In structure-based drug design, scoring functions are often employed to evaluate protein–ligand interactions. A variety of scoring functions have been developed so far, and thus, some objective ...benchmarks are desired for assessing their strength and weakness. The comparative assessment of scoring functions (CASF) benchmark developed by us provides an answer to this demand. CASF is designed as a “scoring benchmark”, where the scoring process is decoupled from the docking process to depict the performance of scoring function more precisely. Here, we describe the latest update of this benchmark, i.e., CASF-2016. Each scoring function is still evaluated by four metrics, including “scoring power”, “ranking power”, “docking power”, and “screening power”. Nevertheless, the evaluation methods have been improved considerably in several aspects. A new test set is compiled, which consists of 285 protein–ligand complexes with high-quality crystal structures and reliable binding constants. A panel of 25 scoring functions are tested on CASF-2016 as a demonstration. Our results reveal that the performance of current scoring functions is more promising in terms of docking power than scoring, ranking, and screening power. Scoring power is somewhat correlated with ranking power, so are docking power and screening power. The results obtained on CASF-2016 may provide valuable guidance for the end users to make smart choices among available scoring functions. Moreover, CASF is created as an open-access benchmark so that other researchers can utilize it to test a wider range of scoring functions. The complete CASF-2016 benchmark will be released on the PDBbind-CN web server (http://www.pdbbind-cn.org/casf.asp/) once this article is published.
This paper explores institutional changes in two water users' associations (WUAs) in the Venezuelan Andes. The methodology is based on ethnographic work. The results show that both WUAs have modified ...the rule systems in irrigation management to respond to economic, institutional and environmental changes. They have implemented a better organization of water sharing, adopted more efficient irrigation technologies, restored infrastructure and preserved high-altitude wetlands. The comparative approach adopted allowed us to show not only the similar factors that promoted institutional change, such as social capital, but also the differences related to the characteristics of the resource.
Evidence has shown that the trend of increasing obesity rates has continued in the last decade. Mobile phone applications, benefiting from their ubiquity, have been increasingly used to address this ...issue. In order to increase the applications’ acceptance and success, a design and development process that focuses on users, such as user-centred design, is necessary. This paper reviews reported studies that concern the design and development of mobile phone applications to prevent obesity, and analyses them from a user-centred design perspective. Based on the review results, strengths and weaknesses of the existing studies were identified. Identified strengths included: evidence of the inclusion of multidisciplinary skills and perspectives; user involvement in studies; and the adoption of iterative design practices. Weaknesses included the lack of specificity in the selection of end-users and inconsistent evaluation protocols. The review was concluded by outlining issues and research areas that need to be addressed in the future, including: greater understanding of the effectiveness of sharing data between peers, privacy, and guidelines for designing for behavioural change through mobile phone applications.
Spatial metadata profiles have been designed and evolved by data custodians to manage, share, discover, and use spatial data. The end-users of spatial data often do not have much input in designing ...the profiles. The spatial data infrastructure literature reveals that they question the usability of spatial metadata. This paper analyzes the usability of metadata profiles by engaging end-users and clarifying their requirements in response to this problem. Over 60 users from 18 countries were engaged using an online survey based on a purposive sampling method. The results show that the most widely used metadata standard, ISO 19115, provides metadata elements to accommodate most user requirements for searches. However, an extension to the standard is necessary to assist users in discovery and selection. Two new metadata elements are proposed as part of the extension. The extension also involves changing the obligation type of existing elements to improve data discovery.
Pedestrians, cyclists and powered two-wheeler riders are considered vulnerable road users, as they are prone to a high risk of injury in the event of vehicular collision. This paper sought to ...elucidate the road safety performance and attitudes of vulnerable road users in 32 countries. In addition, comparisons between countries and demographic characteristics have been conducted, and recommendations that could enhance vulnerable road users' safety have been provided. For the study, data from the second edition of the ESRA survey (E-Survey on Road Users' Attitudes – ESRA2) conducted in 2018 were utilized. The results indicate that crossing the road at places other than nearby pedestrian crossings, reading a text message or checking social media while walking on the streets, cycling and riding without wearing a helmet, and speeding on powered two-wheelers outside built-up areas but not on motorways/freeways were the most frequently reported self-declared behaviours in the 32 countries. Finally, some solutions on preventing road crashes and increasing vulnerable road users' safety such as infrastructure interventions, use of protective equipment, and training and educational campaigns are discussed.
•Vulnerable road users are prone to a high risk of injury in any vehicular collision•High rates of unsafe behaviours were reported by vulnerable road users•Clear need for road safety measures that would enhance the safety of vulnerable road users•ESRA survey is a valuable source of information and provides unique data on VRUs' performance
Internet of Things (IoT) is considered as an ecosystem that contains smart objects equipped with sensors, networking and processing technologies integrating and working together to provide an ...environment in which smart services are taken to the end users. The IoT is leading numerous benefits into the human life through the environment wherein smart services are provided to utilize every activity anywhere and anytime. All these facilities and services are conveyed through the diverse applications which are performed in the IoT environment. The most important utilities that are achieved by the IoT applications are monitoring and consequently immediate decision making for efficient management. In this paper, we intend to survey in divers IoT application domains to comprehend the different approaches in IoT applications which have been recently presented based on the Systematic Literature Review (SLR) method. The aim of this paper is to categorize analytically and statistically, and analyze the current research techniques on IoT applications approaches published from 2011 to 2018. A technical taxonomy is presented for the IoT applications approaches according to the content of current studies that are selected with SLR process in this study including health care, environmental monitoring, smart city, commercial, industrial and general aspects in IoT applications. IoT applications are compared with each other according to some technical features such as Quality of Service (QoS), proposed case study and evaluation environments. The achievements and disadvantages of each study is discussed as well as presenting some hints for addressing their weaknesses and highlighting the future research challenges and open issues in IoT applications.
In a cognitive radio network (CRN), the primary users (PUs) do not operate their spectra, full time. Thus, they can sell them to the secondary users (SUs), for a second use, during the free time ...slots. In this article, we assume that the market is perfect, monopolized by a single PU, and all players are rational. After formulating the PU’s profit, we established a necessary and sufficient condition that guarantees the introduction of the PU into the market. In addition, the expressions of the SUs’ profits, showed us that in non-cooperative form, some ones got zero profit, even after maximizing their profits. Therefore, we have considered to study the effect of cooperation on the profits of this category of SUs. By following this step, we established a cooperation strategy, to avoid zero profits for all SUs. In order to analyze the impact of this cooperation on the PU, we have expressed the profits of the PU in the cooperative and non-cooperative forms; as result, we found that the cooperation between SUs brought better than the non-cooperative form.
Mobile edge computing is a new computing paradigm, which pushes cloud computing capabilities away from the centralized cloud to the network edge. However, with the sinking of computing capabilities, ...the new challenge incurred by user mobility arises: since end users typically move erratically, the services should be dynamically migrated among multiple edges to maintain the service performance, i.e., user-perceived latency. Tackling this problem is non-trivial since frequent service migration would greatly increase the operational cost. To address this challenge in terms of the performance-cost tradeoff, in this paper, we study the mobile edge service performance optimization problem under long-term cost budget constraint. To address user mobility which is typically unpredictable, we apply Lyapunov optimization to decompose the long-term optimization problem into a series of real-time optimization problems which do not require a priori knowledge such as user mobility. As the decomposed problem is NP-hard, we first design an approximation algorithm based on Markov approximation to seek a near-optimal solution. To make our solution scalable and amenable to future fifth-generation application scenario with large-scale user devices, we further propose a distributed approximation scheme with greatly reduced time complexity, based on the technique of the best response update. Rigorous theoretical analysis and extensive evaluations demonstrate the efficacy of the proposed centralized and distributed schemes.