scholarly journals The ADRIREEF database: a comprehensive collection of natural/artificial reefs and wrecks in the Adriatic Sea

2021 ◽  
Vol 13 (5) ◽  
pp. 1905-1923
Author(s):  
Annalisa Minelli ◽  
Carmen Ferrà ◽  
Alessandra Spagnolo ◽  
Martina Scanu ◽  
Anna Nora Tassetti ◽  
...  

Abstract. The paper presents a database of information on wrecks, natural and artificial reefs located in the Adriatic Sea, collected within the framework of the Interreg Italy–Croatia project ADRIREEF – Innovative exploitation of Adriatic Reefs in order to strengthen Blue Economy. The data collection lasted more than 1 year and included three surveys and a wide literature review. After being collected, data were harmonized and, where possible, made machine-readable. Moreover, data were widely metadated, published in a WebGIS (https://adrireef.github.io/sandbox3/, last access: 3 May 2021), and shared as open data in EMODnet (European Marine Observation and Data Network) Data Ingestion Portal through the SEANOE repository (Ferrà et al., 2020; https://doi.org/10.17882/74880). The database is composed of 285 three-dimensional records, each one described by 51 attributes. Parameters are clustered in four main groups: identification, reef description, site description, and management/exploitation information. Available literature (scientific and/or grey) was also included in the database and linked to the corresponding site.

2020 ◽  
Author(s):  
Annalisa Minelli ◽  
Carmen Ferrà ◽  
Alessandra Spagnolo ◽  
Martina Scanu ◽  
Anna Nora Tassetti ◽  
...  

Abstract. The paper presents a database of information on wrecks, natural and artificial reefs located in the Adriatic Sea, collected within the framework of the Interreg Italy-Croatia project ADRIREEF – Innovative exploitation of Adriatic Reefs in order to strengthen Blue Economy. The data collection lasted more than one year and comprehended three surveys and a wide literature review. After being collected, data were harmonized and, where possible, made machine-readable. Moreover, data were widely metadated, published in a webGIS (https://adrireef.github.io/sandbox3/) and shared as Open Data in EMODnet (European Marine Observation Data network) through the SEANOE repository (Ferrà et al., 2020; http://doi.org/10.17882/74880). The database is composed of 285 three-dimensional records, each one described by 51 attributes. Parameters are clustered in four main groups: identification, reef and site description, management/exploitation information. Available literature (scientific and/or grey) was also included in the database and linked to the corresponding site.


2019 ◽  
Vol 47 (4) ◽  
pp. 1580-1591 ◽  
Author(s):  
Wei Cen ◽  
Ralph Hoppe ◽  
Aiwu Sun ◽  
Hongyan Ding ◽  
Ning Gu

Objectives The principal diagnostic methods of traditional Chinese medicine (TCM) are inspection, auscultation and olfaction, inquiry, and pulse-taking. Treatment by syndrome differentiation is likely to be subjective. This study was designed to provide a basic theory for TCM diagnosis and establish an objective means of evaluating the correctness of syndrome differentiation. Methods We herein provide the basic theory of TCM syndrome computer modeling based on a noninvasive cardiac electrophysiology imaging technique. Noninvasive cardiac electrophysiology imaging records the heart’s electrical activity from hundreds of electrodes on the patient’s torso surface and therefore provides much more information than 12-lead electrocardiography. Through mathematical reconstruction algorithm calculations, the reconstructed heart model is a machine-readable description of the underlying mathematical physics model that reveals the detailed three-dimensional (3D) electrophysiological activity of the heart. Results From part of the simulation results, the imaged 3D cardiac electrical source provides dynamic information regarding the heart’s electrical activity at any given location within the 3D myocardium. Conclusions This noninvasive cardiac electrophysiology imaging method is suitable for translating TCM syndromes into a computable format of the underlying mathematical physics model to offer TCM diagnosis evidence-based standards for ensuring correct evaluation and rigorous, scientific data for demonstrating its efficacy.


2021 ◽  
Vol 13 (2) ◽  
pp. 563
Author(s):  
Bing Ran ◽  
Scott Weller

Despite the growing utility and prevalence of social entrepreneurship, an accepted definition remains elusive and infeasible. Yet, it is imperative that the principles guiding social entrepreneurship are identified so that common ground is established to facilitate future research. On the basis of a systematic literature review, this conceptual paper proposes a theoretical framework outlining social entrepreneurship as a three-dimensional framework as a function of continua of “social” and “business” logics, “beneficial” and “detrimental” social change logics, and “innovation” and “mundane” logics. The framework accommodates the fuzziness and ambiguity associated with social entrepreneurship whilst remaining a workable, identifiable construct. By accounting for the shifting logics practiced by social entrepreneurship that both influence and are influenced by the organizational environment, this framework provides an exit strategy for the definitional elusiveness of social entrepreneurship. The resultant structures and functions of social entrepreneurship are shaped by these constraints as reflected by the fluidity and flexibility endorsed by the framework. Four avenues for future research regarding social entrepreneurship are recommended on the basis of the framework proposed in this article.


BMC Surgery ◽  
2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Haiyang Yang ◽  
Gang Bai ◽  
Yongli Zhang ◽  
Guolong Chen ◽  
Lei Duan ◽  
...  

Abstract Background There are few articles about the surgical techniques of thalamic glioma and the lesions in the basal ganglia area. According to three existing cases and the literature review (Twelve articles were summarized which mainly described the surgical techniques), we discuss the surgical characteristics of lesions of the thalamus and basal ganglia area and summarize the relevant surgical skills. Case presentation Of the three cases, two were thalamic gliomas and one was brain abscess in basal ganglia. According to the three-dimensional concept of the “Four Walls, Two Poles”, lesions of the thalamus and basal ganglia were surgically removed, and the operative effect was analysed by relevant surgical techniques. Surgical resection of the lesions of the thalamus and basal ganglia area according to the three-dimensional concept of the “Four Walls, Two Poles” has achieved good surgical results. Relevant surgical techniques, such as the use of retractors, the use of aspirators, the choice of surgical approaches, and the haemostasis strategy, also played an important role in the operation process. Conclusions In the presented three cases the three-dimensional concept of the “Four Walls, Two Poles” allowed for safe surgical resection of lesions of the thalamus and basal ganglia.


2012 ◽  
Vol 31 (2) ◽  
pp. 65 ◽  
Author(s):  
Eric Pirard

In recent years, impressive progress has been made in digital imaging and in particular in three dimensional visualisation and analysis of objects. This paper reviews the most recent literature on three dimensional imaging with a special attention to particulate systems analysis. After an introduction recalling some important concepts in spatial sampling and digital imaging, the paper reviews a series of techniques with a clear distinction between the surfometric and volumetric principles. The literature review is as broad as possible covering materials science as well as biology while keeping an eye on emerging technologies in optics and physics. The paper should be of interest to any scientist trying to picture particles in 3D with the best possible resolution for accurate size and shape estimation. Though techniques are adequate for nanoscopic and microscopic particles, no special size limit has been considered while compiling the review.


2021 ◽  
Author(s):  
Miriam Lohrmann

Customer cognitive legitimacy is an important factor in a new business venture’s survival. Based on an extensive literature review of customer cognitive legitimacy, this book examines the consistent conceptualisation of the concept and its dimensional structure. This consistent conceptualisation facilitates the development of the reliable and valid three-dimensional customer cognitive legitimacy scale in 10 studies. The scale is based on potential customers’ interest in acquiring knowledge about a product and the company responsible for it, their perception of the company’s and the product’s future, and their perception of how competent the company’s managers are.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Devendra Dilip Potnis ◽  
Joseph Winberry

PurposeThis literature review aims to identify conscious, intentional, repetitive and transferrable information-related decisions and activities (i.e. information practices) for individuals to alleviate their information vulnerability. Information vulnerability refers to the lack of access to accurate, affordable, complete, relevant and timely information or the inability to use such information, which can place individuals, communities or society at disadvantage or hurt them.Design/methodology/approachConceptual literature review.FindingsThis review presents seven conscious, intentional, repetitive and transferrable information practices to alleviate information vulnerability.Practical implicationsDue to the transferability potential of the seven information practices, diverse populations in varied contexts could refer to, adapt and benefit from appropriate combinations of information practices and their manifestations. The framework can be used by individuals for alleviating information vulnerability. Thus, this paper responds to the call for conducting action-driven research in information science for addressing real-world problems. Information professionals can help individuals select and implement appropriate combinations of seven information practices for alleviating information vulnerability.Originality/valueWe propose (1) a parsimonious, episodic framework for alleviating information vulnerability, which depicts the inter-relationship among the seven information practices and (2) a three-dimensional plot with information access, use and value as three axes to map the manifestation and outcome of alleviating information vulnerability.


Sign in / Sign up

Export Citation Format

Share Document