully defended the global trade order that President Trump has so dramatically fractured. “A free and open

                    Japan Cites ‘National Security’ in Free Trade Crackdown. Sound Familiar? (Published 2019)
                  • Right-Wing Media Outlets Duped by a Middle East Propaganda Campaign

                    Conservative sites like Newsmax and Washington Examiner have published Middle East hot takes from “experts” who are actually fake personas pushing propaganda. If you want a hot take about the Middle East, Raphael Badani is your man. As a Newsmax “Insider” columnist, he has thoughts about how Iraq needs to rid itself of Iranian influence to attract investment and why Dubai is an oasis of stability

                      Right-Wing Media Outlets Duped by a Middle East Propaganda Campaign
                    • North Korea’s enigmatic role in the Middle East arms market

                      Pyongyang was once a major arms supplier to the region, but what remains of that role today? Unidentified North Korean missile launchers displayed during a parade marking 105th anniversary of birth of late North Korean leader Kim Il-Sung, in Pyongyang, on 15 April 2017 (AFP) North Korea has sold weapons to a number of countries in the Middle East over the decades, and analysts say Pyongyang remain

                        North Korea’s enigmatic role in the Middle East arms market
                      • Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm

                        APT41: The threat of KeyPlug against Italian industries | Critical SQL Injection flaws impact Ivanti Endpoint Manager (EPM) | Chinese actor 'Unfading Sea Haze' remained undetected for five years | A consumer-grade spyware app found in check-in systems of 3 US hotels | Critical Veeam Backup Enterprise Manager authentication bypass bug | Cybercriminals are targeting elections in India with influence

                          Sodinokibi Ransomware gang threatens to disclose data from Kenneth Cole fashion firm
                        • Experts discovered millions of .git folders exposed to public

                          Crooks manipulate GitHub's search results to distribute malware | BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulner

                            Experts discovered millions of .git folders exposed to public
                          • The More Gender Equality, the Fewer Women in STEM

                            Artist Tjaasa Gusfors poses next to her Jesus Christ ice statue near Stockholm in 2011. (TT News Agency / Reuters) Though their numbers are growing, only 27 percent of all students taking the AP Computer Science exam in the United States are female. The gender gap grows worse from there: Just 18 percent of American computer-science college degrees go to women. This is in the U.S., where many colle

                              The More Gender Equality, the Fewer Women in STEM
                            • アブラハム合意 - Wikipedia

                              アラブ首長国連邦 (赤)とイスラエル (青) アブラハム和平協定合意:アラブ首長国連邦とイスラエル国間における平和条約及び国交正常化 (英語:Abraham Accords Peace Agreement: Treaty of Peace, Diplomatic Relations and Full Normalization Between the United Arab Emirates and the State of Israel)[1]、通称アラブ首長国連邦・イスラエル平和条約 (Israel–United Arab Emirates peace agreement) 、 アブラハム合意、アブラハム協定 (Abraham Accord) とも[2]、は2020年8月13日にアラブ首長国連邦とイスラエルの間で締結された外交合意である。 この用語については、アラブ首長国連邦とイスラエ

                                アブラハム合意 - Wikipedia
                              • Eight Things to Know about Large Language Models

                                Eight Things to Know about Large Language Models Samuel R. Bowman 1 2 Abstract The widespread public deployment of large lan- guage models (LLMs) in recent months has prompted a wave of new attention and engage- ment from advocates, policymakers, and scholars from many fields. This attention is a timely re- sponse to the many urgent questions that this tech- nology raises, but it can sometimes mis

                                • OpenAI's Rules for Model Behavior, Better Brain-Controlled Robots, and more

                                  Dear friends, In the last couple of days, Google announced a doubling of Gemini Pro 1.5's input context window from 1 million to 2 million tokens, and OpenAI released GPT-4o, which generates tokens 2x faster and 50% cheaper than GPT-4 Turbo and natively accepts and generates multimodal tokens. I view these developments as the latest in an 18-month trend. Given the improvements we've seen, best pra

                                    OpenAI's Rules for Model Behavior, Better Brain-Controlled Robots, and more
                                  • New EvilQuest ransomware targets macOS users ...

                                    Google fixes fifth actively exploited Chrome zero-day this year | Russia-linked APT28 targets government Polish institutions | Citrix warns customers to update PuTTY version installed on their XenCenter system manually | Dell discloses data breach impacting millions of customers | Mirai botnet also spreads through the exploitation of Ivanti Connect Secure bugs | Zscaler is investigating data breac

                                      New EvilQuest ransomware targets macOS users ...
                                    • A flaw in LastPass password manager leaks credentials from previous site

                                      Magento flaw exploited to deploy persistent backdoor hidden in XML | Cyberattack disrupted services at Omni Hotels & Resorts | HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks | US cancer center City of Hope: data breach impacted 827149 individuals | Ivanti fixed for 4 new issues in Connect Secure and Policy Secure | Jackson County, Missouri, discloses a ransomware attack | Goog

                                        A flaw in LastPass password manager leaks credentials from previous site
                                      • Splinternet - Wikipedia

                                        HTTP 403 Forbidden server response to a geo-blocked website https://sss.gov (Selective Service System) accessed from a Russian internet provider. The splinternet (also referred to as cyber-balkanization or internet balkanization) is a characterization of the Internet as splintering and dividing due to various factors, such as technology, commerce, politics, nationalism, religion, and divergent nat

                                          Splinternet - Wikipedia
                                        • Two kids found a screensaver bypass in Linux Mint

                                          Dirty stream attack poses billions of Android installs at risk | ZLoader Malware adds Zeus's anti-analysis feature | Ukrainian REvil gang member sentenced to 13 years in prison | HPE Aruba Networking addressed four critical ArubaOS RCE flaws | Threat actors hacked the Dropbox Sign production environment | CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog | Panda Restaurant Group

                                            Two kids found a screensaver bypass in Linux Mint
                                          • GitHub flaw could have allowed attackers to takeover repositories of other users

                                            BatBadBut flaw allowed an attacker to perform command injection on Windows | Roku disclosed a new security breach impacting 576,000 accounts | LastPass employee targeted via an audio deepfake call | TA547 targets German organizations with Rhadamanthys malware | CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog | US CISA published an alert on the Sisense data

                                              GitHub flaw could have allowed attackers to takeover repositories of other users
                                            1