Difference between revisions of "Main Page/Featured article of the week/2019"
Shawndouglas (talk | contribs) (Added last week's article of the week) |
Shawndouglas (talk | contribs) (Added last week's article of the week) |
||
(14 intermediate revisions by the same user not shown) | |||
Line 17: | Line 17: | ||
<!-- Below this line begin pasting previous news --> | <!-- Below this line begin pasting previous news --> | ||
<h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 15–21:</h2> | <h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: November 4–10:</h2> | ||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Hodhod IntJofOnlineBiomedEng2019 15-3.png|240px]]</div> | |||
'''"[[Journal:CyberMaster: An expert system to guide the development of cybersecurity curricula|CyberMaster: An expert system to guide the development of cybersecurity curricula]]"''' | |||
The growing number of reported cyberattacks poses a difficult challenge to individuals, governments, and organizations. Adequate protection of [[information]] systems urgently requires a [[cybersecurity]]-educated workforce trained using a curriculum that covers the essential skills required for different cybersecurity work roles. The goal of the CyberMaster [[expert system]] is to assist inexperienced instructors with cybersecurity course design. It is an intelligent system that uses visual feedback to guide the user through the design process. Initial test executions show the promise of such a system in addressing the enormous shortage of cybersecurity experts currently available for designing courses and training programs. ('''[[Journal:CyberMaster: An expert system to guide the development of cybersecurity curricula|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: October 21–November 3:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Tab2 Valdes-Donoso CaliforniaAg2019 73-3.jpg|240px]]</div> | |||
'''"[[Journal:Costs of mandatory cannabis testing in California|Costs of mandatory cannabis testing in California]]"''' | |||
Every batch of [[wikipedia:Cannabis|cannabis]] sold legally in California must be tested for more than 100 contaminants. These contaminants include 66 pesticides, for 21 of which the state's tolerance is zero. For many other substances, tolerance levels are much lower than those allowed for food products in California. This article reviews the state's testing [[Regulatory compliance|regulations]] in context—including maximum allowable tolerance levels—and uses primary data collected from California's major cannabis testing [[Laboratory|laboratories]] and several cannabis testing equipment manufacturers, as well as a variety of expert opinions, to estimate the cost per pound of testing under the state's framework. We also estimate the cost of collecting [[Sample (material)|samples]], which depends on the distance between cannabis distributors and laboratories. We find that, if a batch fails mandatory tests, the value of cannabis that must be destroyed accounts for a large share of total testing costs, more than the cost of the tests that laboratories perform. Findings from this article will help readers understand the effects of California's testing regime on the price of legal cannabis in the state, and understand how testing may add value to products that have passed a series of tests that aim to validate their safety. ('''[[Journal:Costs of mandatory cannabis testing in California|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: October 14–20:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Armstrong FrontMarineSci2019 6.jpg|240px]]</div> | |||
'''"[[Journal:An integrated data analytics platform|An integrated data analytics platform]]"''' | |||
A scientific integrated data analytics platform (IDAP) is an environment that enables the confluence of resources for scientific investigation. It harmonizes data, tools, and computational resources to enable the research community to focus on the investigation rather than spending time on security, data preparation, management, etc. OceanWorks is a National Aeronautics and Space Administration (NASA) technology integration project to establish a [[Cloud computing|cloud-based]] integrated ocean science [[Data analysis|data analytics]] platform for managing ocean science research data at NASA’s Physical Oceanography Distributed Active Archive Center (PO.DAAC). The platform focuses on advancement and maturity by bringing together several NASA open-source, big data projects for parallel analytics, anomaly detection, ''in situ''-to-satellite data matching, quality-screened data subsetting, search relevancy, and data discovery. ('''[[Journal:An integrated data analytics platform|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: October 7–13:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Annane IntJInterMobileTech2019 13-4.png|240px]]</div> | |||
'''"[[Journal:Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges|Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges]]"''' | |||
The principle constraints of mobile devices are their limited resources, including processing capability, storage space, and battery life. However, [[cloud computing]] offers a means of vast computing resources and services. With it a new idea emerged, the inclusion of cloud computing into mobile devices such as smartphones, tablet, and other personal digital assistants (PDA) to augment their capacities, providing a robust technology called mobile cloud computing (MCC). Although MCC has brought many advantages to mobile users, it also still suffers from the security and privacy issues of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of security experts are turned towards the virtualization-based security techniques used either on the cloud or on mobile devices. The new challenge is to develop secure methods in order to authenticate highly sensitive digital content. ('''[[Journal:Virtualization-based security techniques on mobile cloud computing: Research gaps and challenges|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 30–October 6:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Greene DataScienceJ2019 18-1.jpg|240px]]</div> | |||
'''"[[Journal:Building open access to research (OAR) data infrastructure at NIST|Building open access to research (OAR) data infrastructure at NIST]]"''' | |||
As a National Metrology Institute (NMI), the U.S. National Institute of Standards and Technology (NIST) scientists, engineers, and technology experts conduct research across a full spectrum of physical science domains. NIST is a non-regulatory agency within the U.S. Department of Commerce with a mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. NIST research results in the production and distribution of standard [[Reference laboratory#Reference measurement and calibration|reference materials]], [[[[Reference laboratory#Reference measurement and calibration|calibration services]], and datasets. These are generated from a wide range of complex [[laboratory]] instrumentation, expert analyses, and calibration processes. In response to a government open data policy, and in collaboration with the broader research community, NIST has developed a federated Open Access to Research (OAR) scientific data infrastructure aligned with FAIR (findable, accessible, interoperable, reusable) data principles. ('''[[Journal:Building open access to research (OAR) data infrastructure at NIST|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 23–29:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Baratta FrontPharmaco2019 10.jpg|240px]]</div> | |||
'''"[[Journal:Development of standard operating protocols for the optimization of Cannabis-based formulations for medical purposes|Development of standard operating protocols for the optimization of Cannabis-based formulations for medical purposes]]"''' | |||
Under current legislation in Italy, using the ''[[wikipedia:Cannabis|Cannabis]]'' plant for medical purposes requires administering it orally in the form of a decoction or as ''Cannabis'' oil extract. The scientific literature reports a number of preparation methods, mainly for oils, but no study is available that compares thoroughly, from a technological viewpoint, the ''Cannabis''-based formulations currently administered to patients. With this in mind, this research work aimed to carry out specific formulation studies to design standard operating procedures for the preparation and optimization of ''Cannabis''-based galenic formulations. Both decoctions and oils were prepared under different operating conditions to identify the most efficient process for the production of formulations with a high concentration of [[wikipedia:Decarboxylation|decarboxylated]] [[wikipedia:Tetrahydrocannabinol|delta-9-tetrahydrocannabinol]] (THC) and [[wikipedia:Cannabidiol|cannabidiol]] (CBD). Regarding ''Cannabis'' oil, a new procedure has been developed that allows significantly higher recovery rates for THC and CBD compared with those for water-based extraction methods (decoction) and those for oil-based methods currently in use. ('''[[Journal:Development of standard operating protocols for the optimization of Cannabis-based formulations for medical purposes|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 16–22:</h2> | |||
'''"[[Journal:Next steps for access to safe, secure DNA synthesis|Next steps for access to safe, secure DNA synthesis]]"''' | |||
The [[DNA synthesis]] industry has, since the invention of gene-length synthesis, worked proactively to ensure synthesis is carried out securely and safely. Informed by guidance from the U.S. government, several of these companies have collaborated over the last decade to produce a set of best practices for customer and sequence screening prior to manufacture. Taken together, these practices ensure that synthetic DNA is used to advance research that is designed and intended for public benefit. With increasing scale in the industry and expanding capability in the synthetic biology toolset, it is worth revisiting current practices to evaluate additional measures to ensure the continued safety and wide availability of DNA synthesis. Here we encourage specific steps, in part derived from successes in the [[cybersecurity]] community, that can ensure synthesis screening systems stay well ahead of emerging challenges, to continue to enable responsible research advances. [[Artificial gene synthesis|Gene synthesis]] companies, science and technology funders, policymakers, and the scientific community as a whole have a shared duty to continue to minimize risk and maximize the safety and security of DNA synthesis to further power world-changing developments in advanced biological manufacturing, agriculture, drug development, healthcare, and energy. ('''[[Journal:Next steps for access to safe, secure DNA synthesis|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 9–15:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Oyashi GeospatialHlth2019 14-1.png|240px]]</div> | |||
'''"[[Journal:Smart grids and ethics: A case study|Smart grids and ethics: A case study]]"''' | |||
This case study explores the principal ethical issues that occur in the use of smart information systems (SIS) in smart grids and offers suggestions as to how they might be addressed. Key issues highlighted in the literature are reviewed. The empirical case study describes one of the largest distribution system operators (DSOs) in the Netherlands. The aim of this case study is to identify which ethical issues arise from the use of SIS in smart grids, the current efforts of the organization to address them, and whether practitioners are facing additional issues not addressed in current literature. The literature review highlights mainly ethical issues around health and safety, privacy and informed consent, cyber-risks and energy security, affordability, equity, and sustainability. The key topics raised by interviewees revolved around privacy and to some extent [[cybersecurity]]. ('''[[Journal:Smart grids and ethics: A case study|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 2–8:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Hatzakis ORBITJ2019 2-2.png|240px]]</div> | |||
'''"[[Journal:Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study|Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study]]"''' | |||
Since the 1970s, Earth-observing satellites collect increasingly detailed [[Environmental monitoring|environmental information]] on land cover, meteorological conditions, environmental variables, and air pollutants. This [[information]] spans the entire globe, and its acquisition plays an important role in epidemiological analysis when ''in situ'' data are unavailable or spatially and/or temporally sparse. In this paper, we present the development of the Japan Aerospace Exploration Agency’s (JAXA) Public-health Monitoring and Analysis Platform, a user-friendly, web-based system providing environmental data on shortwave radiation, rainfall, soil moisture, the normalized difference vegetation index, aerosol optical thickness, land surface temperature and altitude. ('''[[Journal:Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 26–September 1:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Anwar PLOSMed2019 16-5.png|240px]]</div> | |||
'''"[[Journal:Heart failure and healthcare informatics|Heart failure and healthcare informatics]]"''' | |||
As biomedical research expands our armory of effective, evidence-based therapies, there is a corresponding need for high-quality implementation science—the study of strategies to integrate and embed research advances into [[Health care|clinical practice]]. Large-scale collection and analysis of routinely collected healthcare data may facilitate this in three main ways. Firstly, evaluation of key healthcare metrics can help to identify the areas of practice that differ most from guideline recommendations. Secondly, with sufficiently granular data, it may be possible to detect the underlying drivers of deficiencies in practice. Thirdly, longitudinal data collection should enable us to evaluate large-scale policy initiatives and compare the effectiveness of differing strategies on process and patient outcomes. ('''[[Journal:Heart failure and healthcare informatics|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 19–25:</h2> | |||
'''"[[Journal:Cyberbiosecurity for biopharmaceutical products|Cyberbiosecurity for biopharmaceutical products]]"''' | |||
Cyberbiosecurity is an emerging discipline that addresses the unique vulnerabilities and threats that occur at the intersection of cyberspace and [[biotechnology]]. Advances in technology and manufacturing are increasing the relevance of cyberbiosecurity to the biopharmaceutical manufacturing community in the United States. Threats may be associated with the biopharmaceutical product itself or with the digital thread of manufacturing of biopharmaceuticals, including those that relate to supply chain and cyberphysical systems. Here, we offer an initial examination of these cyberbiosecurity threats as they stand today, as well as introductory steps toward paths for mitigation of cyberbiosecurity risk for a safer, more secure future. ('''[[Journal:Cyberbiosecurity for biopharmaceutical products|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 12–18:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Matielo Publications2018 6-4.png|240px]]</div> | |||
'''"[[Journal:A bibliometric analysis of Cannabis publications: Six decades of research and a gap on studies with the plant|A bibliometric analysis of ''Cannabis'' publications: Six decades of research and a gap on studies with the plant]]"''' | |||
In this study we performed a bibliometric analysis focusing on the general patterns of scientific publications about ''[[wikipedia:Cannabis|Cannabis]]'', revealing their trends and limitations. Publications related to ''Cannabis'', released from 1960 to 2017, were retrieved from the Scopus database using six search terms. The search term “[[wikipedia:Genetics|Genetics]]” returned 53.4% of publications, while “forensic genetics” and “[[wikipedia:Traceability|traceability]]” represented 2.3% and 0.1% of the publications, respectively. However, 43.1% of the studies were not directly related to ''Cannabis'' and, in some cases, ''Cannabis'' was just used as an example in the text. A significant increase in publications was observed after 2001, with most of the publications coming from Europe, followed by North America. Although the term "''Cannabis''" was found in the title, abstract, or keywords of 1284 publications, we detected a historical gap in studies on the plant. ('''[[Journal:A bibliometric analysis of Cannabis publications: Six decades of research and a gap on studies with the plant|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 5–11:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Mudge AnalBioChem2017 409-12.gif|240px]]</div> | |||
'''"[[Journal:Leaner and greener analysis of cannabinoids|Leaner and greener analysis of cannabinoids]]"''' | |||
There is an explosion in the number of [[Laboratory|labs]] analyzing [[wikipedia:Cannabinoid|cannabinoids]] in marijuana ([[wikipedia:Cannabis|''Cannabis sativa'' L.]], Cannabaceae); however, existing methods are inefficient, require expert analysts, and use large volumes of potentially environmentally damaging [[wikipedia:Solvent|solvents]]. The objective of this work was to develop and validate an accurate method for analyzing cannabinoids in cannabis raw materials and finished products that is more efficient and uses fewer toxic solvents. A method using [[high-performance liquid chromatography]] (HPLC) with [[Chromatography detector|diode-array detection]] (DAD) was developed for eight cannabinoids in ''Cannabis'' flowers and oils using a statistically guided optimization plan based on the principles of green chemistry. A single-laboratory validation determined the linearity, selectivity, accuracy, repeatability, intermediate precision, limit of detection, and limit of quantitation of the method. Amounts of individual cannabinoids above the limit of quantitation in the flowers ranged from 0.02 to 14.9% concentration (w/w), with repeatability ranging from 0.78 to 10.08% relative standard deviation. ('''[[Journal:Leaner and greener analysis of cannabinoids|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 29–August 4:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Brusniak BMCBioinformatics2019 20.png|240px]]</div> | |||
'''"[[Journal:Laboratory information management software for engineered mini-protein therapeutic workflow|Laboratory information management software for engineered mini-protein therapeutic workflow]]"''' | |||
Protein-based therapeutics are one of the fastest growing classes of novel medical interventions in areas such as cancer, infectious disease, and inflammation. Protein engineering plays an important role in the optimization of desired therapeutic properties such as reducing immunogenicity, increasing stability for storage, increasing target specificity, etc. One category of protein therapeutics is nature-inspired bioengineered cystine-dense peptides (CDPs) for various biological targets. These engineered proteins are often further modified by synthetic chemistry. For example, candidate mini-proteins can be conjugated into active small molecule drugs. We refer to modified mini-proteins as "optides" (optimized peptides). To efficiently serve the multidisciplinary lab scientists with varied therapeutic portfolio research goals in a non-commercial setting, a cost-effective, extendable [[laboratory information management system]] (LIMS) is/was needed. ('''[[Journal:Laboratory information management software for engineered mini-protein therapeutic workflow|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 22–28:</h2> | |||
'''"[[Journal:Defending our public biological databases as a global critical infrastructure|Defending our public biological databases as a global critical infrastructure]]"''' | |||
Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) [[information]]. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open [[Genomics|genomic]] and [[Proteomics|proteomic]] repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from [[cybersecurity]]. ('''[[Journal:Defending our public biological databases as a global critical infrastructure|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 15–21:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 Ebnehoseini OAccessMacJofMedSci2019 7-9.png|240px]]</div> | <div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 Ebnehoseini OAccessMacJofMedSci2019 7-9.png|240px]]</div> | ||
'''"[[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Determining the hospital information system (HIS) success rate: Development of a new instrument and case study]]"''' | '''"[[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Determining the hospital information system (HIS) success rate: Development of a new instrument and case study]]"''' |
Revision as of 15:47, 11 November 2019
If you're looking for other "Article of the Week" archives: 2014 - 2015 - 2016 - 2017 - 2018 - 2019 |
Featured article of the week archive - 2019
Welcome to the LIMSwiki 2019 archive for the Featured Article of the Week.
Featured article of the week: November 4–10:"CyberMaster: An expert system to guide the development of cybersecurity curricula" The growing number of reported cyberattacks poses a difficult challenge to individuals, governments, and organizations. Adequate protection of information systems urgently requires a cybersecurity-educated workforce trained using a curriculum that covers the essential skills required for different cybersecurity work roles. The goal of the CyberMaster expert system is to assist inexperienced instructors with cybersecurity course design. It is an intelligent system that uses visual feedback to guide the user through the design process. Initial test executions show the promise of such a system in addressing the enormous shortage of cybersecurity experts currently available for designing courses and training programs. (Full article...)
|