Science topic

Authenticity - Science topic

Explore the latest questions and answers in Authenticity, and find Authenticity experts.
Questions related to Authenticity
  • asked a question related to Authenticity
Question
5 answers
I would be grateful to you if you can tell me what you know authentically about it. Please don't mince words.
Relevant answer
I'm very sorry Dear friend Rad Maythil , but now RG won't let me answer to your message! It tells me the following: "You can only send messages to people who follow you on ResearchGate". I have been following you on ResearchGate for a long time now. My best wishes
  • asked a question related to Authenticity
Question
1 answer
This is a common and demanding question asked from the young resaechers on daily basis. They want to conduct the research in an effective and authentic manner. The goal is to conduct a valuable research that can contribute to the well-being of humanity.
I want all the professional researchers here to contribute to this and share your precious insights on this topic.
Relevant answer
Answer
Firstly I will put my part to this by putting forward some of the tips in this scenario.
  • asked a question related to Authenticity
Question
2 answers
  • Handling rejections from schools for data collection (Despite permission from concerned departments)
  • Difficulty in choosing the school representatives, who would give away authentic information regarding schools per se- this was a huge task and needed repeated visits per school
  • Read aloud technique for the data collectors was a little draining experiences ,as the exercise was to be repeated in each school to ensure the authencity of the information
Relevant answer
Answer
  • Lack of Stakeholder Collaboration: Ensuring cooperation among various stakeholders (e.g., school administrations, health departments, and policy makers) often proves challenging. Misalignment in goals and lack of clear roles between sectors can hinder access to necessary data and disrupt the consistency needed for compliance studies.
  • Data Collection Barriers within Schools: Despite obtaining permissions, schools may still restrict data access due to privacy concerns or disruptions to academic schedules. This hesitancy from schools can limit the scope of data collected, impacting the study's comprehensiveness.
  • Challenges with Data Validity and Reliability: Maintaining the accuracy and reliability of data is a significant challenge, as data collection in school environments can be affected by biases, such as respondent bias from students or faculty, and the attrition of participants over time. Ensuring statistical power in such dynamic environments remains an ongoing issue
  • asked a question related to Authenticity
Question
4 answers
Our new article explores how generative AI, when ethically implemented, can support educational integrity. By aligning AI with educational theories like constructivism and Self-Determination Theory (SDT), we argue that AI can promote personalized, meaningful learning and foster student autonomy and intrinsic motivation. Key ethical considerations are highlighted, including the need for transparency, respect for privacy, and fairness to ensure AI empowers students while preserving trust and data integrity. These principles create a foundation for using AI in ways that support, rather than undermine, academic honesty. For educators, this framework offers insights into reshaping assessment and learning practices responsibly in the AI era.
We invite you to read our article to explore these points in depth and learn how AI might become a valuable tool in fostering integrity-driven education.
Key Points and Discussion Prompts:
  1. Interactive Simulations and Constructivism: AI tools can align with constructivist learning by providing interactive simulations, such as timelines that allow students to explore historical events. Prompt: How might interactive AI simulations enhance students' critical engagement with complex topics, such as history or science?
  2. Self-Determination Theory and Autonomy: The article suggests that AI can boost intrinsic motivation by enhancing students' autonomy in learning. Prompt: How can educators ensure that AI tools genuinely increase students’ autonomy without making learning too self-directed or unstructured?
  3. Authentic Assessments: AI can support more authentic assessments beyond traditional testing, such as project-based assignments and real-world problem-solving tasks. Prompt: What challenges might educators face in implementing AI-based authentic assessments, and how could these be addressed?
  4. Transparency and Trust: Ethical AI use in classrooms requires transparency, especially in how AI data is managed. Prompt: What would transparency look like in AI-powered classrooms, and how can it build trust among students and educators?
  5. Adaptive Feedback for Skill-Building: AI provides adaptive feedback that can build competence in skills like writing by offering personalized guidance on grammar and style. Prompt: How could adaptive feedback through AI be integrated into traditional teaching to support growth in skills like writing and critical analysis?
Below are the links to the paper on ResearchGate and Frontiers, respectively:
OR
Relevant answer
Answer
Myles Joshua Toledo Tan Thanks for sharing this article! It’s refreshing to see generative AI presented as a way to support honesty in education instead of hurting it. Connecting AI to ideas like constructive learning and self-motivation makes a lot of sense—it shows how AI could help students learn in a meaningful way and feel more independent.
The idea of using AI for interactive simulations in subjects like history and science is really exciting. Imagine students being able to explore events or science topics in an active, hands-on way. It could make complex topics easier to understand and more interesting. I’d love to know more about how these tools could be set up to keep students engaged and still keep the benefits of traditional learning.
The focus on transparency and trust is also important. For AI to be widely accepted in classrooms, both students and teachers need to trust it—knowing their data is safe and understanding the role AI plays in learning. I’m curious to see how best to explain AI’s role to students to build that trust.
Finally, the idea of AI providing personalized feedback is so relevant for skills like writing and analysis. AI could give students helpful, tailored feedback while teachers still guide their learning, creating a nice balance. I’m looking forward to reading more about how these ideas could create a positive, responsible use of AI in education.
  • asked a question related to Authenticity
Question
1 answer
Ensure to do these :
Wrap up the interview and write the transcripts on the same day of interview (let your memory help you here) , you can keep responses authentic by focusing on minimal editing for clarity only- do not go for detailed explanations of the interview, focus on having the abridge versions for discussion, and by conducting validation checks with stakeholders or other fellow researchers to confirm that cleaned data reflects their intended meaning (Patton, 2002).
Relevant answer
To maintain the original meaning in stakeholder interviews while cleaning data, a researcher should first ensure that the core themes, language, and context of participants’ responses are preserved. This involves organizing and standardizing data without altering key phrases or nuances that reflect stakeholders' authentic perspectives. Techniques like verbatim transcription, careful note-taking, and coding can help capture essential points while distinguishing between meaningful insights and filler or redundant language. By preserving colloquialisms or specific terminology used by stakeholders, researchers maintain the unique perspective of each interviewee, which is critical for understanding nuanced insights.
Additionally, the researcher should use iterative checking methods, such as member-checking or peer debriefing, to validate interpretations with stakeholders or colleagues. This process helps confirm that the cleaned data still represents the interviewees' intentions. During coding and categorization, researchers should be cautious not to over-simplify or force data into rigid themes that might distort original meanings. Proper documentation of the data-cleaning process and transparent reporting of any modifications made to the data are also essential for preserving the authenticity and accuracy of stakeholder inputs in the final analysis.
I hope this helps.
  • asked a question related to Authenticity
Question
4 answers
"How can digital marketing strategies be leveraged to promote and preserve cultural heritage sites, artifacts, and traditions while ensuring authenticity, respect for local communities, and sustainable tourism practices?"
This question encompasses several critical considerations in the digital marketing of cultural heritage, including:
1. Authentic Storytelling and Content Creation: How can digital marketing efforts authentically convey the unique history, significance, and cultural value of heritage sites and artifacts through compelling storytelling, multimedia content, and immersive experiences?
2. Community Engagement and Empowerment: How can digital marketing initiatives involve and empower local communities, indigenous groups, and cultural stakeholders in the storytelling and promotion of their heritage, ensuring that their voices and perspectives are respectfully represented?
3. Sustainable Tourism Promotion: What digital marketing strategies can be employed to promote responsible and sustainable tourism practices, encouraging visitors to engage with cultural heritage in a respectful and environmentally conscious manner?
4. Accessibility and Inclusivity: How can digital marketing initiatives ensure that cultural heritage content and experiences are accessible to diverse audiences, including people with disabilities, international visitors, and individuals from different cultural backgrounds?
5. Preservation and Conservation Advocacy: In what ways can digital marketing be used to raise awareness about the importance of preserving and conserving cultural heritage sites, artifacts, and traditions, and mobilize support for conservation efforts?
6. Ethical Considerations in Digital Representation: How can digital marketing of cultural heritage navigate ethical considerations related to the representation, interpretation, and commercialization of heritage, ensuring that it is presented in a respectful and culturally sensitive manner?
7. Digital Technologies for Heritage Interpretation: What role can emerging digital technologies, such as virtual reality, augmented reality, and interactive multimedia, play in enhancing the interpretation and presentation of cultural heritage, making it more engaging and accessible to a global audience?
8. Measuring Impact and Effectiveness: How can the impact of digital marketing efforts in promoting cultural heritage be measured, and what key performance indicators can be used to assess the success of these initiatives in terms of visitor engagement, conservation outcomes, and community benefit?
Addressing these questions is essential for stakeholders involved in the digital marketing of cultural heritage, including heritage organizations, museums, cultural institutions, tourism authorities, and digital marketing professionals, to ensure that the promotion and preservation of cultural heritage are approached with sensitivity, integrity, and a focus on long-term sustainability.
Relevant answer
Answer
I do not specialise in marketing. However, my field of interest is heritage preservation, interpretation, and promotion… So here are my answers from my point of view.
1. Authentic Storytelling and Content Creation:
The situation must be evaluated individually at every site since every site is different. However, there is an option to have a general format for presentation, if the institution is large enough. For example, the Czech National Heritage Institute adopted standard websites for every site. The general look of the website is the same for every castle, chateau etc. (more than 100 sites), so the visitors can easily orient on the website of every heritage site. At the same time, the website is modular, so every object can modify the website based on the needs of the site.
At the same time, I believe that digital marketing should not offer too much, because it can leave an impression: „I saw everything, so why should I go there personally?“ So compelling storytelling, multimedia content, and immersive experiences should offer just enough, to promote personal visits (which is irreplaceable). Online exhibitions, presentations of movies, TV documents, etc. should be kept at bay in most scenarios (I can only see benefits in special cases of exceptional value, that should be presented widely, or to promote accessibility and inclusivity).
2. Community Engagement and Empowerment:
Community engagement is always crucial to the protection of any site. Without the support of the local communities, the preservation of cultural heritage is almost impossible and most certainly loses a lot of its meaning. Digital marketing should aim to widespread presentation of the site and its needs. With more local support, more political and/or financial power will arrive. The marketing should also present not only the site, but also the current situation and processes behind protecting, restoring, or securing the site. The general public is in many situations more interested in the current processes than in the site itself.
3. Sustainable Tourism Promotion:
One of the keys to sustainable tourism is to achieve the spread of the tourist to more sites in the area. In many situations, there are one or two famous sites that tourists visit, and there are tens of other sites in close proximity, that are almost empty. This situation leads to overcrowding of one site, which then leads to its deterioration by wear and tear. Digital marketing aimed at sustainability should be based on reciprocal altruism of sites in the area to spread tourists to more sites thus minimising wear and tear.
4. Accessibility and Inclusivity:
Many sites are inaccessible, and making them more accessible would mean a large intervention to the site. These sites should be presented by digital media, to promote accessibility and inclusivity. Digital media should also be used for individuals from different cultural backgrounds for a better understanding of the site. This can be done by audio and video guides, and interactive boards in different languages. Digital media can also provide general information about the background of the site, which cannot be presented by other media because of their extensiveness.
5. Preservation and Conservation Advocacy:
The points from question number two apply. Furthermore, augmented reality can present a historical image of the site. At the same time, it can show the impact of the destruction or alteration of the site or its surroundings. By confronting the public with the consequences of the destruction of the site, the public can be convinced about the importance of the site.
6. Ethical Considerations in Digital Representation:
I believe I am not competent enough to speak about ethics in digital marketing. However, I believe that the general ethics of marketing and journalism apply. Furthermore, one should present only verified and historically true information. One should publish possible realities only if there is a very good reason for presenting the theme and only with explicit indication, that it is just a possible interpretation of history (for example historical models of castles that are now in ruins).
7. Digital Technologies for Heritage Interpretation:
These „better realities“ can be used to present non-existing sites in situ (on a phone screen). They can be used to see the historical development of the site. They can be used to „take in hand “ objects (for example archaeological findings). They can be used to walk through medieval streets full of authentic people. Etc. I believe that in this day and age, enchanted realities can be used without boundaries (well… the boundaries are our imagination) as long as they represent site or history based on historical evidence.
8. Measuring Impact and Effectiveness:
This I cannot answer. To some extent, we can see the impact on the number of visitors, but this number is very hard to evaluate. In my personal experience, the impact of digital marketing depends to some extent on the site itself. Local sites are more likely to attract local visitors, regional sites regional visitors etc. To some extend, this also applies to the engagement of communities, conservation outcomes etc.
  • asked a question related to Authenticity
Question
2 answers
in terms of local and foreign brands example in foods like rice how do they see it
Relevant answer
Answer
Students often perceive brand authenticity through several key factors such as Transparency, Consistency, Social Responsibility,Genuine Engagement,Peer Influence etc. Overall, brand authenticity is perceived as a blend of ethical practices, meaningful engagement, and genuine storytelling that resonates with students' values and experiences.
  • asked a question related to Authenticity
Question
3 answers
My academic pursuits align with my broader goal of connecting traditional cultural expressions with modern pedagogical methods, ensuring that future generations can experience and appreciate authentic cultural heritage. This is particularly important in a time when cultural traditions are increasingly vulnerable to the pressures of modernity. I am committed to finding solutions that honor both the preservation of heritage and the evolving needs of today’s education systems.
Relevant answer
Hi, Camila! How are you? I think there are impacts, but we also need to be careful with the notion of authenticity, since all cultural assets of an intangible nature change over time. I would cite as an example the carnival in the city of Olinda, which takes place a week before the one intended for tourists for the local population.
  • asked a question related to Authenticity
Question
4 answers
MOLECULAR MARKER
Relevant answer
Answer
The use of SSR in the short and long arm of the chromosome
  • asked a question related to Authenticity
Question
2 answers
molecular method
Relevant answer
Answer
Thank you for your suggestion, dear researcher
I had studied all these methods. My goal was to choose the best practical and reliable method to identify closely related hybrids.
  • asked a question related to Authenticity
Question
2 answers
Despite the fact that AI holds a mass amount of opportunities to improve learning and change the old school education, its integration in modern learning and careful regulation to reduce the risks of academic dishonesty ensure ethical application in promoting authentic student growth
Relevant answer
Answer
This is a pertinent question in the age of AI. The use of AI in academia is fraught with challenges and has to be dealt with proper approach. Standardization regarding the use and also some sort of regulatory framework would make a lot of sense.
  • asked a question related to Authenticity
Question
2 answers
I want to use ReverseDock for off-target analysis in molecular docking. How authenticate and reliable are the results of ReverseDock and can I put those results in my research paper ?
Relevant answer
Answer
ReverseDock is a computational tool designed for blind docking of ligands to multiple protein targets, based on AutoDock Vina. It ranks and predicts protein-ligand interactions, which makes it valuable for tasks like drug discovery and target identification. Its predictions are reasonably accurate, with successful identification of binding sites in 75% of cases and top-three ranking of complexes in 50% of cases in validation tests. However, like other docking tools, ReverseDock's results depend on the quality of input data and the conformational space sampled. It is recommended to complement its predictions with experimental validation, such as binding assays or structural studies​
  • asked a question related to Authenticity
Question
4 answers
Corporate Social Responsibility (CSR) has emerged as a critical factor in shaping brand image perception among various stakeholder groups. Research indicates that CSR initiatives can significantly enhance a company's reputation and brand image when implemented authentically and strategically. For instance, a study by Martínez et al. (2014) found a strong positive correlation between consumers' perception of CSR and both functional and affective aspects of brand image[1]. This suggests that companies engaging in genuine CSR efforts can effectively improve their overall brand perception among customers.
The impact of CSR extends beyond customers to other key stakeholder groups, including employees, shareholders, and broader community stakeholders. Employees, in particular, play a crucial role in this dynamic. When companies involve employees in CSR activities and communicate their efforts effectively, it can lead to increased job satisfaction, loyalty, and pride in the organization. This, in turn, can transform employees into brand ambassadors, further enhancing the company's image externally[1]. For shareholders, CSR initiatives can signal long-term value creation and risk mitigation, potentially improving their perception of the brand and its future prospects.
However, it is essential to note that the positive influence of CSR on brand image is contingent upon avoiding greenwashing or superficial green labeling. Authenticity and transparency in CSR efforts are crucial for building trust and credibility among all stakeholder groups. As Bianchi et al. (2019) highlight, a company's reputation and international presence play a significant role in shaping consumer perceptions and attitudes toward the brand[1]. Therefore, to maximize the positive impact of CSR on brand image, companies must ensure their initiatives are genuine, aligned with their core business values, and effectively communicated to all stakeholder groups. This approach can lead to a more robust and positive brand image across customers, employees, shareholders, and the broader community.
Relevant answer
Answer
Yes, it can, like it can for a range of primary and tertiary stakeholders. To a certain extent, it depends on how involving and consultative management are with their stakeholders as to the level of brand strengthening and authentic value it creates for the brand .
  • asked a question related to Authenticity
Question
3 answers
Is anyone familiar with 4th International Conference on Applied Science & Engineering or any of their previous conferences? I've been invited as a speaker, can anyone speak to the authenticity of this invitation?
Relevant answer
Answer
Hi all. I just got invited to the 5th International Conference on Applied Science & Engineering. From a quick search, it looks as a scam. They even ask invited plenary speakers to pay almost 700Euros just to attend the "conference"!
  • asked a question related to Authenticity
Question
1 answer
I want to ensure it is not a hijacked journal. While the journal appears professional and is indexed in Scopus, the prevalence of hijacked journals makes me cautious.
Could anyone confirm whether the "Journal of Applied Bioanalysis" is legitimate or provide any insights into its authenticity? Any experiences with submissions or knowledge of its current status would be greatly appreciated.
Relevant answer
Answer
There is indeed something going on here when it comes to this journal “Journal of Applied Bioanalysis”. It used to be published by “Betasciencepress Publishing”
-ISSN 2405-710X is just recently linked to a new ‘owner’ https://portal.issn.org/resource/ISSN/2405-710X(compare this with another journal they (used to?) publish https://portal.issn.org/resource/ISSN/2589-1677
There is this website I suspect to be fake/hijacked https:/journalofappliedbioanalysis.com/index.php/jabbecause:
-Like in most of these cases the contact info is basically missing https://journalofappliedbioanalysis.com/index.php/jab/about/contact
-Editorial board looks suspicious https://journalofappliedbioanalysis.com/index.php/jab/about/editorialTeam for example the info about Rob J. Vreeken, PhD is outdated and I am pretty sure he is not aware he is mentionedhere. Furthermore they no longer seems to be linked to the previous publisher Betascience…
-The about info https://journalofappliedbioanalysis.com/index.php/jab/about does not mention a change in ownership and for example the DOAJ membership claim is fake
-Compare here https://journalofappliedbioanalysis.com/index.php/jab/issue/view/16 2023 for example and 2024 and you see the mentioning of the (former) publisher is now gone
Looking at the Scopus content coverage and you see they received hardly any submissions. I think the journal is hijacked because the former publisher is no longer active (broke? Or lacking the manpower willing to continue with something that does not seem to be viable).
Personally I would not trust this one.
Best regards.
PS. Another journal seems no longer active due to insufficient submissions “Reviews in Separation Sciences” https://betasciencepress-publishing.com/journals/reviews-in-separation-sciences/ another sign that the original publisher is no longer active.
  • asked a question related to Authenticity
Question
5 answers
Green publisher
Relevant answer
Answer
Thanks for this comment I really appreciate.
  • asked a question related to Authenticity
Question
40 answers
Interesting comment, posted on a recent research document.
So I've laid out a few steps of authentication, based off of my mathematical, and physics-based education, and consulting with various other associates.
This is something being studied for peer review and an upcoming conference. The challenge is this:
Lots of people in research gate have their own and unique theories. There's lots of technical discussion about the technicalities which may invalidate these theories, but in reality, invalidating or authenticating theories such as this is a highly rigorous process more akin to hard mathematics than it is to anything which can be put verbally.
Below is a comment for context and brevity. It was posted under a research gate paper.
After this context, a few standards for authentication will be laid out, and I would challenge anybody with their own theories to attempt to meet these standards.
Context:
"would like to extend congratulations to John, as anyone performing these calculations will also see as I did, that this theory is easily renormalizable at one Feynman loop, by my current calculations.
Anybody else who can verify this as well. It's either exactly at one loop, or around there, indicating high stability in versatile QM/GR scenarios and means it handles infinities that other popular theories such as String Theory Struggle with exceptionally well, among other implications.
It also means the applications of the actual elements of the framework structure are easily adaptable in many scenarios traditionally difficult, I.E, Early birth of the universe, large rotating black holes, ECT
This evidencing, that is part of a small group of theories, such as qed, string theory, loop Quantum gravity, and many others recently emerging, which have indicated high authentication rates for rigorous academic standards of how this would historically be addressed.
I'm investigating also, another colleague who seems to have a very robust framework indicating a similar confluence of being normalizablity, with just one Feynman loop also being currently calculated to renormalize his theory, this of course will take additional analysis from people beyond me, in the spirit of peer review.
We all need to remember that unilateral acceptance of a theory is unlikely due to the decentralized networks contrasting with what's allowed a theory such as quantum mechanics in general relativity to propagate.
I fully believe, that there is a range of unified theories possible, all based off of competent identification of similar mathematical principles, and general principles, with a range of uses and complexity all adhering to these principles based off of personal development and usage needs.
Zero sum thinking it is absurd in this matter, attempting to invalidate theories such as this based off of a small and minor inconsistency does not hold up to rigorous academic standards of how one would systematically and historically address how a theory could be considered a functioning Unified theory.
This type of thinking, with the cognitive dissonance that continues to refuse acknowledging that even theories like quantum mechanics and general relativity have inconsistencies and are still very valuable.
We could pretend to invalidate these Frameworks based off of a small and general technicalities as well. But this would be foolish, which is why the zero sum thinking is the bane of science. Imagine, if a logic of a small inconsistency in validating an entire framework, such as his common here on Research a, was applied to General relativity, seeing his quantum mechanics was already prevalent at the moment it came out.
Fact of the matter is, authenticating unified theories boils down to something more akin to hard mathematics, and cannot be invalidated by simple verbal English phrases of potential technical inconsistencies. It's far more advanced, and complicated than that, and no matter what you say, you're not going to be able to invalidate or supersede at the mathematical authentications needed to validate theories such as this,.
Again, if you apply that logic to conflicting theories such as quantum mechanics in general relativity, the argument becomes an inherently illogical. Especially if any point made to argue this is based on quantum mechanics or general relativity.
The dissonance, of when it is acceptable to ignore a certain technicalities, and when it isn't, based off of what other people are championing, is beyond ridiculous. If you apply this to even the inconsistencies and quantum mechanics in general relativity, you can pretend that all of our advancements in these areas in the past 40 years didn't matter.
We act as though just because things like certain inconsistencies in Quantum mechanics, General relativity, and string theory, some of the most major theories done integrate, that they're not still utilizable and good efforts. Seems to be a dissonance, and when this logic is applied to popular theories versus one that is developed by somebody less or known, or a less widely accepted theory.
There will not be one, once we start seeing the greater Mosaic of understanding will all move forward.
such as String Theory Struggle with, among other implications."
In lieu of this, here are the standards I challenge people to meet, when attempting to authenticate their own theories, and post the results here if you want to:
Computational Verification:
1. Numerical Simulations:
Use of computational models to simulate theoretical predictions and compare them against experimental data.
Algorithmic Consistency: Ensuring that the algorithms used in simulations and calculations are robust and produce consistent results.
2. High-Energy Experiments
Particle Colliders: Utilizing facilities like the Large Hadron Collider (LHC) to test predictions about particle interactions at high energies. It's going to also include matching up with their data from repositories.
Detector Sensitivity: Ensuring that detectors are sensitive enough to observe rare or subtle phenomena predicted by the theory.
3. Standard Classical Experiments
Reproducibility: Experiments must be reproducible by independent researchers under the same conditions.
Precision Measurements: High precision measurements to test the predictions of the theory, such as those in electromagnetism and gravity.
4. Quantum Verification
Wave Function Analysis: Verifying that the theory’s predictions about quantum states and their evolution match experimental observations.
Entanglement and Superposition: Testing predictions about quantum entanglement and superposition through experiments like the double-slit experiment.
5. Computational Authentication
Feynman Loop Calculations: Performing and verifying one-loop (and higher-loop) Feynman diagram calculations to ensure the theory is renormalizable.
Normalization Data: Comparing the renormalization data against known standards to ensure consistency.
Feynman Loop Validation: Validating the theory through detailed calculations of Feynman loops to ensure mathematical consistency.
6. Logical and Theoretical Framework Consistency
Group Theory and Symmetry: Ensuring that the theory adheres to established symmetries and group structures, such as those in the Standard Model (e.g., SU(3)xSU(2)xU(1)).
Lorentz Invariance: Maintaining Lorentz invariance in the regions where special relativity holds
Predictive Power and Experimental Validation
Predictions of New Phenomena: The theory should predict new phenomena that can be tested and potentially falsified by experiments.
Data Compatibility: Predictions must be compatible with existing experimental data, and any deviations must be accounted for and explained.
7. Peer Review and Publication
Publishing in Reputable Journals: The theory must be published in peer-reviewed journals where it can be scrutinized by the scientific community. Alternatively, to avoid gatekeeping, this can be done by simply consulting with experts in the field, which are within your peer network, and having them verify the work in some sort of documentable way.
Transparency and Collaboration: Maintaining transparency in methods and data, and encouraging collaborative efforts to test and validate the theory.
8. Research-Based Comparison
Comparison Against Known Models: Conducting research-based comparisons against known models that have low loop consistency to highlight the advantages of the new theory.
Relevant answer
Answer
The reflection of the intuitive powers of science on the field is only possible through Mathematics. In short, the calculator of science in the field is mathematics.
Theories are valid in this sense. Not everything that is said or written constitutes a theory. The relevant branch of mathematics tests, discusses and concludes it. Mathematics supports these theories by guiding them. It does this within its rules. In cases where it is insufficient, it creates new possibilities and possible situations within itself. Despair is against science. The helplessness of theories creates vicious circles, i.e. they do not come to life.
Theories are presentations and new expressions of theorists over time. If true, new theorems come to life with their connections. It becomes life rather than a dream.
Theory, Theorem Theorist, the triad forms the trivet of science.
Mathematics determines and concludes its accuracy in the field. In doing so, it is strict and ruthless.
Sometimes it tips its hat to science with its agility.
In short, it gathers the trio of Science, Mathematics and Human in one pot.
Mathematics, mathematics, mathematics,...
  • asked a question related to Authenticity
Question
14 answers
I was wondering if you would care to share your thoughts on:
Is the text generated by ChatGPT or by a human?
Do the publishers of research journals use AI detection Tools?
Regards,
Yawar
Relevant answer
Answer
Humans plus AI detectors can catch AI-generated academic writing
"A study has found that specific artificial intelligence content detectors and experienced human reviewers can accurately identify AI-generated academic articles, even after they have been paraphrased. Publishers should use both AI detectors and top-notch reviewers to help protect academic integrity in scientific publishing...
“The study provides a crucial insight into the evolving landscape of AI and its implications for academic integrity. The inconsistencies observed in the detection tools, especially regarding false positives with human-written content, emphasise the need for a multifaceted approach that combines AI detection tools with manual review processes,” Elkhatat argued.
“This approach will help mitigate the risks of academic misconduct and enhance the reliability of assessments.”
“Further research and development are essential to refine these tools and adapt them to the sophisticated capabilities of newer AI models. Additionally, future AI detectors will face continuous challenges due to the rapid development of AI generative text.”..."
  • asked a question related to Authenticity
Question
3 answers
I want to know what has happened to the concept of originality of architectural work in digital reproductions, has it disappeared or is it evolving with a new concept?
Relevant answer
The digital registry can join so many tools that enhance the process of conservation of architectural works. But the reproduction is another theme. Some cultures, like japanese, use to change some elements by the time pass; what’s the difference: the mantaine the traditional procedures. That’s important. Digital reproduction help in studies and interpretations. How ever when it is used without care could be dangerous to the integrity
  • asked a question related to Authenticity
Question
3 answers
I am reviewing a paper for ANSYS application in Shape Memory Alloys snice the access denied for Our country to the web site is there a chance or a possibility there is a Margene of error in the results of Piracy's copy of Ansys
Relevant answer
Answer
I do not believe that ANSYS will deliberately corrupt results on pirated copies as it may make them liable for your damages.
However, you will have no official support for your own mistakes...
You may consider their student version. Although limited in mesh volume and do not export mechanicak models, it is an excellent tool for small models and can help you conduct research, investigation and design of almost any issue.
  • asked a question related to Authenticity
Question
3 answers
I have isolated granulosa cells from mice ovary using puncture method. Cells are healthy and growing in DMEM. Their morphology is same as granulosa cells. However I would like to use a molecular markers or Immunohistochemistry method to authenticate them further, before downstream use. Can anyone suggest the best methods and markers for the same ?
Relevant answer
Answer
Dear Dr. Khare,
I had flow in mind too. When it is between ICC vs flow cytometry, you should opt for flow cytometry as per your requirement.
Best.
  • asked a question related to Authenticity
  • asked a question related to Authenticity
Question
9 answers
Hi,
I intend to publish my article in the journal: Journal of Contemporary Issues in Business and Government
(Although websites suggest it is a legitimate journal, and i have verified the ISSN number)
However, Their have been frequent suspicious actions on part of the journal (Such as rapid requests for payments, recently changed website , and acceptance without review).
Can an expert please advise.
Below is the link for the journal:
Relevant answer
Answer
I am very happy to know that Professor Lipsey is going well and observing ResearchGate.
  • asked a question related to Authenticity
Question
4 answers
some data shows direct and some inverse relation?
kindly share any authentic paper please.
Relevant answer
Answer
Dear friend Amjad Ali
Ah, the relation between macrostrain and particle size, a topic that can indeed stir up some debate. From my engineering standpoint, here's the lowdown:
Macrostrain is essentially the strain experienced by a material on a macroscopic scale, often measured as the change in length or volume per unit length or volume, respectively. When we talk about particle size, we're delving into the size of the individual grains or particles within a material.
Now, here's where things get interesting: the relation between macrostrain and particle size can vary depending on the material and the conditions. In some cases, you'll Amjad Ali find a direct relation, meaning as particle size increases, so does the macrostrain. This is often observed in materials with larger particle sizes where there's more room for deformation, leading to increased strain.
Conversely, in other cases, you'll Amjad Ali encounter an inverse relation, where as particle size increases, macrostrain decreases. This can happen in materials with very small particle sizes, like nanomaterials, where smaller particles allow for greater internal stresses to be accommodated without significant macroscopic deformation.
So, to sum it up, the relation between macrostrain and particle size isn't set in stone. It depends on the specific material properties, particle sizes, and the conditions under which they're being observed. It's a fascinating area of study with plenty of nuances to explore!
  • asked a question related to Authenticity
Question
2 answers
Dear colleagues,
I require urgent assistance regarding the authenticity of the "Plasma Science and Technology" journal. Upon investigation, I found two websites bearing the same name and ISSN number "ISSN: 1009-0630":
  1. https://iopscience.iop.org/journal/1009-0630
  2. https://dlztkxyjs-e.cn/index.php/pst/index
This discovery raises concerns about the legitimacy of one of these platforms. I seek your expertise in discerning the genuine journal from any potential fraudulent counterpart.
Your prompt assistance in clarifying this matter is greatly appreciated.
Warm regards,
Relevant answer
Answer
Dear Lina Naji
I raised this/your point here on RG https://www.researchgate.net/post/New_very_misleading_type_of_scam_Anyone_with_recent_examples and mentioned and I quote:
“Thanks to a highly valued member of RG, I came across another example of a hijacked version of a legit and genuine journal called “Plasma Science and Technology”. There are two legit websites of the two (co-)publishers behind this journal:
And
http://pst.hfcas.ac.cn (see also enclosed file how proper papers published by them look like).
There are numerous red flags:
-Looking at the latest volume 25 number 1, I see that basically all papers have nothing to do with the scope of the journal http://dlztkxyjs-e.cn/index.php/pst/index
-Looking at the contact info of this fake journal it is vague, and they make use of Gmail http://dlztkxyjs-e.cn/index.php/pst/about/contact
-The papers published by this fake version are not edited that well, it looks extremely basic. They pretend to be open access while the real one is subscription-based
So, unbelievable but this fake version is a blunt example of a hijacked version of a legit and genuine journal."
Best regards.
  • asked a question related to Authenticity
Question
65 answers
SCIENTIFIC METAPHYSICAL CATEGORIES
BEYOND HEIDEGGER
ENHANCING PHYSICS
Raphael Neelamkavil, Ph. D., Dr. phil.
1. Introduction beyond Heidegger
I begin my cosmologically metaphysical critique of the foundations of Heidegger’s work, with a statement of concern. Anyone who attempts to read this work without first reading my arguments in the book, Physics without Metaphysics?, (1) without being in favour of a new science-compatible metaphysics and concept of To Be, and (2) without a critical attitude to Heidegger – is liable to misunderstand my arguments here as misinformed, denigrative, or even trivial. But I do this critique in search of very general means of constructing a metaphysics capable of realising constant guidance and enhancement to scientific practice.
Contemporary mathematics, physics, cosmology, biology, and the human sciences have a shape after undergoing so much growth that we cannot think philosophically without admitting the existence (termed “To Be”) of all that exist, the cosmos and its parts. The general concept of existence is always as “something-s” that are processually out there, however far-fetched our concepts of the various parts of or of the whole cosmos are. “The existence of the totality (Reality-in-total) as the whole something whatever” and “particular existence in the minimally acceptable state of being something/s whatever that is not the whole totality” are absolutely trans-subjective and thus objectual presuppositions behind all thought.
Today we do not have to theoretically moot any idea of non-existence of the cosmos and its parts as whatever they are. This is self-evident. That is, basing philosophical thinking – of the very nature of the existence-wise metaphysical presuppositions of all that are subjective and objective – upon the allegedly subjective origin of thought processes and concepts – should be universally unacceptable.
Therefore, I think we should get behind Heidegger’s seemingly metaphysical words – all based on the human stage on which Being is thought – by chipping his prohibitively poetical and mystifying language off its rhetorically Reality-adumbrating shades, in order to get at the senses and implications of his Fundamental Ontology as Being-historical Thinking. It suffices here to admit that the history of Being is not the general concept of the history of the thought of Being, and not the history of the thought of Being.
Moreover, it is not a necessity for philosophy that the Humean-Kantian stress on the subject-aspect of thought be carried forward to such an extent that whatever is thought has merely subjectively metaphysical Ideal presuppositions. All subjective presuppositions must somehow be taken to possess the merely subjective character.
There are, of course, presuppositions with some conceptual character. But to the extent some of them are absolute, they are to be taken as absolutely non-subjective. These presuppositions are applicable without exception to all that is, e.g. To Be and all Categories that may be attributed to all that exist. HENCE, SUBJECTIVE PRESUPPOSITIONS ARE NOT A SUBSTITUTE FOR CONCEPTUAL PRESUPPOSITIONS.
This fact should be borne out while doing philosophy, without which no philosophy and science are possible. The weight of the subject-aspect continues to be true of thought insofar as we go to non-absolute details of metaphysical presuppositions and empirical details, and not when we think only of the metaphysical Ideals of all existents in themselves.
It is true that there is no complete chipping off of the merely subjective or anthropological aspect of the Heideggerian theory. Nor is there an analysis without already interpreting anything. The guiding differentiation here should be that between “the subjective” and the “conceptual”. The conceptual is not merely subjective, but also objective. It is objective due to the inheritance pattern behind it from the objectual.
Such a hermeneutic is basic to all understanding, speculation, feeling, and sensing. The linguistically and otherwise symbolic expression of concepts and their concatenations is to be termed as the denotative universals and their concatenations.
At the purely conceptual level we have connotation. These are purely conceptual universals and their concatenations. Since these are not merely a production of the mind but primarily that by the involvement of the generated data from the little selection of the phenomena from physical processes, which are from a highly selected group of levels of objectual processes, which belong to the things themselves.
At the level of the phenomena, levels of objectual processes, and the things themselves there are universals, which we shall term ontological universals and their conglomerations. These conglomerations are termed so because they have the objectual content at the highest level available within the processes of sensing, feeling, understanding, speculation, etc.
2. Conclusions on Heidegger Proper
The above should not necessarily mean (1) that we cannot base thought fully on the Metaphysical Ideals of “To Be” and “the state of existents as somethings”, and (2) that we cannot get sufficiently deep into the fundamental implications of his work by side-lining the purely subjective concepts of the fundamental metaphysical concepts. This claim is most true of the concept of To Be.
To Be is the simultaneously processual-verbal and nomic-nominal aspect of Reality-in-total, and not merely that of any specific being, phenomenon, or concept. For Heidegger, To Be (Being) is somehow a private property of Dasein, the Being-thinking being. To Be which is the most proper subject matter of Einaic Ontology (metaphysics based completely on the trans-thought fact of the Einai, “To Be” of Reality-in-total) is not the Being that Dasein thinks or the Being that is given in Dasein, because To Be belongs to Reality-in-total together and in all its parts.
Even in Heidegger’s later phase highlighted best by his Contributions to Philosophy: From Enowning, his concept of To Be as belonging to the Dasein which is the authentically Being-thinking human being has not changed substantially. Even here he continues to project positively the history of Being-thinking human being as the authentic Being-historical process and as the essence of the history of all that can be thought of.
Against the above metaphysical backdrop of essentially anthropocentric definitions, I write this critique based on cosmological-metaphysical necessities in philosophy, and indirectly evaluate what I consider as the major ontological imperfection in Heidegger’s thought from the viewpoint of the Categorial demands of the history of metaphysics, various provincial ontologies and scientific ontology, and of the way in which I conceive the jolts and peaks in such history.
Along with the purely meta-metaphysical To Be, (1) I present the metaphysical abstract notions of Extension (= compositeness: i.e., having parts) and Change (= impacts by composites: i.e., part-to-part projection of impact elements) as the irreducibly metaphysical Categories of all existents and (2) argue that Extension-Change existence in their non-abstract togetherness as existents is nothing but Universal Causation (= everything is Existence-Change-wise existent, i.e. if not universally causal, existence is vacuous).
These are metaphysical principles that Heidegger and most philosophers till today have not recognized the primordiality of. Most of them tend to fix to existence universal or partial or absolutely no causality. In short, Universal Causation, even in some allegedly non-causal aspects of cosmology, quantum physics, philosophy of mind, and human sciences, is to be the taken as a priorias and co-implied by existence (To Be), because anything existent is extended and changing...! No more should sciences or philosophy doubt Universal Causality. Herein consists the merit of Einaic Ontology as a universally acceptable metaphysics behind all sciences – not merely of human sciences.
To Be is the highest Transcendental Ideal; Reality-in-total is the highest Transcendent Ideal; and Reality-in-general is the highest Transcendental-Transcendent Ideal of generalized theoretical concatenation of ontological universals in consciousness. These are meta-metaphysical in shape. They are not at all classificational (categorizing) of anything in this world or in thought.
Although Heidegger has not given a Categorial scheme of all existents or Categorial Ideals for all metaphysics and thinking, he is one of the few twentieth century thinkers of ontological consequence, after Aristotle (in favour of an abstract concept of Being) and Kant (against treating the concept of Being as an attribute), to have dealt extensively with a very special concept of Being and our already interpretive ability to get at To Be.
I present here in gist the difference between the Dasein-Interpreted concept of Being and the ontologically most widely committed, Einaic Ontological, nomic-nominal, and processual-verbal concept of To Be, which should be metaphysically the highest out-there presupposition of all thought and existence. This is the relevance of metaphysics as a trans-science.
Bibliography
(1) Gravitational Coalescence Paradox and Cosmogenetic Causality in Quantum Astrophysical Cosmology, 647 pp., Berlin, 2018.
(2) Physics without Metaphysics? Categories of Second Generation Scientific Ontology, 386 pp., Frankfurt, 2015.
(3) Causal Ubiquity in Quantum Physics: A Superluminal and Local-Causal Physical Ontology, 361 pp., Frankfurt, 2014.
(4) Essential Cosmology and Philosophy for All: Gravitational Coalescence Cosmology, 92 pp., KDP Amazon, 2022, 2nd Edition.
(5) Essenzielle Kosmologie und Philosophie für alle: Gravitational-Koaleszenz-Kosmologie, 104 pp., KDP Amazon, 2022, 1st Edition.
Relevant answer
  • asked a question related to Authenticity
Question
2 answers
Blockchain and artificial intelligence (AI)" refers to the convergence of these two technologies, which brings new value to business through authenticity, augmentation and automation.
Blockchain is a shared, immutable ledger that provides an immediate, shared and transparent exchange of encrypted data simultaneously to multiple parties as they initiate and complete transactions. A blockchain network can track orders, payments, accounts, production and much more. Since permissioned members share a single view of the truth, they gain confidence and trust in their transactions with other businesses, along with new efficiencies and opportunities.
Artificial intelligence (AI) uses computers, data and sometimes machines to mimic the problem-solving and decision-making capabilities of the human mind. AI encompasses the sub-fields of machine learning and deep learning, which use AI algorithms that are trained on data to make predictions or classifications. The benefits of AI include automation of repetitive tasks, improved decision making and a better customer experience.
Combined values of blockchain and AI
Authenticity Blockchain’s digital record offers insight into the framework behind AI and the provenance of the data that it is using, addressing the challenge of explainable AI. This insight helps improve trust in data integrity and in the recommendations that AI provides. Using blockchain to store and distribute AI models provides an audit trail, and pairing blockchain and AI can enhance data security.
Augmentation AI can rapidly and comprehensively read, understand and correlate data at incredible speed, bringing a new level of intelligence to blockchain-based business networks. By providing access to large volumes of data from within and outside of the organization, blockchain helps AI scale to provide more actionable insights, manage data usage and model sharing, and create a trustworthy and transparent data economy.
Automation AI, automation and blockchain can bring new value to business processes that span multiple parties — removing friction, adding speed and increasing efficiency.
Relevant answer
Answer
In the ever-evolving world of secure and smart critical cyber infrastructures, combining Blockchain and Artificial Intelligence is like adding wings to a bird. It's a game-changer! But what's next on the horizon?
Well, first off, we need to make these technologies work hand in hand even better. Think of it like two superheroes teaming up to fight crime – they're stronger together. We need to find more ways for Blockchain and AI to collaborate and make our cyber infrastructure even more secure and efficient.
Then there's the whole rulebook side of things. We've got to make sure we have clear guidelines and laws in place. That means figuring out how to use these technologies responsibly and ethically, while still protecting people's privacy and rights. It's like building guardrails on a highway – keeps things moving smoothly and safely.
Of course, none of this happens without the right people. We need a bunch of smart cookies who know their stuff when it comes to Blockchain and AI. That means investing in education and training programs to make sure we've got a skilled workforce ready to tackle whatever comes our way.
But it's not just about us here in India. Cyber threats don't care about borders. That's why we need to team up with other countries and share what we know. Together, we can build a global defense against cyber attacks that's stronger than anything we could do alone.
And let's not forget about encouraging new ideas. We need to create an environment where startups and researchers feel like they can take risks and try out bold new concepts. Who knows? The next big breakthrough in cyber security could be just around the corner.
So, there you have it – the next steps in integrating Blockchain and Artificial Intelligence into our cyber infrastructure. It's all about teamwork, rules, education, collaboration, and a healthy dose of innovation. With that recipe, we're sure to stay one step ahead in the ever-changing world of cyber security.
  • asked a question related to Authenticity
Question
5 answers
I would like to hear your view on the relationship between authentic leadership and stress for those managers practicing (not working under someone who is authentic) authentic leadership ie if you are an authentic leader are you likely to have more or less stress. Would love to hear the scholarship that you are aware of that talks about this.
Relevant answer
Answer
Excellent question. The issue I'm looking at is stress experienced by the leader when they're being authentic.
  • asked a question related to Authenticity
Question
1 answer
I have a concern regarding readjusting the intensities value of xrd data. In one the discussion in this platform, (the link is here- https://www.researchgate.net/post/What_could_be_the_reason_for_not_having_further_low_chi_square_value_better_agreement_in_my_refinement_result) it is said that the intensities value height can be readjusted to get good chi square value even though all the peaks are very well matched but the Chi square value is not low. Is this authentically correct or are we manipulating the data by resizing the height of the xrd peaks which we get. If it is correct, then who decides up to what resizing amount should the intensities be done/changed so to get good Chi square value?
Relevant answer
Answer
When aiming for a good chi-square value in peak fitting, it’s essential to recognize that adjusting intensity is not a solution because intensity carries valuable information related to factors like disordering and texturing. Instead, consider incorporating aspects such as preferred orientation or accounting for disordering during your fittings. These additional considerations can lead to more accurate and meaningful results.”
Remember, the interplay between various parameters (especially u, v, and w) is crucial for robust peak fitting.
  • asked a question related to Authenticity
Question
2 answers
I propose as a subject for a discussion the PDF-Powerpoint of the lecture "Analogies between Plotinus and Indian Philosophy" held on 1st March 2024 at the International Conference on Topic: Cultures in Transformation: A Subcontinental Experience International Conference organized by the Department of History in Collaboration with Northern Region Centre Indian Council of Social Science Research (ICSSR), 1-2 March 2024, Ram Lal Anand College, University of Delhi. I am working on a text connected to the PowerPoint. In my inquiry, I would like to expose some aspects of Plotinus’ thought which have, in my opinion, analogies with aspects of Indian Philosophy. I shall therefore concentrate my attention on Plotinus’ conception of the One, on the relations between One and multiplicity, on the separation of the individual from the One and on the return to the One. I shall then investigate the opposition expressed in the Upanishads between inauthentic reality and authentic reality, the initial position of the individual in the darkness and the return of the individual to the true dimension of reality. The individual’s ascent to the One in Plotinus and the liberation of the individual from the dimension of multiplicity will be a central theme of my exposition since it constitutes one of the analogies with some passages of the Upanishads in which the process of liberation of the individual from the ties of the average sense reality are described: the initial position of the individual as a position of decadence of the individual will be exposed by resorting to different passages of Plotinus’ Enneads.
The opposition between knowledge and opinion, on the one hand, and between intellect and sense perception, on the other hand, will be investigated in order to see the similarities with passages from the Upanishads in which the opportunity of a progressive detachment from the sense dimension is insisted on.
The common ground between Plotinus and the Upanishads proves to be the conception of philosophy as the revelation that the average way of living is inauthentic, that there is an authentic dimension of reality, that the individual ought to reach the authentic dimension of reality, and that a long process of training is needed for the individual to be able to reach the authentic dimension of reality. Furthermore, the description of the position of the One as an entity which is beyond all predicates can be analysed, in my opinion, with particular attention to the analogies which this subject can have with the descriptions of the nature of Brahman.
The main texts on which I will base my inquiry will be Plotinus’ Enneads, on the one hand, and the Upanishads, on the other hand.
Relevant answer
Answer
زميلي العزيز
تحية طيبة
إن التشابه بين الفلسفة الهندية وبين أفلوطين راجع إلى كون الاثنين من منبع واحد، وهو الحضارة الشرقية، ذلك أن الحضارة الشرقية قريبة جدًا في فهمها للوجود وللحياة، أي توجد خطوط عريضة في دراسة هذه المباحث الفلسفية وطرحها، والتي تختلف بطبيعة الحال عن الحضارة الغربية.
  • asked a question related to Authenticity
Question
1 answer
Traditional student assessment does not achieve educational goals, so alternatives to assessment must be used
Relevant answer
Answer
There should be workshops and training sessions from the organizations yo support teachers for authentic assessment and for check and balnce balance balance
  • asked a question related to Authenticity
Question
2 answers
The effectiveness of a new species description hinges on the information it contains, particularly in terms of sufficiency and accuracy. Sufficiency is gauged by the amount of information pertaining to the morphological characters of the new species that allows a well-justified differentiation (textually asserted by the author) from its congeners. Accuracy refers to the alignment between the textual description and the authentic specimen. Such information can be conveyed, within a paper, in the form of either text or illustrations, or a combination of both.
The absence of advanced documentary techniques has necessitated an elaborative morphological description for new species in the past centruries, and a lack thatof renders a "poor" description that may hinder future studies by other researchers. In the absence of any form of illustrations, textual descriptions become the mere vehicle of information, with its sufficiency and accuracy largely deciding the convenience for further study. In the presence of hand-drawn illustrations, the description gains enhanced conceivability. However, hand-drawn illustrations are susceptible to biased accuracy. Modern technology allows the inclusion of photographs of the authentic specimen within paper, and the internet facilitates additional sources like webpage links to supplementary visuals (including videos).
Then, the question arises: considering the subjectivity in qualitative character descriptions and potential discordance between authors in quantitative character documentation, when sufficient photographs of the authentic specimen are available, is it still neccessary to provide a detailed "description" part for the new species?
Note that the premise demands sufficient and high-quality photographs as substitutions for textual descriptions, thus when the relevant equipments are unavaible, a detailed description remains pivotal. I can appreciate that some individuals may view the textual description as a formal assertion by the author, one that can be specifically addressed in subsequent studies.
I consistently offer a comprehensive species description because I believe it should be either highly concise or detailed. A succinct documentation can be achieved through the organization of a morphology matrix containing well-classified descriptors for straightforward comparison. The reason for posing this question stems from my occasional observation of complex or repetitive textual descriptions presented as blocks of paragraphs, occupying a substantial portion of the paper. Personally, I reckon that in the modern context, emphasis should be placed on other aspects that may be prone to errors, such as the examination procedure and between-species comparisons (due to subjectivity and sample sufficiency).
Relevant answer
Answer
Thank you for such an elaborative reply! Yes, I agree that basic descriptions that allow identifications nonetheless matter.
As for the last sentence I mentioned, I found that (in scorpiology) many old methodological papers that have been followed by subsequent authors by default suffer from a few problems, including the inaccuracy/ambiguity of measurement, etc. However, authors who cite those papers in their Methods part often do not further clarify their solutions as if those problems are nonexistent. What I meant by the "aspects that may be prone to errors" was essentially conveying the point that authors should better be more transparent about their examination procedures and specimen qualities.
  • "...some organisms are practically amorphic and lack distinct, well-defined morphological features or come with highly variable or formless body structures, thus photographs may capture their general appearance but may not provide detailed morphological information (e.g. slime molds, amorphic fungi). In these cases, we can only rely on texture, odor, specialized observation methods, microscopic examination and/or genetic analysis..."
Interesting point. But I do wonder if people can observe those features (by whatever means), then surely they can visualize them, no? Of course, I'm not suggesting a total absence of description. But I personally believe that supplementaries would lend more credence to the textual assertions. I think descriptions are meant for summarizing the key points when visuals are provided (like you said, it's better to provide a direct count rather than asking the readers to count by themselves; but photos ensure the freedom for readers to confirm the asserted count). That's why I limited my topic with a premodifier, "detailed".
  • "...Hand-drawn illustrations, when done correctly and methodologically shouldn't be susceptible to biased accuracy..."
That's when you would need to "pray" for an ethical author. Without visual proof, readers might not truly know what a species looks like. There's always a likelihood that the features have been manipulated to conform with author's assertion. I believe you may have noticed that quite a few authors hurriedly publish numerous new species without critical evaluation. Regarding accuracy, a 2015 scorpion species description illustrates the problem. Check figures 7-10 and 34-35.
I have attached some photos I took with my own specimens. You would see that their hand-drawn illustrations barely convey any useful information. This has been the quality of all the Chinese scorpion papers before 2015.
  • "...I think that the subjectivity in qualitative character descriptions isn't considerable for certain taxa..."
Emmm, it's still about whether visuals are supplemented. People often have different opinions on "strong, moderate, reduced" and "large, medium, small", etc. If those characters are not quantified (no doubt, quantification methods must be explicitly explained and exemplified), then I think one might just as well provide some photographs for a more straightforward representation. I don't think readers can accurately understand how "long" an apophysis is if there's no figure. Perhaps they could even form differing opinions, not necessarily because the original author wasn't accurate in his description, but perhaps because new species possessing "longer" apophyses have been discovered thereafter.
  • asked a question related to Authenticity
Question
2 answers
Dear Researchers,
Could anyone please let me know the authenticity of the following journal:
Journal of Oncology Research and Therapy
Abbreviation JONT
ISSN 2574-710X
Publication Type Peer Reviewed
Publishing Model Open Access
Impact Factor 4.32
DOI Prefix 10.29011/2574-710X
Journal Category Oncology Journals
Best regards
Dr. Bhuyan
Relevant answer
Answer
The short answer is no. The publisher behind this journal is Gavin Publishers, a publisher (https://www.gavinpublishers.com ) mentioned in the Beall’s list (https://beallslist.net ). This is by itself not enough to say predatory or not but there are numerous other red flags:
-Prominently mentioned impact factor is fake since they are not indexed in Clarivate’s indexes (you can check here https://mjl.clarivate.com/home ) and therefor by definition they cannot have an impact factor
-In their indexing info they mention Scopus impact factor which is fake in two ways and highly misleading. First, they are not indexed in Scopus and second Scopus does not assign impact factors (they have an alternative called CiteScore)
-Contact info when searched for in Google renders anything but what looks like an office
-According to https://www.gavinpublishers.com/article/processingcharges they state “Article Processing Charges ($560 - $4060)* Varies from Journal to Journal & Country Depending on Article Types.” In all cases ridiculously high for non-indexed journals
Personally, I would say avoid.
Best regards.
  • asked a question related to Authenticity
Question
6 answers
Users may focus on its validity and authenticity.
Relevant answer
Answer
I thought you meant that other people could somehow manipulate my ChatGPT results, but if I want to generate misleading results through my own highly selective prompts, that is certainly possible. Or, if I ask ChatGPT to analyze by inputting dubious data, it will likewise produce dubious results.
But none of that is due to ChatGPT itself. You can lie about your data or used biased analysis strategies with just about method or tool.
  • asked a question related to Authenticity
Question
1 answer
...
Relevant answer
Answer
Using trusting sources (e.g. government, statistic institutes) or establishing partnerships with an industrial data controller
  • asked a question related to Authenticity
Question
1 answer
هل يمكن للمملكه العربيه السعوديه ان تصل الى رؤيه 2030 وتحدو نفس حدو اليابان في الجمع بين الاصاله والمعاصره
Relevant answer
Answer
I am very doubtful. The question is what values must KSA shed to be "modern" and what values it must keep in order to be authentic. Sometimes these values clash and KSA has to decide on which direction it wants to go. Also, I doubt that 6 years are enough time to change deeply entrenched values at the societal level. The transition of Japan took longer than that.
From an adult development perspective, the shift from pre-modern (pre-conventional) to modern(conventional) is a momentous one and even the West has not successfully navigated this transition as still individuals with pre-modern consciousness account for 40-60% of the Western population. Right now, I see only 10% of KSA population at a conventional level.
  • asked a question related to Authenticity
Question
1 answer
Can anyone please share their feedback or review on the journal - Empirical Economics Letters (ISSN 1681 8997)? Can anyone confirm its authenticity and metrics? The articles published by the journal look really unstandardized, and their website looks questionable. I have also tried seeing their previous issues published only some have doi? is this journal predatory ?
Relevant answer
Answer
1) It's authentic. Just sometimes back, my Ph.D. batchmate published her paper there.
2) I've not been able to view any previous articles, I guess it's strictly subscription-based viewing. However, Abstracts at least should have been made available.
3) After they accept papers, they ask for "Production fee", my batchmate paid around INR 9.5K
4) Decision time was 2 months for her.
  • asked a question related to Authenticity
Question
1 answer
Title:
Enhancing Privacy-Preserving Authentication through NIST, PCI, IETF, and ICANN Compliant Encryption and Zero-Knowledge Proofs
Abstract:
This proposal aims to develop an advanced mathematical framework for a third-party service provider to authenticate device users' activities while preserving privacy. The framework will utilize encrypted GPS coordinates and multi-factor authentication in compliance with NIST, PCI, IETF, and ICANN standards. It will focus on Zero-Knowledge Proofs (ZKPs) to maintain user privacy, exploring three distinct models: the plain model, the common random string model, and the random oracle model.
Introduction:
  • Background: As digital interactions increase, the need for robust, privacy-preserving authentication mechanisms becomes crucial.
  • Objective: To create a mathematical model for third-party verification that adheres to international standards and utilizes ZKPs to ensure user privacy during various digital interactions.
Standards and Compliance:
  • NIST (National Institute of Standards and Technology): Explore encryption standards and guidelines for secure cryptographic practices.
  • PCI (Payment Card Industry): Incorporate data security standards for handling GPS and transaction-related data.
  • IETF (Internet Engineering Task Force): Follow protocols and standards for internet security, including SSL/TLS for sessions and RDP connections.
  • ICANN (Internet Consortium for Assigned Names and Numbers): Ensure compliance with domain name and IP address standards for device authentication.
Methodology:
  1. Modeling Encrypted GPS Coordinates:Develop encryption/decryption algorithms compliant with NIST, PCI, IETF, and ICANN standards. Evaluate and select Elliptical Curve or RSA encryption methods for their suitability and compliance.
  2. Multi-Factor Authentication Integration:Incorporate additional authentication factors like atomic time, device IMEI numbers, and user knowledge. Create a unified model that integrates these factors securely and efficiently.
  3. Zero-Knowledge Proofs for Privacy:Plain Model: Implement interactive ZKPs where the verifier selects random challenges, and the prover responds, ensuring the verifier's conviction of the prover's knowledge without revealing it. Common Random String Model: Utilize non-interactive ZKPs where both parties have access to a common random string, facilitating the proof without interaction. Random Oracle Model: Apply the Fiat–Shamir heuristic for non-interactive ZKPs, assuming the computational hardness of certain problems (e.g., collision resistance of hash functions).
  4. Geofence Authentication without Revealing Location:Employ ZKPs to validate a device's presence within a geofence without disclosing exact coordinates. Ensure that these proofs are efficient, secure, and compliant with the identified standards.
  5. Third-Party Verification Protocol:Develop protocols allowing third parties to verify actions like SSL sessions and contract signings without accessing sensitive location or private data.
Expected Outcomes:
  1. Mathematical Framework: A detailed model combining encrypted GPS, multi-factor authentication, and ZKPs.
  2. Compliance and Security Analysis: Assessment of the framework's adherence to NIST, PCI, IETF, and ICANN standards.
  3. Privacy-Preserving Protocols: Efficient and secure protocols for third-party verification that maintain user privacy.
Significance:
  • For Users: Ensures privacy and security in digital transactions and interactions.
  • For Service Providers: Provides a reliable and compliant way to authenticate user activities.
  • For Regulatory Bodies: Sets a new standard for privacy-preserving, compliant authentication systems.
Relevant answer
Answer
It is essential to research the advancement of authentication systems that prioritise privacy by employing encryption, zero-knowledge proofs, and complying with industry standards (Jo, 2020; LogicMonitor, n.d.; Microsoft, 2022). In order for a technical solution to be successful, it must carefully manage the authentication process, maximise efficiency, improve user experience, and protect user privacy (CyberArk, n.d.; Influencer Marketing Hub, n.d.).
Multiple factors necessitate resolution:
1. Which user activities necessitate authentication, and what degree of certainty is required? The sources above (FreeCodeCamp, 2022; Influencer Marketing Hub, n.d.; LogicMonitor, n.d.; Microsoft, 2022) provide the primary impetus for developing and implementing authentication factors and techniques.
2. Zero-knowledge proofs can demonstrate significant computational intricacy. An evaluation is necessary to analyse the compromises in performance between privacy and efficiency (Goldwasser et al., 1988; Jo, 2020; Vadhan, 2022).
3. Over a period of time, encrypted GPS coordinates can still provide approximate locations. Assessing the necessary level of hiding one's location (FPf, 2020; IRJET, 2019; Stack Exchange, 2022).
4. Mapping and implementing the required NIST, PCI, IETF, and ICANN standards and ensuring compliance with encryption, protocols, and other requirements is a complex task (NIST, 2022a, 2022b, 2022c; IETF, n.d.).
5. Conducting a comprehensive analysis of the privacy guarantees provided by zero-knowledge proofs and other components (Aimultiple, 2023; Identity.com, n.d.; MakeUseOf, 2022).
6. Performing tests to detect vulnerabilities, such as side-channel attacks, that could possibly compromise user privacy (Goodwill et al., 2021; MIT News, 2022a, 2022b; Springer, 2021).
Given the supplementary contextual details, I am now able to formulate a more comprehensive technological proposal and a compelling call to action:
Directive:
Privacy-preserving authentication solutions are urgently required to verify user identities and actions securely in an increasingly digitalised world. With the rapid increase in cyber dangers, individual privacy and security protection are becoming more vulnerable without adequate measures. I urge the cryptography, security, and standards community to prioritise the investigation and advancement of authentication protocols that utilise encryption, zero-knowledge proofs, and rigorous adherence to industry standards to strengthen privacy safeguards. I specifically propose the promotion of collaborative endeavours among academic researchers, technology providers, government agencies, regulatory bodies, and advocacy groups. The aim is to develop and establish standardised privacy-focused authentication methods for various applications such as financial transactions, border security, and online communications. It is imperative to prioritise the implementation of user privacy by fostering collaboration in both scientific and social domains.
Proposal for Technical Solution:
Objective: Create a mathematical system for multi-factor authentication that incorporates encrypted GPS coordinates, zero-knowledge proofs (ZKPs), and strict compliance with standards set by NIST, PCI DSS, IETF, and ICANN. The primary goals are to uphold privacy, provide security, and sustain efficiency.
Cryptographic Standards: Utilize Hybrid Encryption by creating a symmetric Data Encryption Key (DEK) using ECC or RSA Asymmetric Encryption according to NIST rules. Utilise the Data Encryption Key (DEK) to secure Global Positioning System (GPS) data by employing a symmetric cypher, such as AES-256, that has been authorised by the National Institute of Standards and Technology (NIST). Apply the SHA-256 algorithm to the ciphertext. Every key must possess an ample amount of randomness and flawless protection against future compromise.
Multi-factor Authentication: Incorporate encrypted GPS, device IDs, user passwords/biometrics, and secure timestamps into the authentication process using OCSP and OAuth2 authorisation standards. Verify the authenticity of device certificates by checking them against OCSP responders for each request. Enforce the need for reauthentication after 30 minutes of no activity.
Zero-Knowledge Proofs: Utilize zk-SNARKs to verify the location of an individual within predefined bounds, confirming traits such as age without disclosing exact GPS coordinates or other confidential data. Employ ECC scalar multiplication within the standard reference string model to enhance efficiency. Adhere to the standards set by IETF/W3C for Decentralised Identifiers.
Through thorough and rigorous testing, side channel protections involve mitigating vulnerabilities such as power analysis, electromagnetic leaks, and timing attacks. Employ masking, noise injection, and removal of deterministic patterns.
The primary objective of this framework is to prioritise user privacy while ensuring security, performance, and adherence to standards. I perceive it as a potential model for extensive implementation across several sectors. Please provide feedback about improvements, collaborations, or assessment of this project.
References:
Here are the references in APA 7th edition format:
Aimultiple. (2023). Zero-knowledge proofs: How it works & use cases in 2023. https://research.aimultiple.com/zero-knowledge-proofs/
CyberArk. (n.d.). What is authentication and authorization? https://www.cyberark.com/what-is/authentication-authorization/
FreeCodeCamp. (2022). Secure user authentication methods – 2FA, biometric, and passwordless. https://www.freecodecamp.org/news/user-authentication-methods-explained/
FPf. (2020). Policy brief: Location data under existing privacy laws. https://fpf.org/wp-content/uploads/2020/12/FPF_Guide_Location_Data_v2.2.pdf
Goldwasser, S., Micali, S., & Rackoff, C. (1988). Concurrent zero knowledge without complexity assumptions. In Proceedings of the seventeenth annual ACM symposium on Theory of computing (pp. 365-377). https://doi.org/10.1145/62212.62222
Goodwill, G., Jun, B., Jaffe, J., & Rohatgi, P. (2021). A testing methodology for side channel resistance validation. https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/08_goodwill.pdf
Identity.com. (n.d.). Securing data with zero-knowledge proofs. https://www.identity.com/zero-knowledge-proofs/
IETF. (n.d.). IETF | Security & privacy. https://www.ietf.org/topics/security/
Influencer Marketing Hub. (n.d.). What are the levels of authentication? https://influencermarketinghub.com/glossary/levels-of-authentication/
IRJET. (2019). Geo encryption using GPS co-ordinates. https://www.irjet.net/archives/V6/i1/IRJET-V6I1345.pdf
Jo, T. (2020). An exploration of zero-knowledge proofs and zk-SNARKs (Publication No. 28239) [Master's thesis, University of Pennsylvania]. Fisher Digital Publications. https://fisher.wharton.upenn.edu/wp-content/uploads/2020/09/Thesis_Terrence-Jo.pdf
LogicMonitor. (n.d.). What are the different types of authentication? https://www.logicmonitor.com/blog/what-are-the-different-types-of-authentication
MakeUseOf. (2022). What is a zero-knowledge proof in cybersecurity, and how does it work? https://www.makeuseof.com/what-is-a-zero-knowledge-proof/
Microsoft. (2022). What is authentication? Definition and methods. https://www.microsoft.com/en-us/security/business/security-101/what-is-authentication
MIT News. (2022a). Keeping web-browsing data safe from hackers. https://news.mit.edu/2022/side-channel-attacks-detection-0609
MIT News. (2022b). Thinking like a cyber-attacker to protect user data. https://news.mit.edu/2022/chip-interconnect-side-channel-attacks-0811
NIST. (2022a). Cryptographic standards and guidelines. https://csrc.nist.gov/Projects/Cryptographic-Standards-and-Guidelines
NIST. (2022b). Cybersecurity framework. https://www.nist.gov/cyberframework
NIST. (2022c). Guideline for using cryptographic standards in the federal government. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf
Springer. (2021). Security beyond cybersecurity: Side-channel attacks against embedded systems. https://link.springer.com/article/10.1007/s10207-021-00563-6
Stack Exchange. (2022). Encrypting/Salting GPS coordinates. https://crypto.stackexchange.com/questions/95418/encrypting-salting-gps-coordinates
  • asked a question related to Authenticity
Question
1 answer
I have heard that many predatory/fake groups organize international conferences and Magnus is one of them if anyone has previous experience of it. please share.
should I go to attend the conference or not??
Relevant answer
Answer
It depends on your expectations. If you consider it legit when it actually takes place, then I guess it is. If you expect a high-quality meeting with interesting experts and fellow researchers active in the same field, then I am afraid you will be disappointed. The following red flags can be found:
-On a site about predatory conferences https://www.evscienceconsultant.com/blog/predatory-meetings-and-how-to-avoid-them (they are mentioned as Magnus Group)
-If you Google the contact info 150 South Wacker Drive #2400 Chicago, IL 60606, USA mentioned on their homepage https://www.magnusgroup.org it appears to be a virtual address (in other words why hide your true origin?)
-I think that some of their collaborators (sponsors) are fake, for example this “+ Medex” has no online presence…
Personally, I would avoid this one.
Best regards.
  • asked a question related to Authenticity
Question
3 answers
How can I authenticate the measurements accuracy and precision of online downloaded software instrument.
Relevant answer
Answer
I think you should use standard samples to regularly verify instrument accuracy. Alternatively, high-precision instruments can be used in parallel or series to calibrate the instrument under test.
  • asked a question related to Authenticity
Question
16 answers
Cougar represents the face of evolution so sunflower represents the phenomena of dominion like Gray's name in medicine and Grey's name in home entertainment of Oscar since Elizabeth Holmes is authenticity of the Grey's Anatomy of pine evolution and blood proprietary with magnolia tree seed pods insure mercury.
Relevant answer
Answer
Meticulously engineered better by developing.
  • asked a question related to Authenticity
Question
2 answers
Please share experience with Archives of Nephrology and Urology journal. Is it authentic or fake/predatory.
Relevant answer
Answer
I will repeat my answer as I gave in a related question here on RG
“The journal “Archives of Clinical and Biomedical Research” is published by (as you indicated yourself) “Fortune journals” a publisher mentioned in the updated version of the Beall’s list (https://beallslist.net/#update). This is a red flag that you are dealing with a potential predatory publisher (and consequently journal). There are more red flags:
-Contact info (https://www.fortunejournals.com/) 11355 Richmond Ave #507, Houston, TX 77082, USA is fake or at best a virtual office. The same is true for the Delaware address (frequently used by predatory publishers for misleadingly suggesting an US origin while they are not)
-Same Delaware address is used by https://inter-publishing.com/index.php/ijbde published by Academic Journal INC a predatory publisher for sure numerous so-called misleading metrics are prominently mentioned on their website (https://beallslist.net/misleading-metrics/)
-Looking at https://www.fortunejournals.com/archives-of-clinical-and-biomedical-research-home-acbr.php I see a prominently mentioned impact factor, which is false and misleading since this journal is not indexed in Clarivate’s SCIE (you can check here https://mjl.clarivate.com/home )
-Mentioning PubMed is also misleading since ALL papers published by authors with a NIH grant are indexed in PubMed irrespective of the journal where the paper is published in. This has nothing to do with being a PubMed indexed journal (which they are not)
-APC (https://www.fortunejournals.com/article-processing-charges.php) is ridiculously high for an essentially non-indexed journal
Overall, I would say avoid this one.
Best regards.”
  • asked a question related to Authenticity
Question
2 answers
Early Childhood
Primary
Relevant answer
Answer
Firstly, it is important to understand the value systems of indigenous people.
Then in your teaching start by looking at their stories with your children. Read their creation myths. If you are teaching through play experiences have resources which support understanding of indigenous people. such as artwork provocations, music etc. Have children explore ways of being such as hunting and the nomadic lifestyle if appropriate. If you have indigenous families in your class then ask them to come and talk about their traditions. Find out the history of the land your centre is situated on going right back to its use by indigenous people, even if it is just as a place they travelled through. Research research research all of the above and do the simpler ideas first. Take your time to introduce new things
  • asked a question related to Authenticity
Question
1 answer
authentic commercial services for MD simulation, preferably in Pakistan
Relevant answer
Answer
Contact the address on the attached if interested.
  • asked a question related to Authenticity
Question
10 answers
Is it not lowering the quality of education? What has been the purpose of exam invigilation over the years before the COVID-19 pandemic? Will their degrees be authentic? Will they not be half-baked? Is it not an online copy-paste game? What do you think?
Relevant answer
Answer
There are no objective exams Samuel Mwendwa Your query is, imo, mostly a matter of precise technicalities, e.g. ID control. I do think there are two possible technical routes: A) fully automated examination in an anonymous way by multiple choice, B) something like a full oral rigorosum.
The main problem with all the online education (exams included) that I do see is the problem that outmoded educational practices will now be repeated electronically.
  • asked a question related to Authenticity
Question
4 answers
Is measuring lexical density worth while? What are the uses of doing so? What different ways of measuring lexical density are there and which is the most authentic?
Relevant answer
Answer
Hai Dr, how are you? I am attracted to your question as I have some information on it. Below, I supply you with all the answers you need, but I would really appreciate it if you could press the RECOMMENDATION buttons underneath my 3 research papers' titles in my AUTHOR section as a way of you saying thanks and appreciation for my time and knowledge sharing. Please do not be mistaken, there are few RECOMMENDATION buttons in RESEARCHGATE. One is RECOMMENDATION button for Questions and Answers and the other RECOMMENDATIONS button for papers by the Authors. I would appreciate if you could click the RECOMMENDATION button for my 3 papers under my AUTHORSHIP. Thank you in advance and in return I provide you with the answers to your question below :
Measuring lexical density can be worthwhile in some cases. For example, it can be used to:
  • Compare the readability of different texts. Texts with higher lexical density are generally more difficult to read than texts with lower lexical density. This is because they contain more content words, which are the words that carry the most meaning.
  • Identify the level of difficulty of a text for a particular audience. If you know the lexical density of a text, you can estimate how difficult it will be for a particular audience to read. This can be helpful when selecting texts for students or other learners.
  • Assess the writing style of a particular author or genre. Different authors and genres tend to have different lexical densities. For example, academic writing typically has a higher lexical density than fiction writing.
There are two main ways of measuring lexical density:
  • The ratio of content words to total words. This is the most common way of measuring lexical density. Content words are the words that carry the most meaning, such as nouns, verbs, adjectives, and adverbs. Function words are the words that are used to connect and structure sentences, such as pronouns, conjunctions, and prepositions.
  • The ratio of content words to clauses. This is a less common way of measuring lexical density. Clauses are groups of words that form a complete thought. This method of measuring lexical density takes into account the complexity of the sentences in a text, as well as the number of content words.
There is no one "most authentic" way of measuring lexical density. The best method to use will depend on the specific purpose of the measurement. However, the ratio of content words to total words is a good starting point for most applications.
It is important to note that lexical density is not the only factor that affects the readability of a text. Other factors, such as the length of the sentences, the use of jargon, and the complexity of the ideas, also play a role. However, lexical density is a useful tool for getting a general sense of the difficulty of a text.
  • asked a question related to Authenticity
Question
1 answer
Dear Researchers,
It is generallized that below 6 Ghz known as sub-6 GHz.
On different articals and web links various ranges given for the sub-6 GHz band.
Some articles telling 410 MHz to 7100 MHz is the range of sub-6 GHz, whereas some closes this range to 4.4GHz.
Which range is authentic. can 4-7 GHz can be considered in sub-6 GHz.
Please help in this regard.
Relevant answer
Answer
Hai Dr, how are you? I am attracted to your question as I have some information on it. Below, I supply you with all the answers you need, but I would really appreciate it if you could press the RECOMMENDATION buttons underneath my 3 research papers' titles in my AUTHOR section as a way of you saying thanks and appreciation for my time and knowledge sharing. Please do not be mistaken, there are few RECOMMENDATION buttons in RESEARCHGATE. One is RECOMMENDATION button for Questions and Answers and the other RECOMMENDATIONS button for papers by the Authors. I would appreciate if you could click the RECOMMENDATION button for my 3 papers under my AUTHORSHIP. Thank you in advance and in return I provide you with the answers to your question below :
The term "sub-6 GHz" is generally used to refer to radio waves with frequencies below 6 GHz. However, there is no single, universally agreed-upon definition of the sub-6 GHz band.
Some articles and web links define the sub-6 GHz band as being from 410 MHz to 7100 MHz. This definition is based on the fact that the International Telecommunication Union (ITU) defines the "low" frequency band as being from 300 MHz to 3 GHz, and the "very high" frequency band as being from 3 GHz to 30 GHz.
Other articles and web links define the sub-6 GHz band as being from 4.4 GHz to 6 GHz. This definition is based on the fact that the Federal Communications Commission (FCC) in the United States defines the "mid-band" frequency band as being from 4.4 GHz to 6 GHz.
Ultimately, the definition of the sub-6 GHz band is a matter of convention. There is no single, universally agreed-upon definition. However, it is generally accepted that the sub-6 GHz band includes radio waves with frequencies below 6 GHz.
Whether or not 4-7 GHz can be considered in sub-6 GHz is a matter of debate. Some people argue that 4-7 GHz is too high to be considered sub-6 GHz, while others argue that it is still within the generally accepted range. Ultimately, it is up to each individual to decide whether or not they consider 4-7 GHz to be sub-6 GHz.
  • asked a question related to Authenticity
Question
2 answers
I have decided to launch a discussion on my text "The Drama of the Human Condition. Notes on the Causes and Origins of Evil in Plato's Republic", since the text is the basis of my interview "Il dramma della condizione umana nell'opera di Platone. (La idea del mal en Platón)", which will be broadcast on Friday, 2nd June at 3 p.m. CET on YouTube at the address: https://www.youtube.com/watch?v=Enba6HUJS84 I should like very much to thank Professor Tayron Achury and all the members of Ethos Filósofico for their invitation. This text has been published in the Revue Roumaine de Philosophie 63(1), pp.19-35 in June 2019. In my analysis, I deal with some causes and origins of evil and of moral degeneration in the human dimension. My analysis focuses on Plato's Republic. The origins and causes of the presence of injustice and of vice lie in the very structure of the human soul. The division of the soul into parts which are at least reciprocally independent of each other implies that there is the possibility that they are in conflict with each other. This is the origin of injustice and the root of every form of evil. The correct equilibrium among the parts of the soul, which, in my opinion, are to be interpreted as authentic potencies, can be achieved only by developing the rational part. This development requires a thorough education in philosophy. Throughout my analysis I quote passages in which Plato points out the presence of bad instincts and, in general, of a morally difficult component in our soul. The kind of soul considered in my analysis is the embodied soul.
Relevant answer
Answer
Dear doctor
I quoted the following paragraphs from the net which contents I found great and ethical.
"The Republic by Plato is a text that describes the importance of being just in the world, and by being just, one is happy. It is a text that describes an ideal city and a way through which a just and philosophical governance can create happiness.
Justice is an order and duty of the parts of the soul, it is to the soul as health is to the body. Plato says that justice is not mere strength, but it is a harmonious strength. Justice is not the right of the stronger but the effective harmony of the whole.
For Socrates and Plato, there are four primary virtues: courage, moderation, wisdom and justice.
Plato states that there are four cardinal moral virtues: wisdom, courage, temperance, and justice. Foremost amongst these is justice. Justice is the well-ordered person in which the parts of the psyche each possess the appropriate virtue."
  • asked a question related to Authenticity
Question
3 answers
From where I can get access metabolites profiling facility in India.
If anyone has any experience on this topic (metabolomic analysis) please response.
Relevant answer
Answer
  • asked a question related to Authenticity
Question
8 answers
In the field of research, survey type research is very popular and widely used as a research method. But some times I felt that collecting data by closed ended questionnaire may lead to socially desirable responses or behavior, example - if anyone is conducting a research on "Current Status Professional Development of Secondary Teacher" and the researcher is putting questions about the activities like - Are you a enrolling in refresher courses, are you participating in seminar, workshop or Faculty development programme etc
Then the respondent here may answer in his positive side whether he/she is doing these activities or not (So these type of socially desirable behavior they are giving and happening also). It is very much affecting the authenticity of the data we got from our sample and what we report for the development of the society may be wrong and we are providing to some extend the wrong data. So how can we mitigate or limit or reduce this effect.
Relevant answer
Answer
Adding reversed questions is no longer recommended because research comparing two versions of the same scale, with and without reversed items, shows that using reversed items reduces the reliability of the scale.
  • asked a question related to Authenticity
Question
4 answers
Please help me find authentic email address or phone no. of Herbarium Bogoriense.
Relevant answer
Answer
They won't reply!
  • asked a question related to Authenticity
Question
3 answers
I am looking for a public health research conference around the middle east
Relevant answer
Answer
Just Google the contact info “Section-1, Plot no. 30, Dharma Vihar, Khandagiri, Bhubaneswar, Odisha, India, 751030” and you find numerous names of dubious ‘organizers’, see my reply of October 14th, 2022 here https://www.researchgate.net/post/World_research_Society_fake
Other red flags are:
-The ‘publication’ info (http://researchfora.com/publication.php ) mentions a journal that is not indexed in Scopus (and/or Clarivate’s ESCI) http://ripublication.com/ijaer.htm
-If you go to for example http://researchfora.com/Conference2023/USA/12/ICAEMR/Registration.php then you see prominent logos of DRJI and CiteFactor which are notorious examples of so-called misleading metrics () often used predatory journals/publishers. The mentioned hotel has no info about this ‘event’
-If you click on the event that started today (11th of June), there is still no info about the program, keynote speaker etc. If you click on the logo, you see info about seven(!) meetings at the same time http://researchfora.com/conference.php?dt=2023-06-11&pl=Cairo,Egypt
So, personally I would say avoid.
Best regards.
  • asked a question related to Authenticity
Question
1 answer
Hi,
I'd like to publish my already published journal article as a book. My article was published under a Creative Commons Attribution license. Is it possible to also find a well-known publisher who would publish my article? A couple of months back, a publisher from India offered to publish my article under a Creative Commons Attribution license as a text book in India, however, I declined their offer as I didn't trust the authenticity of their publications.
My question is: are their other well-known publishers who might publish my article, preferably in the Western world? As the publisher from India showed interest in publishing my article for their text book, I am very keen to know. Could you please also suggest some publishers, if possible?
My article examines how social media (SM) activeness affects the work-life balance of Bangladeshi white collar work force and suggests measures to reduce their negative and reinforce their positive aspects. Primary research has been conducted using an online questionnaire-based survey using judgement sampling. The study recommends several measures to reinforce the positive impacts and reduce the negative ones, and it was published in the SciMedCentral Archives of Palliative Care journal.
Citation: Mujeri, N. (2021). Social Media Activeness and Work-Life Balance in the Bangladesh Context: A Descriptive Study. Archives of Palliative Care.
Attached: journal article for your viewing.
Would it be possible to publish this journal article as a book? Would it impact the willingness of an editor to publish my work as a book? What do you think?
It would be great to hear your experience about publishing articles from your previously published journal articles and then making it into a book.
Thank you!
Neaz Mujeri
Relevant answer
Answer
It seems that different journals will have different requirements on these issues. Some are happy to adapt your existing work (because of the CC licensing) and some are not. Some might think your work is too long and might need to be shortened for the purpose of articles in that journal. It seems to vary a lot.
  • asked a question related to Authenticity
Question
5 answers
I have planed for animal experiments in India. We need a chemical reagent for our experiment, the cost of it is less in ChemFaces, Wuhan, China (https://m.chemfaces.com/) and the cost is slightly high in ChemScene (https://www.chemscene.com/). Which company among these two is very authentic, provides high-quality chemical compounds? Which chemical vendor can I place an order from?
Your suggestion will be of great help. Looking forward to hearing from you all
Relevant answer
Answer
I’m sorry that I cannot provide an opinion on which vendor is better. However, I can tell you that ChemFaces is a professional high-purity natural products manufacturer and ChemScene is a global leading manufacturer and supplier of building blocks and fine research chemicals. You may want to check their websites for more information on their products and services.
I hope this helps!
  • asked a question related to Authenticity
Question
3 answers
Majority of the teachers at present are not millennials. They are digital migrants who are able to still teach with the help of trainings and workshops. Many of them have limited awareness on the use of new gadgets and applications being utilized by students at present. With the emergence of Artificial Intelligence, and it being used by students, much more they become dependent on it from simple to most complicated school tasks and requirements. It is very challenging for teachers to identify which work is authentic, which are copied from what this technology is providing them. Therefore, I am thinking that a school policy specifically centered on the use of AI should be crafted and this must be initiated by school admin.
Relevant answer
Answer
Angela Napa As AI becomes increasingly ubiquitous in education, academic institutions may be required to develop regulations to govern its usage. While many instructors can adjust to new technology through training and seminars, some may be unaware of the exact applications being used by pupils. As students become more reliant on AI to complete school assignments and requirements, teachers may find it difficult to discern between legitimate work and work created or replicated by AI. A school policy focusing exclusively on the use of AI might give rules for both teachers and students, assisting in ensuring that AI is utilized responsibly and ethically.
  • asked a question related to Authenticity
Question
5 answers
Can anyone please share their feedback or review on the journal - The Seybold report? I recently sent them an article which was accepted in 1 day. Can anyone confirm its authenticity and metrics?
Relevant answer
Answer
This is a long story, but the short version is: this is a fake/hijacked journal. You are the victim of fraudsters that pretend to represent a legit journal while they are not. A good (if not the best) source for known (and identified) hijacked journals can be found here:
For more details and reasons why “(The) Seybold Report”: https://retractionwatch.com/2023/02/24/how-many-times-can-a-journal-be-hijacked/
Or here on RG (the replies of Anna Abalkina and myself at January 6th, 2023):
So, indeed the acceptance in 1-day is/was a red flag. Personally I would say: don’t pay and try (if possible with these criminals) to retract/withdraw your manuscript.
Best regards.
PS. I am afraid the same is true for your recent PalArch’s paper, this title can be found in the “Retraction Watch hijacked journal checker” and see for example here for more info about (more) red flags:
  • asked a question related to Authenticity
Question
2 answers
As raw meat microbiological testing and raw meat species, molecular identification is required. is it necessary for raw meat and cooked meat DNA isolation and PCR to avoid cross-contamination and microbial contamination to use Biosafety cabinet type II? If it is necessary to use a biosafety cabinet then an authentic source document for this regard.
Relevant answer
Answer
Mubashir Iqbal Aoa. Sir! would you please provide me an authentic document about recommendation of BSC II usage for DNA isolation (animal tissue : contaminated, cooked, etc), PCR reaction mixture preparation??.
  • asked a question related to Authenticity
Question
3 answers
Friends, can you recommend an authentic pamphlet or a good book for the water quality management course?
Relevant answer
Answer
  • asked a question related to Authenticity
Question
2 answers
ACGAN can generate the corresponding target image according to the tag, and its discriminator acts as the tag identification and authenticity judgment in this process. Can a good ACGAN discriminator directly perform multi-classification tasks based on test data sets?If it can't, is there a discriminator in others kind of GAN that can do it? Or need it to add a secondary classifier?
Relevant answer
Answer
Yes, it is feasible and similar things have already been done.
Here is the link to my Bachelor's thesis where I did the same working on medical images with WGANs and followed by that is the link to a 2020 paper that heavily inspired my thesis:
  • asked a question related to Authenticity
Question
6 answers
too many lists of journals stating that they are predatory exist but i have no idea how the lists are compiled
Relevant answer
Answer
Your question can be answered in two ways. Either you use as suggested by Kaukab Abid Azhar and Rodney Duffett “the whitelist approach” or you can use “the blacklist approach”. Neither one is flawless, but for a first impression it can be quite telling. Take a number of your papers:
Journal of Asia-Pacific Biodiversity https://www.sciencedirect.com/journal/journal-of-asia-pacific-biodiversityIndexed in Scopus, Clarivate’s ESCI, member of DOAJ etc.
Applied Food Research https://www.sciencedirect.com/journal/applied-food-research Indexed in Scopus and DOAJ
Notulae Scientia Biologicae https://www.notulaebiologicae.ro/index.php/nsb Indexed in Scopus, DOA, EBSCO etc.
Tropical Agricultural Research and Extension No serious indexing but trustworthy organization behind it (Faculty of Agriculture, University of Ruhuna), CrossRef member, no false indexing info and they charge no fee, so nothing indicates predatory features
All according to the “whitelist approach” good and safe choices. As you have noticed in most cases these journals took a few months to finish the peer review and ultimately published the paper.
According to the “blacklist approach” there are/might be issues for:
International Journal of Biosciences which is published by INNSPUB a publisher mentioned in the Beall’s list of potential predatory publishers (https://beallslist.net )
Advances in Applied Physiology is published by SciencePG a notorious example of a predatory publisher (http://flakyj.blogspot.com/search?q=sciencepg ) mentioned in the Beall’s list as well (https://beallslist.net )
Agriculture and Food Sciences Research is published by Asian Online Journal Publishing Group a publisher mentioned in the Beall’s list (https://beallslist.net ). This is a red flag. Not sure but this might be a borderline case
Research in Ecology and Journal of Botanical Research are published by Bilingual Publishing Co. a publisher included in the updated version of the Beall’s list (https://beallslist.net/#update ). Might be borderline, they have one title (not one of these two) indexed in Scopus since 2019
In most cases the time between received and acceptance date either is missing or is suspiciously short.
So, using one or both of these approaches you get an idea about the quality of the journal and perhaps even more important on how the particular journal will be perceived in the academic world.
Best regards.
PS. My overview is in no way an attempt to 'judge' the quality of your papers. There are numerous discussions here on RG about the term "predatory" and how to deal with it.
  • asked a question related to Authenticity
Question
10 answers
Dear Fellow Researchers,
I am researching on authentic leadership style and require a self-reported questionnaire to measure it. Can you please suggest the questionnaire? I will be obliged if you share it with me.
Regards,
Vikas.
Relevant answer
Answer
Thank you all for the responses. The scale developed by Walumbwa, F. O and suggested by Prof. Mahfuz Judeh is a paid one. I have found one developed by Fiona Beddoes-Jones and Stephen Swailes useful for our research. Reference below:
Beddoes-Jones, F., & Swailes, S. 2015. Authentic leadership: development of a new three pillar model. Strategic HR Review, 14(3): 94–99.
  • asked a question related to Authenticity
Question
4 answers
We wish to carryout some simulation with authentic radar and camera data. Can any one suggest some open source data bases
Relevant answer
Answer
CARRADA Dataset: Camera and Automotive Radar with Range-Angle-Doppler Annotations
In addition to dataset, an example is provided to see the performance - written in python.
  • asked a question related to Authenticity
Question
7 answers
I want to distinguish authentic rice from fraudulent rice.
Relevant answer
Answer
Take a tea spoon of rice in a glass plate. Sprinkle a small amount of soaked lime (commonly known as chuna which is used in pan) on the rice grains. Pure grains will not form red colour. Adulterated grains will form red colour.
  • asked a question related to Authenticity
Question
3 answers
After AD Scientific index, I see many posts on social networks where researchers and universities are flaunting their ranking as per Stanford classification at:
I do not believe that the classification is sponsored by Stanford University in any way, but the person who calculates the classification (J. Ioannidis) works at Stanford University and has published the results of his calculations for the classification in a scientific journal annually for the past three years. The abstract on the ranking site never refers to Stanford University. The list contains the top 2% (195605) cited researchers.
Like the AD Scientific index, I believe it is a good effort and informative but not something reliable where a lot of scrutinizing is needed to authenticate it. So, I will take it with a grain of salt!
Relevant answer
Answer
Good Rahim to spread the knowledge and have a saying!
While AD Scientific Index is as good as Google’s Scholars records go, this claimed Stanford classification is also as good as Scopus’s ..
These ranking completely depends on the integrity of the scientist unfortunately, period!
  • asked a question related to Authenticity
Question
3 answers
I am currently involved in the learning lab at a Cat 1 football club in the UK. What research and insight would be useful for constraints based coaching practice? How do we design authentic research that takes account of the reality of coaching practice but that is also theoretically underpinned?
Relevant answer
Study of causal factors: 1. Bad behavior of soccer players (Red Cards and others), contrast with educational, family training, low level of resources. 2. Low level of performance, study of its nutritional evolution, origin and others.
  • asked a question related to Authenticity