{"data":[{"id":"10.5281/zenodo.19601829","type":"dois","attributes":{"doi":"10.5281/zenodo.19601829","identifiers":[{"identifier":"oai:zenodo.org:19601829","identifierType":"oai"},{"identifier":"2583-7192","identifierType":"ISSN"}],"creators":[{"name":"Yadav, Aradhana","nameType":"Personal","givenName":"Aradhana","familyName":"Yadav","affiliation":["Amity University"],"nameIdentifiers":[{"nameIdentifier":"0000-0002-5075-5327","nameIdentifierScheme":"ORCID"}]},{"name":"YADAV, TANVI","nameType":"Personal","givenName":"TANVI","familyName":"YADAV","nameIdentifiers":[{"nameIdentifier":"0000-0003-2294-8655","nameIdentifierScheme":"ORCID"}],"affiliation":[]}],"titles":[{"title":"Detection of Crime Through Artificial Intelligence: Mapping the Forensic Legal Framework in India"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Artificial Intelligence, Criminal Investigation, Forensics, DNA, Legal Framework, India"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"Periodical","resourceType":"","resourceTypeGeneral":"Journal"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601828","relatedIdentifierType":"DOI"},{"relationType":"IsPartOf","relatedIdentifier":"2583-7192","resourceTypeGeneral":"Collection","relatedIdentifierType":"ISSN"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Advancements in robotics and computer science, machines are now able to replicate human behaviour in a variety of challenging tasks, including voice recognition, visual perception, cognitive reasoning, and fast and accurate experience-based learning.  This skill, known as artificial intelligence, is widely used in many different industries. Artificial Intelligence is used by both public and private organizations to detect and stop criminal activity. Furthermore, the field of criminal investigation is progressively integrating AI principles. This integration makes it easier to do thorough criminal investigation, which includes, among other things, DNA profiling, fingerprint analysis, and bloodstain pattern analysis. This makes complex forensic findings easier to understand and facilitates three-dimensional crime scene reconstruction.\n\n ","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601829","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:25:32Z","registered":"2026-04-16T04:25:32Z","published":null,"updated":"2026-04-16T04:25:32Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601828","type":"dois","attributes":{"doi":"10.5281/zenodo.19601828","identifiers":[{"identifier":"2583-7192","identifierType":"ISSN"}],"creators":[{"name":"Yadav, Aradhana","nameType":"Personal","givenName":"Aradhana","familyName":"Yadav","affiliation":["Amity University"],"nameIdentifiers":[{"nameIdentifier":"0000-0002-5075-5327","nameIdentifierScheme":"ORCID"}]},{"name":"YADAV, TANVI","nameType":"Personal","givenName":"TANVI","familyName":"YADAV","nameIdentifiers":[{"nameIdentifier":"0000-0003-2294-8655","nameIdentifierScheme":"ORCID"}],"affiliation":[]}],"titles":[{"title":"Detection of Crime Through Artificial Intelligence: Mapping the Forensic Legal Framework in India"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Artificial Intelligence, Criminal Investigation, Forensics, DNA, Legal Framework, India"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"Periodical","resourceType":"","resourceTypeGeneral":"Journal"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601828","relatedIdentifierType":"DOI"},{"relationType":"IsPartOf","relatedIdentifier":"2583-7192","resourceTypeGeneral":"Collection","relatedIdentifierType":"ISSN"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Advancements in robotics and computer science, machines are now able to replicate human behaviour in a variety of challenging tasks, including voice recognition, visual perception, cognitive reasoning, and fast and accurate experience-based learning.  This skill, known as artificial intelligence, is widely used in many different industries. Artificial Intelligence is used by both public and private organizations to detect and stop criminal activity. Furthermore, the field of criminal investigation is progressively integrating AI principles. This integration makes it easier to do thorough criminal investigation, which includes, among other things, DNA profiling, fingerprint analysis, and bloodstain pattern analysis. This makes complex forensic findings easier to understand and facilitates three-dimensional crime scene reconstruction.\n\n ","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601828","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:25:32Z","registered":"2026-04-16T04:25:32Z","published":null,"updated":"2026-04-16T04:25:32Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601838","type":"dois","attributes":{"doi":"10.5281/zenodo.19601838","identifiers":[{"identifier":"https://www.safecreative.org/work/2603215039667","identifierType":"Other"}],"creators":[{"name":"Olvera Aguilar, Miguel Hilario","nameType":"Personal","givenName":"Miguel Hilario","familyName":"Olvera Aguilar","affiliation":["Centro Multidisciplinario Meriadock Formación y Asesoría A.C."],"nameIdentifiers":[{"nameIdentifier":"0009-0007-1362-4436","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"El método Prometeo: imputación causal para juristas y abogados"}],"publisher":"Centro Multidisciplinario Meriadock Formación y Asesoría A.C.","container":{},"publicationYear":2026,"subjects":[{"subject":"imputación causal"},{"subject":"responsabilidad causal"},{"subject":"grafo causal"},{"subject":"vector de responsabilidad"},{"subject":"índice de sustituibilidad"},{"subject":"derecho penal"},{"subject":"fraude corporativo"},{"subject":"lavado de dinero"}],"contributors":[],"dates":[{"date":"2026-03-21","dateType":"Issued"}],"language":"es","types":{"ris":"BOOK","bibtex":"misc","citeproc":"article","schemaOrg":"Book","resourceType":"","resourceTypeGeneral":"Book"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601838","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution Non Commercial No Derivatives 4.0 International","rightsUri":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-nc-nd-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Manual de aplicación del Método Prometeo dirigido a juristas y abogados, perteneciente a la Colección Método Prometeo de Imputación Causal. Define la imputación causal como la derivada exterior de la segunda mediación: la operación que el sistema realiza desde afuera para atribuir responsabilidad al nodo sin el cual el daño no se habría producido de esa forma específica, con independencia del dolo. Construye el grafo causal, calcula el vector de responsabilidad R*, el índice de sustituibilidad S y el déficit de asunción Δ, produciendo los cuatro documentos del expediente que permiten al tribunal ver con precisión quién sostenía causalmente la cadena. Identifica los tres dominios de mayor potencia del método: fraude corporativo e institucional, prevención de lavado de dinero y delitos financieros complejos, y causalidad múltiple. Delimita explícitamente los casos donde el método no añade valor sobre la evidencia forense convencional.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601838","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:25:26Z","registered":"2026-04-16T04:25:26Z","published":null,"updated":"2026-04-16T04:25:26Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601839","type":"dois","attributes":{"doi":"10.5281/zenodo.19601839","identifiers":[{"identifier":"oai:zenodo.org:19601839","identifierType":"oai"},{"identifier":"https://www.safecreative.org/work/2603215039667","identifierType":"Other"}],"creators":[{"name":"Olvera Aguilar, Miguel Hilario","nameType":"Personal","givenName":"Miguel Hilario","familyName":"Olvera Aguilar","affiliation":["Centro Multidisciplinario Meriadock Formación y Asesoría A.C."],"nameIdentifiers":[{"nameIdentifier":"0009-0007-1362-4436","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"El método Prometeo: imputación causal para juristas y abogados"}],"publisher":"Centro Multidisciplinario Meriadock Formación y Asesoría A.C.","container":{},"publicationYear":2026,"subjects":[{"subject":"imputación causal"},{"subject":"responsabilidad causal"},{"subject":"grafo causal"},{"subject":"vector de responsabilidad"},{"subject":"índice de sustituibilidad"},{"subject":"derecho penal"},{"subject":"fraude corporativo"},{"subject":"lavado de dinero"}],"contributors":[],"dates":[{"date":"2026-03-21","dateType":"Issued"}],"language":"es","types":{"ris":"BOOK","bibtex":"misc","citeproc":"article","schemaOrg":"Book","resourceType":"","resourceTypeGeneral":"Book"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601838","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution Non Commercial No Derivatives 4.0 International","rightsUri":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-nc-nd-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Manual de aplicación del Método Prometeo dirigido a juristas y abogados, perteneciente a la Colección Método Prometeo de Imputación Causal. Define la imputación causal como la derivada exterior de la segunda mediación: la operación que el sistema realiza desde afuera para atribuir responsabilidad al nodo sin el cual el daño no se habría producido de esa forma específica, con independencia del dolo. Construye el grafo causal, calcula el vector de responsabilidad R*, el índice de sustituibilidad S y el déficit de asunción Δ, produciendo los cuatro documentos del expediente que permiten al tribunal ver con precisión quién sostenía causalmente la cadena. Identifica los tres dominios de mayor potencia del método: fraude corporativo e institucional, prevención de lavado de dinero y delitos financieros complejos, y causalidad múltiple. Delimita explícitamente los casos donde el método no añade valor sobre la evidencia forense convencional.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601839","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:25:26Z","registered":"2026-04-16T04:25:26Z","published":null,"updated":"2026-04-16T04:25:26Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601741","type":"dois","attributes":{"doi":"10.5281/zenodo.19601741","identifiers":[],"creators":[{"name":"PROBO PRIBADI S.M","nameType":"Personal","familyName":"PROBO PRIBADI S.M","nameIdentifiers":[{"nameIdentifier":"0009-0002-8804-9185","nameIdentifierScheme":"ORCID"}],"affiliation":[]}],"titles":[{"title":"Pola Asuh Orangtua dan Dampaknya terhadap Perkembangan Emosional serta Aktualisasi Diri"}],"publisher":"NCC Netralnews","container":{},"publicationYear":2026,"subjects":[{"subject":"Pengasuhan"},{"subject":"Emosi"},{"subject":"Aktualisasi"}],"contributors":[{"name":"Taat Ujianto","nameType":"Personal","familyName":"Taat Ujianto","affiliation":["NCC Netralnews"],"contributorType":"Editor","nameIdentifiers":[]}],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-14","dateType":"Submitted"},{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"JOUR","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"JournalArticle"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601741","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"2026 NCC Netralnews - PROBO PRIBADI S.M","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Pengaruh Pengasuhan Masa Kecil terhadap Kematangan Emosional dan Pencapaian Potensi Diri pada Usia Dewasa","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601741","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:25:13Z","registered":"2026-04-16T04:25:13Z","published":null,"updated":"2026-04-16T04:25:13Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601742","type":"dois","attributes":{"doi":"10.5281/zenodo.19601742","identifiers":[{"identifier":"oai:zenodo.org:19601742","identifierType":"oai"}],"creators":[{"name":"PROBO PRIBADI S.M","nameType":"Personal","familyName":"PROBO PRIBADI S.M","nameIdentifiers":[{"nameIdentifier":"0009-0002-8804-9185","nameIdentifierScheme":"ORCID"}],"affiliation":[]}],"titles":[{"title":"Pola Asuh Orangtua dan Dampaknya terhadap Perkembangan Emosional serta Aktualisasi Diri"}],"publisher":"NCC Netralnews","container":{},"publicationYear":2026,"subjects":[{"subject":"Pengasuhan"},{"subject":"Emosi"},{"subject":"Aktualisasi"}],"contributors":[{"name":"Taat Ujianto","nameType":"Personal","familyName":"Taat Ujianto","affiliation":["NCC Netralnews"],"contributorType":"Editor","nameIdentifiers":[]}],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-14","dateType":"Submitted"},{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"JOUR","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"JournalArticle"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601741","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"2026 NCC Netralnews - PROBO PRIBADI S.M","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Pengaruh Pengasuhan Masa Kecil terhadap Kematangan Emosional dan Pencapaian Potensi Diri pada Usia Dewasa","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601742","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:25:13Z","registered":"2026-04-16T04:25:13Z","published":null,"updated":"2026-04-16T04:25:13Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601618","type":"dois","attributes":{"doi":"10.5281/zenodo.19601618","identifiers":[{"identifier":"oai:zenodo.org:19601618","identifierType":"oai"}],"creators":[{"name":"Uppala, Sunny Sowmith","nameType":"Personal","givenName":"Sunny Sowmith","familyName":"Uppala","nameIdentifiers":[],"affiliation":[]},{"name":"Jakkena, Srikar","nameType":"Personal","givenName":"Srikar","familyName":"Jakkena","nameIdentifiers":[],"affiliation":[]},{"name":"Thungathoorthi, Tejaswini","nameType":"Personal","givenName":"Tejaswini","familyName":"Thungathoorthi","nameIdentifiers":[],"affiliation":[]},{"name":"Panuganti, Rahul","nameType":"Personal","givenName":"Rahul","familyName":"Panuganti","nameIdentifiers":[],"affiliation":[]},{"name":"K, Venkateshwar Rao","nameType":"Personal","givenName":"Venkateshwar Rao","familyName":"K","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"Hybrid Approach for the Classification and Detection of Brain Tumor"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Brain Tumor Detection, U-Net, MobileNetV2, Support Vector Machine (SVM), Random Forest, Grad-CAM, Hybrid Learning, Medical Image Segmentation"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"THES","bibtex":"phdthesis","citeproc":"thesis","schemaOrg":"Thesis","resourceType":"","resourceTypeGeneral":"Dissertation"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601617","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"1.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Brain tumors represent one of the most severeneurological disorders and require early detection for effectivetreatment. MRI imaging is widely used because it providesdetailed visualization of soft tissues and tumor structures withoutradiation exposure. Despite its advantages, interpreting MRIscans manually is complex and prone to inter-observer variability.Recent advancements in Artificial Intelligence (AI) and DeepLearning have enabled automated medical image analysis withhigh accuracy. Convolutional Neural Networks (CNNs) havedemonstrated strong performance in feature extraction and classification tasks. However, standalone CNN models often requirelarge datasets and may suffer from overfitting when applied tolimited medical datasets. In recent years, Artificial Intelligence(AI) and Deep Learning have significantly transformed medicalimage analysis. Convolutional Neural Networks (CNNs) havedemonstrated remarkable success in various computer visiontasks, including object detection, segmentation, and classification.In medical imaging, CNN-based architectures have been appliedto detect tumors, segment lesions, and classify disease typeswith high accuracy. Despite these advancements, standalone deeplearning models often face challenges such as overfitting, highcomputational complexity, and limited interpretability. Hybridmodels that combine deep learning feature extraction with classical machine learning classifiers have shown promising resultsin improving generalization performance. Additionally, segmentation of tumor regions before classification can significantlyimprove prediction accuracy by eliminating irrelevant background information. This work proposes a comprehensive hybridarchitecture that integrates: • U-Net for tumor segmentation• MobileNetV2 for transfer learning-based feature extraction• SVM and Random Forest for classification • Grad-CAM forexplainability The proposed approach aims to balance accuracy,computational efficiency, and interpretability in a unified framework.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601618","contentUrl":null,"metadataVersion":1,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:01:25Z","registered":"2026-04-16T04:01:26Z","published":null,"updated":"2026-04-16T04:24:52Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601617","type":"dois","attributes":{"doi":"10.5281/zenodo.19601617","identifiers":[],"creators":[{"name":"Uppala, Sunny Sowmith","nameType":"Personal","givenName":"Sunny Sowmith","familyName":"Uppala","nameIdentifiers":[],"affiliation":[]},{"name":"Jakkena, Srikar","nameType":"Personal","givenName":"Srikar","familyName":"Jakkena","nameIdentifiers":[],"affiliation":[]},{"name":"Thungathoorthi, Tejaswini","nameType":"Personal","givenName":"Tejaswini","familyName":"Thungathoorthi","nameIdentifiers":[],"affiliation":[]},{"name":"Panuganti, Rahul","nameType":"Personal","givenName":"Rahul","familyName":"Panuganti","nameIdentifiers":[],"affiliation":[]},{"name":"K, Venkateshwar Rao","nameType":"Personal","givenName":"Venkateshwar Rao","familyName":"K","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"Hybrid Approach for the Classification and Detection of Brain Tumor"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Brain Tumor Detection, U-Net, MobileNetV2, Support Vector Machine (SVM), Random Forest, Grad-CAM, Hybrid Learning, Medical Image Segmentation"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"THES","bibtex":"phdthesis","citeproc":"thesis","schemaOrg":"Thesis","resourceType":"","resourceTypeGeneral":"Dissertation"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601617","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"1.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Brain tumors represent one of the most severeneurological disorders and require early detection for effectivetreatment. MRI imaging is widely used because it providesdetailed visualization of soft tissues and tumor structures withoutradiation exposure. Despite its advantages, interpreting MRIscans manually is complex and prone to inter-observer variability.Recent advancements in Artificial Intelligence (AI) and DeepLearning have enabled automated medical image analysis withhigh accuracy. Convolutional Neural Networks (CNNs) havedemonstrated strong performance in feature extraction and classification tasks. However, standalone CNN models often requirelarge datasets and may suffer from overfitting when applied tolimited medical datasets. In recent years, Artificial Intelligence(AI) and Deep Learning have significantly transformed medicalimage analysis. Convolutional Neural Networks (CNNs) havedemonstrated remarkable success in various computer visiontasks, including object detection, segmentation, and classification.In medical imaging, CNN-based architectures have been appliedto detect tumors, segment lesions, and classify disease typeswith high accuracy. Despite these advancements, standalone deeplearning models often face challenges such as overfitting, highcomputational complexity, and limited interpretability. Hybridmodels that combine deep learning feature extraction with classical machine learning classifiers have shown promising resultsin improving generalization performance. Additionally, segmentation of tumor regions before classification can significantlyimprove prediction accuracy by eliminating irrelevant background information. This work proposes a comprehensive hybridarchitecture that integrates: • U-Net for tumor segmentation• MobileNetV2 for transfer learning-based feature extraction• SVM and Random Forest for classification • Grad-CAM forexplainability The proposed approach aims to balance accuracy,computational efficiency, and interpretability in a unified framework.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601617","contentUrl":null,"metadataVersion":1,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:01:25Z","registered":"2026-04-16T04:01:26Z","published":null,"updated":"2026-04-16T04:24:52Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601835","type":"dois","attributes":{"doi":"10.5281/zenodo.19601835","identifiers":[{"identifier":"oai:zenodo.org:19601835","identifierType":"oai"}],"creators":[{"name":"Laiba Sarfraz","nameType":"Personal","familyName":"Laiba Sarfraz","affiliation":["Mphil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Faiza Afzal","nameType":"Personal","familyName":"Faiza Afzal","affiliation":["MPhil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Subhan Habib","nameType":"Personal","familyName":"Subhan Habib","affiliation":["MPhil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Dr. Abrar Hussain Qureshi","nameType":"Personal","familyName":"Dr. Abrar Hussain Qureshi","affiliation":["Department of English language and literature, University of Sahiwal, Pakistan."],"nameIdentifiers":[]}],"titles":[{"title":"A Corpus-Based Study of Academic Writing Patterns Among EFL Learners"}],"publisher":"MSI Publishers","container":{},"publicationYear":2026,"subjects":[{"subject":"corpus linguistics, academic writing, EFL learners, learner corpus research, lexical bundles, collocational errors"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-16","dateType":"Accepted"}],"language":"en","types":{"ris":"JOUR","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"JournalArticle"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601834","relatedIdentifierType":"DOI"},{"relationType":"IsPartOf","relatedIdentifier":"3049-0669","resourceTypeGeneral":"Collection","relatedIdentifierType":"ISSN"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"Copyright © 2026, Authors retain copyright. Licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licen ses/by/4.0/ (CC BY 4.0 deed)Community Participation, Transparency and Accountability, Inclusive Representation, Environmental Sustainability","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Abstract\n\nEnglish as a Foreign Language (EFL) learners face persistent challenges in producing academically acceptable written texts. While pedagogical interventions exist, empirical evidence on systematic patterns of lexico-grammatical and rhetorical features in learner corpora remains limited. This study investigates the academic writing patterns of Saudi EFL learners at the university level, focusing on lexical bundles, collocational errors, and rhetorical organization.  A specialized corpus of 200 argumentative essays (approximately 85,000 words) was compiled from intermediate to advanced EFL learners. Using AntConc and LancsBox, frequency lists, keyword analysis, and concordance lines were generated. The corpus was compared against the British Academic Written English (BAWE) corpus as a reference.  Findings reveal three dominant patterns: (1) over-reliance on high-frequency lexical bundles (e.g., on the other hand, as a result, in my opinion), often misused in formal contexts; (2) significant collocational deviations, particularly verb-noun (e.g., make a research instead of do/conduct research) and adjective-noun combinations: and (3) rhetorical patterns showing topic-fronting and informal discourse markers absent in native academic writing. EFL learners systematically transfer spoken discourse features and L1 rhetorical structures into academic writing. The study recommends explicit corpus-informed instruction targeting collocational precision and register awareness.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601835","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:24:14Z","registered":"2026-04-16T04:24:15Z","published":null,"updated":"2026-04-16T04:24:15Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601834","type":"dois","attributes":{"doi":"10.5281/zenodo.19601834","identifiers":[],"creators":[{"name":"Laiba Sarfraz","nameType":"Personal","familyName":"Laiba Sarfraz","affiliation":["Mphil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Faiza Afzal","nameType":"Personal","familyName":"Faiza Afzal","affiliation":["MPhil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Subhan Habib","nameType":"Personal","familyName":"Subhan Habib","affiliation":["MPhil Scholar, University of Sahiwal, Pakistan."],"nameIdentifiers":[]},{"name":"Dr. Abrar Hussain Qureshi","nameType":"Personal","familyName":"Dr. Abrar Hussain Qureshi","affiliation":["Department of English language and literature, University of Sahiwal, Pakistan."],"nameIdentifiers":[]}],"titles":[{"title":"A Corpus-Based Study of Academic Writing Patterns Among EFL Learners"}],"publisher":"MSI Publishers","container":{},"publicationYear":2026,"subjects":[{"subject":"corpus linguistics, academic writing, EFL learners, learner corpus research, lexical bundles, collocational errors"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-16","dateType":"Accepted"}],"language":"en","types":{"ris":"JOUR","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"JournalArticle"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601834","relatedIdentifierType":"DOI"},{"relationType":"IsPartOf","relatedIdentifier":"3049-0669","resourceTypeGeneral":"Collection","relatedIdentifierType":"ISSN"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"Copyright © 2026, Authors retain copyright. Licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licen ses/by/4.0/ (CC BY 4.0 deed)Community Participation, Transparency and Accountability, Inclusive Representation, Environmental Sustainability","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Abstract\n\nEnglish as a Foreign Language (EFL) learners face persistent challenges in producing academically acceptable written texts. While pedagogical interventions exist, empirical evidence on systematic patterns of lexico-grammatical and rhetorical features in learner corpora remains limited. This study investigates the academic writing patterns of Saudi EFL learners at the university level, focusing on lexical bundles, collocational errors, and rhetorical organization.  A specialized corpus of 200 argumentative essays (approximately 85,000 words) was compiled from intermediate to advanced EFL learners. Using AntConc and LancsBox, frequency lists, keyword analysis, and concordance lines were generated. The corpus was compared against the British Academic Written English (BAWE) corpus as a reference.  Findings reveal three dominant patterns: (1) over-reliance on high-frequency lexical bundles (e.g., on the other hand, as a result, in my opinion), often misused in formal contexts; (2) significant collocational deviations, particularly verb-noun (e.g., make a research instead of do/conduct research) and adjective-noun combinations: and (3) rhetorical patterns showing topic-fronting and informal discourse markers absent in native academic writing. EFL learners systematically transfer spoken discourse features and L1 rhetorical structures into academic writing. The study recommends explicit corpus-informed instruction targeting collocational precision and register awareness.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601834","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:24:14Z","registered":"2026-04-16T04:24:15Z","published":null,"updated":"2026-04-16T04:24:15Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19600533","type":"dois","attributes":{"doi":"10.5281/zenodo.19600533","identifiers":[{"identifier":"oai:zenodo.org:19600533","identifierType":"oai"}],"creators":[{"name":"Ihentuge, Uchechukwu","nameType":"Personal","givenName":"Uchechukwu","familyName":"Ihentuge","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"Canonical Operator-Theoretic Framework: Formal Resolution of Two Millennium Prize Problems (Riemann, BSD), the abc \u0026 Twin Prime Conjectures, within an Unconditional Unification of Number Theory"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19600532","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"This submission contains a complete suite of nine formal mathematical manuscripts establishing the Canonical Operator-Theoretic Framework. By introducing the Multiplicity-One Lock and PT-Symmetric operator topology, this architecture yields unconditional proofs for two Millennium Prize Problems and over sixteen of the most historically significant classical conjectures in mathematics.\n\nThe framework rigorously and unconditionally resolves: the Riemann Hypothesis (Millennium Problem), the Birch and Swinnerton-Dyer Conjecture (Millennium Problem), the Generalized Riemann Hypothesis, the Finiteness of the Shafarevich-Tate Group, the abc Conjecture, the Beal Conjecture, the Twin Prime Conjecture, Fermat's Last Theorem, Catalan's Conjecture, Pillai's Conjecture, Szpiro's Conjecture, the Erdős-Woods Conjecture, the Brocard-Ramanujan Equation, Goldbach's Conjecture, Polignac's Conjecture, Legendre's Conjecture, Landau's Fourth Problem ($n^2+1$), and the Linear Bateman-Horn (Prime $k$-tuples) Conjecture.\n\nAs an independent, cohesive theoretical architecture, it forms a strictly unconditional unification of analytic, elliptic, and diophantine number theory.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19600533","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T01:15:06Z","registered":"2026-04-16T01:15:07Z","published":null,"updated":"2026-04-16T04:22:53Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19600532","type":"dois","attributes":{"doi":"10.5281/zenodo.19600532","identifiers":[],"creators":[{"name":"Ihentuge, Uchechukwu","nameType":"Personal","givenName":"Uchechukwu","familyName":"Ihentuge","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"Canonical Operator-Theoretic Framework: Formal Resolution of Two Millennium Prize Problems (Riemann, BSD), the abc \u0026 Twin Prime Conjectures, within an Unconditional Unification of Number Theory"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19600532","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"This submission contains a complete suite of nine formal mathematical manuscripts establishing the Canonical Operator-Theoretic Framework. By introducing the Multiplicity-One Lock and PT-Symmetric operator topology, this architecture yields unconditional proofs for two Millennium Prize Problems and over sixteen of the most historically significant classical conjectures in mathematics.\n\nThe framework rigorously and unconditionally resolves: the Riemann Hypothesis (Millennium Problem), the Birch and Swinnerton-Dyer Conjecture (Millennium Problem), the Generalized Riemann Hypothesis, the Finiteness of the Shafarevich-Tate Group, the abc Conjecture, the Beal Conjecture, the Twin Prime Conjecture, Fermat's Last Theorem, Catalan's Conjecture, Pillai's Conjecture, Szpiro's Conjecture, the Erdős-Woods Conjecture, the Brocard-Ramanujan Equation, Goldbach's Conjecture, Polignac's Conjecture, Legendre's Conjecture, Landau's Fourth Problem ($n^2+1$), and the Linear Bateman-Horn (Prime $k$-tuples) Conjecture.\n\nAs an independent, cohesive theoretical architecture, it forms a strictly unconditional unification of analytic, elliptic, and diophantine number theory.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19600532","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T01:15:06Z","registered":"2026-04-16T01:15:07Z","published":null,"updated":"2026-04-16T04:22:53Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.58054/mediadesignschool.23504484","type":"dois","attributes":{"doi":"10.58054/mediadesignschool.23504484","identifiers":[],"creators":[{"name":"Chooi, Don","givenName":"Don","familyName":"Chooi","affiliation":["Media Design School"],"nameIdentifiers":[{"schemeUri":"https://orcid.org","nameIdentifier":"https://orcid.org/0000-0002-3735-8028","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"Conversations with my Ghost"}],"publisher":"Media Design School","container":{},"publicationYear":2026,"subjects":[{"subject":"Visual arts","schemeUri":"http://www.abs.gov.au/ausstats/abs@.nsf/0/6BB427AB9696C225CA2574180004463E","subjectScheme":"ANZSRC Fields of Research","classificationCode":"3606"},{"subject":"Visual communication design (incl. graphic design)","schemeUri":"http://www.abs.gov.au/ausstats/abs@.nsf/0/6BB427AB9696C225CA2574180004463E","subjectScheme":"ANZSRC Fields of Research","classificationCode":"330316"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Created"},{"date":"2026-04-16","dateType":"Updated"},{"date":"2022-06-19","dateType":"Issued"}],"language":null,"types":{"ris":"BOOK","bibtex":"book","citeproc":"book","schemaOrg":"Book","resourceType":"Book","resourceTypeGeneral":"Book"},"relatedIdentifiers":[],"relatedItems":[],"sizes":["0 Bytes"],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"What happens when our loved ones pass away? More importantly, what happens to the ones who are left behind? Do we get swept away with emotions like grief, anger or sadness? Or are we drowned in them?This graphic novel tells the story of Tommy, an Asian gay man living in New Zealand, and how he deals with his grief when his partner of 15 years, passes away suddenly. What he originally thought was a safe and ordinary world, is suddenly thrown into chaos and Tommy questions his very identity and spirituality.Set between reality and the dreamscape, Tommy attempts to navigate through his emotions and tries to make sense of the loss. Would he succeed in coming to terms with his grief, or would he lose himself in the process?The abstract:‘Conversations with a Ghost’ is a semi-autobiographical graphic novel written and illustrated by Don Chooi. Having experienced the death of his life partner of 15 years in 2018, this author struggled with his grief and being unable to come to terms with the loss. This 144 page graphic novel investigates his relationship with the person after his passing, and dealing with the vacuum that is left behind. Through shared experiences with the gay community, specifically the bear sub-genre, Don realised that there is much still to say about the level of grief felt from a gay perspective. ‘Conversations with a Ghost’ is inspired not only by the author’s personal journey but also by these stories. The story takes place after the events in Don’s previous graphic novel, ‘Homebound’ (2017) (Chooi, 2017b). It is a tale of surrender and reconciliation with the grief of losing a loved one, as told from the lens of an Asian gay man who left his family in Malaysia and made a home in New Zealand. It is a profound and poignant work that gives a nod to this author’s culture, sexuality and spirituality.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://mediadesignschool.figshare.com/articles/book/Conversations_with_my_Ghost/23504484","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2026-04-16T04:22:04Z","registered":"2026-04-16T04:22:05Z","published":null,"updated":"2026-04-16T04:22:05Z"},"relationships":{"client":{"data":{"id":"mds.figshare","type":"clients"}}}},{"id":"10.58054/mediadesignschool.23504484.v1","type":"dois","attributes":{"doi":"10.58054/mediadesignschool.23504484.v1","identifiers":[],"creators":[{"name":"Chooi, Don","givenName":"Don","familyName":"Chooi","affiliation":["Media Design School"],"nameIdentifiers":[{"schemeUri":"https://orcid.org","nameIdentifier":"https://orcid.org/0000-0002-3735-8028","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"Conversations with my Ghost"}],"publisher":"Media Design School","container":{},"publicationYear":2026,"subjects":[{"subject":"Visual arts","schemeUri":"http://www.abs.gov.au/ausstats/abs@.nsf/0/6BB427AB9696C225CA2574180004463E","subjectScheme":"ANZSRC Fields of Research","classificationCode":"3606"},{"subject":"Visual communication design (incl. graphic design)","schemeUri":"http://www.abs.gov.au/ausstats/abs@.nsf/0/6BB427AB9696C225CA2574180004463E","subjectScheme":"ANZSRC Fields of Research","classificationCode":"330316"}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Created"},{"date":"2026-04-16","dateType":"Updated"},{"date":"2022-06-19","dateType":"Issued"}],"language":null,"types":{"ris":"BOOK","bibtex":"book","citeproc":"book","schemaOrg":"Book","resourceType":"Book","resourceTypeGeneral":"Book"},"relatedIdentifiers":[{"relationType":"IsIdenticalTo","relatedIdentifier":"10.58054/mediadesignschool.23504484","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":["0 Bytes"],"formats":[],"version":"1","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"What happens when our loved ones pass away? More importantly, what happens to the ones who are left behind? Do we get swept away with emotions like grief, anger or sadness? Or are we drowned in them?This graphic novel tells the story of Tommy, an Asian gay man living in New Zealand, and how he deals with his grief when his partner of 15 years, passes away suddenly. What he originally thought was a safe and ordinary world, is suddenly thrown into chaos and Tommy questions his very identity and spirituality.Set between reality and the dreamscape, Tommy attempts to navigate through his emotions and tries to make sense of the loss. Would he succeed in coming to terms with his grief, or would he lose himself in the process?The abstract:‘Conversations with a Ghost’ is a semi-autobiographical graphic novel written and illustrated by Don Chooi. Having experienced the death of his life partner of 15 years in 2018, this author struggled with his grief and being unable to come to terms with the loss. This 144 page graphic novel investigates his relationship with the person after his passing, and dealing with the vacuum that is left behind. Through shared experiences with the gay community, specifically the bear sub-genre, Don realised that there is much still to say about the level of grief felt from a gay perspective. ‘Conversations with a Ghost’ is inspired not only by the author’s personal journey but also by these stories. The story takes place after the events in Don’s previous graphic novel, ‘Homebound’ (2017) (Chooi, 2017b). It is a tale of surrender and reconciliation with the grief of losing a loved one, as told from the lens of an Asian gay man who left his family in Malaysia and made a home in New Zealand. It is a profound and poignant work that gives a nod to this author’s culture, sexuality and spirituality.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://mediadesignschool.figshare.com/articles/book/Conversations_with_my_Ghost/23504484/1","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2026-04-16T04:22:04Z","registered":"2026-04-16T04:22:05Z","published":null,"updated":"2026-04-16T04:22:05Z"},"relationships":{"client":{"data":{"id":"mds.figshare","type":"clients"}}}},{"id":"10.5281/zenodo.19601832","type":"dois","attributes":{"doi":"10.5281/zenodo.19601832","identifiers":[],"creators":[{"name":"Hatamova, Dilshoda","nameType":"Personal","givenName":"Dilshoda","familyName":"Hatamova","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"SHAXSNING OILA MUHITIDA VA JAMIYATDA SHAKLLANISHI"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"RPRT","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"Text"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601832","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Ushbu maqolada shaxsning shakllanish jarayonida oila va jamiyatning o‘rni yoritiladi. Oila muhitining bola tarbiyasiga ta’siri, jamiyatdagi ijtimoiy munosabatlar va zamonaviy axborot vositalarining shaxs rivojiga ko‘rsatadigan ta’siri tahlil qilinadi. Shuningdek, barkamol shaxsni tarbiyalashda muhim omillar haqida fikr yuritiladi.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601832","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:21:48Z","registered":"2026-04-16T04:21:48Z","published":null,"updated":"2026-04-16T04:21:48Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601833","type":"dois","attributes":{"doi":"10.5281/zenodo.19601833","identifiers":[{"identifier":"oai:zenodo.org:19601833","identifierType":"oai"}],"creators":[{"name":"Hatamova, Dilshoda","nameType":"Personal","givenName":"Dilshoda","familyName":"Hatamova","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"SHAXSNING OILA MUHITIDA VA JAMIYATDA SHAKLLANISHI"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"RPRT","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"","resourceTypeGeneral":"Text"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601832","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Ushbu maqolada shaxsning shakllanish jarayonida oila va jamiyatning o‘rni yoritiladi. Oila muhitining bola tarbiyasiga ta’siri, jamiyatdagi ijtimoiy munosabatlar va zamonaviy axborot vositalarining shaxs rivojiga ko‘rsatadigan ta’siri tahlil qilinadi. Shuningdek, barkamol shaxsni tarbiyalashda muhim omillar haqida fikr yuritiladi.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601833","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:21:48Z","registered":"2026-04-16T04:21:48Z","published":null,"updated":"2026-04-16T04:21:48Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19599598","type":"dois","attributes":{"doi":"10.5281/zenodo.19599598","identifiers":[{"identifier":"oai:zenodo.org:19599598","identifierType":"oai"}],"creators":[{"name":"Sandalo, C. S. S.","nameType":"Personal","givenName":"C. S. S.","familyName":"Sandalo","affiliation":["Independent Scholar with Ecclesiastical Theological Formation from FETSU;  President of the Evangelical Faculty of Theology United Seminary (interdenominational institution of historical origin founded in 1916 – Rio de Janeiro, Brazil); Policy Advisor to the Special Secretariat for Inclusion, Rio de Janeiro City Hall;"],"nameIdentifiers":[{"nameIdentifier":"0009-0008-2883-0619","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"The Sufficient Mirror Paradox: A proposed model for understanding the substitution of the friction of the real by the fluency of the code"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Sufficient Mirror Theory (SMT); human–machine coupling; cognitive friction; extended cognition; cognitive offloading; mental state projection; digital behavior; human–AI interaction; low-friction environments; Parasitic Flow; coupling entropy; epistemic vigilance; infinite scroll."}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-16","dateType":"Issued"}],"language":"en","types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19599597","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"v1.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"Copyright (C) 2026 C. S. S. Sandalo","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Abstract:This paper introduces the Sufficient Mirror Paradox (SMP) and the Sufficient Mirror Theory (SMT), a conceptual framework for analyzing the erosion of human agency mediated by high-fluency technological systems. Drawing on Daniel Kahneman’s dual-process theory and the Extended Mind Thesis (Clark \u0026 Chalmers), the author explores how the elimination of cognitive friction leads to \"Parasitic Flow\" and the emergence of the \"Humanrithm.\" The study postulates that as systems become \"sufficiently\" predictive, the subject’s epistemic vigilance is traded for cognitive comfort, resulting in a structural dilution of the autonomous Self.\n\nTechnical Description:A conceptual framework (SMT) for analyzing the paradox of entropic symbiosis in human-machine coupling and its cognitive and behavioral effects.\n\nProject Website: https://www.sufficientmirror.com","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19599598","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:21:24Z","registered":"2026-04-16T04:21:24Z","published":null,"updated":"2026-04-16T04:21:24Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19599597","type":"dois","attributes":{"doi":"10.5281/zenodo.19599597","identifiers":[],"creators":[{"name":"Sandalo, C. S. S.","nameType":"Personal","givenName":"C. S. S.","familyName":"Sandalo","affiliation":["Independent Scholar with Ecclesiastical Theological Formation from FETSU;  President of the Evangelical Faculty of Theology United Seminary (interdenominational institution of historical origin founded in 1916 – Rio de Janeiro, Brazil); Policy Advisor to the Special Secretariat for Inclusion, Rio de Janeiro City Hall;"],"nameIdentifiers":[{"nameIdentifier":"0009-0008-2883-0619","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"The Sufficient Mirror Paradox: A proposed model for understanding the substitution of the friction of the real by the fluency of the code"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"Sufficient Mirror Theory (SMT); human–machine coupling; cognitive friction; extended cognition; cognitive offloading; mental state projection; digital behavior; human–AI interaction; low-friction environments; Parasitic Flow; coupling entropy; epistemic vigilance; infinite scroll."}],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"},{"date":"2026-04-16","dateType":"Issued"}],"language":"en","types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19599597","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"v1.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"},{"rights":"Copyright (C) 2026 C. S. S. Sandalo","rightsUri":"http://rightsstatements.org/vocab/InC/1.0/"}],"descriptions":[{"description":"Abstract:This paper introduces the Sufficient Mirror Paradox (SMP) and the Sufficient Mirror Theory (SMT), a conceptual framework for analyzing the erosion of human agency mediated by high-fluency technological systems. Drawing on Daniel Kahneman’s dual-process theory and the Extended Mind Thesis (Clark \u0026 Chalmers), the author explores how the elimination of cognitive friction leads to \"Parasitic Flow\" and the emergence of the \"Humanrithm.\" The study postulates that as systems become \"sufficiently\" predictive, the subject’s epistemic vigilance is traded for cognitive comfort, resulting in a structural dilution of the autonomous Self.\n\nTechnical Description:A conceptual framework (SMT) for analyzing the paradox of entropic symbiosis in human-machine coupling and its cognitive and behavioral effects.\n\nProject Website: https://www.sufficientmirror.com","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19599597","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:21:24Z","registered":"2026-04-16T04:21:24Z","published":null,"updated":"2026-04-16T04:21:24Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601837","type":"dois","attributes":{"doi":"10.5281/zenodo.19601837","identifiers":[{"identifier":"oai:zenodo.org:19601837","identifierType":"oai"}],"creators":[{"name":"cperaltac03","nameType":"Personal","familyName":"cperaltac03","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"cperaltac03/ResilienceModelPoC: ResilienceModelPoC"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"COMP","bibtex":"misc","citeproc":"article","schemaOrg":"SoftwareSourceCode","resourceType":"","resourceTypeGeneral":"Software"},"relatedIdentifiers":[{"relationType":"IsSupplementTo","relatedIdentifier":"https://github.com/cperaltac03/ResilienceModelPoC/tree/v1.0.0","resourceTypeGeneral":"Software","relatedIdentifierType":"URL"},{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601836","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"v1.0.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"First version for the Resilience Model for PIA-01","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601837","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:21:07Z","registered":"2026-04-16T04:21:07Z","published":null,"updated":"2026-04-16T04:21:07Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601836","type":"dois","attributes":{"doi":"10.5281/zenodo.19601836","identifiers":[],"creators":[{"name":"cperaltac03","nameType":"Personal","familyName":"cperaltac03","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"cperaltac03/ResilienceModelPoC: ResilienceModelPoC"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"COMP","bibtex":"misc","citeproc":"article","schemaOrg":"SoftwareSourceCode","resourceType":"","resourceTypeGeneral":"Software"},"relatedIdentifiers":[{"relationType":"IsSupplementTo","relatedIdentifier":"https://github.com/cperaltac03/ResilienceModelPoC/tree/v1.0.0","resourceTypeGeneral":"Software","relatedIdentifierType":"URL"},{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601836","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"v1.0.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"First version for the Resilience Model for PIA-01","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601836","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:21:07Z","registered":"2026-04-16T04:21:07Z","published":null,"updated":"2026-04-16T04:21:07Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601757","type":"dois","attributes":{"doi":"10.5281/zenodo.19601757","identifiers":[{"identifier":"https://www.safecreative.org/work/2603144933128","identifierType":"Other"}],"creators":[{"name":"Olvera Aguilar, Miguel Hilario","nameType":"Personal","givenName":"Miguel Hilario","familyName":"Olvera Aguilar","affiliation":["Centro Multidisciplinario Meriadock Formación y Asesoría A.C."],"nameIdentifiers":[{"nameIdentifier":"0009-0007-1362-4436","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"El juego de las máscaras o la disforia de la identidad"}],"publisher":"Centro Multidisciplinario Meriadock Formación y Asesoría A.C.","container":{},"publicationYear":2026,"subjects":[{"subject":"disforia de la identidad"},{"subject":"autodeterminación causal"},{"subject":"modulación"},{"subject":"enmascaramiento"},{"subject":"impostura"},{"subject":"rendición"},{"subject":"filosofía del sujeto"}],"contributors":[],"dates":[{"date":"2026-03-14","dateType":"Issued"}],"language":"es","types":{"ris":"BOOK","bibtex":"misc","citeproc":"article","schemaOrg":"Book","resourceType":"","resourceTypeGeneral":"Book"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601757","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution Non Commercial No Derivatives 4.0 International","rightsUri":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-nc-nd-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Tercer volumen de la trilogía de autodeterminación causal, perteneciente a la Colección Reivindicación Ontológica del Ego. Examina el mecanismo por el cual el ego genuino es desplazado por una suma fáctica que actúa como si fuera el sujeto, produciendo actos que no pasaron por su voluntad. Desarrolla la teoría de la disforia de la identidad y establece la distinción entre modulación —el código social que el ego genuino elige para relacionarse— e impostura —la máscara que reemplaza al ego cuando la voluntad no está en la cadena. Argumenta que el enmascaramiento no es una condición de los neurodivergentes sino la condición humana: el mundo es una mascarada en la que los participantes han olvidado que llevan disfraz. A través de Odiseo —el hombre que supo ser nadie por el tiempo exacto que su vida dependió de serlo— traza el arco del retorno al ego genuino mediante la rendición, la vanidad soberana, la imputación causal y el encuentro sin negociación.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601757","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:20:20Z","registered":"2026-04-16T04:20:21Z","published":null,"updated":"2026-04-16T04:20:21Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601831","type":"dois","attributes":{"doi":"10.5281/zenodo.19601831","identifiers":[{"identifier":"oai:zenodo.org:19601831","identifierType":"oai"}],"creators":[{"name":"DDUKHAE","nameType":"Personal","familyName":"DDUKHAE","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"DDUKHAE/ComfyQSAR: ComfyQSAR v1.0.0"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"COMP","bibtex":"misc","citeproc":"article","schemaOrg":"SoftwareSourceCode","resourceType":"","resourceTypeGeneral":"Software"},"relatedIdentifiers":[{"relationType":"IsSupplementTo","relatedIdentifier":"https://github.com/DDUKHAE/ComfyQSAR/tree/ComfyQSAR","resourceTypeGeneral":"Software","relatedIdentifierType":"URL"},{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601830","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"ComfyQSAR","rightsList":[{"rights":"GNU General Public License v3.0 only","rightsUri":"https://www.gnu.org/licenses/gpl-3.0-standalone.html","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"gpl-3.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"This is the software version associated with the Bioinformatics submission\n\nBenchmark and case-study reproducibility datasets are archived separately\n\nInstallation and usage documentation remain in the repository README","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601831","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:20:20Z","registered":"2026-04-16T04:20:21Z","published":null,"updated":"2026-04-16T04:20:21Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601830","type":"dois","attributes":{"doi":"10.5281/zenodo.19601830","identifiers":[],"creators":[{"name":"DDUKHAE","nameType":"Personal","familyName":"DDUKHAE","nameIdentifiers":[],"affiliation":[]}],"titles":[{"title":"DDUKHAE/ComfyQSAR: ComfyQSAR v1.0.0"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[],"contributors":[],"dates":[{"date":"2026-04-16","dateType":"Issued"}],"language":null,"types":{"ris":"COMP","bibtex":"misc","citeproc":"article","schemaOrg":"SoftwareSourceCode","resourceType":"","resourceTypeGeneral":"Software"},"relatedIdentifiers":[{"relationType":"IsSupplementTo","relatedIdentifier":"https://github.com/DDUKHAE/ComfyQSAR/tree/ComfyQSAR","resourceTypeGeneral":"Software","relatedIdentifierType":"URL"},{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601830","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"ComfyQSAR","rightsList":[{"rights":"GNU General Public License v3.0 only","rightsUri":"https://www.gnu.org/licenses/gpl-3.0-standalone.html","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"gpl-3.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"This is the software version associated with the Bioinformatics submission\n\nBenchmark and case-study reproducibility datasets are archived separately\n\nInstallation and usage documentation remain in the repository README","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601830","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":2,"versionOfCount":1,"created":"2026-04-16T04:20:21Z","registered":"2026-04-16T04:20:21Z","published":null,"updated":"2026-04-16T04:20:21Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.19601758","type":"dois","attributes":{"doi":"10.5281/zenodo.19601758","identifiers":[{"identifier":"oai:zenodo.org:19601758","identifierType":"oai"},{"identifier":"https://www.safecreative.org/work/2603144933128","identifierType":"Other"}],"creators":[{"name":"Olvera Aguilar, Miguel Hilario","nameType":"Personal","givenName":"Miguel Hilario","familyName":"Olvera Aguilar","affiliation":["Centro Multidisciplinario Meriadock Formación y Asesoría A.C."],"nameIdentifiers":[{"nameIdentifier":"0009-0007-1362-4436","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"El juego de las máscaras o la disforia de la identidad"}],"publisher":"Centro Multidisciplinario Meriadock Formación y Asesoría A.C.","container":{},"publicationYear":2026,"subjects":[{"subject":"disforia de la identidad"},{"subject":"autodeterminación causal"},{"subject":"modulación"},{"subject":"enmascaramiento"},{"subject":"impostura"},{"subject":"rendición"},{"subject":"filosofía del sujeto"}],"contributors":[],"dates":[{"date":"2026-03-14","dateType":"Issued"}],"language":"es","types":{"ris":"BOOK","bibtex":"misc","citeproc":"article","schemaOrg":"Book","resourceType":"","resourceTypeGeneral":"Book"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.19601757","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":null,"rightsList":[{"rights":"Creative Commons Attribution Non Commercial No Derivatives 4.0 International","rightsUri":"https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-nc-nd-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Tercer volumen de la trilogía de autodeterminación causal, perteneciente a la Colección Reivindicación Ontológica del Ego. Examina el mecanismo por el cual el ego genuino es desplazado por una suma fáctica que actúa como si fuera el sujeto, produciendo actos que no pasaron por su voluntad. Desarrolla la teoría de la disforia de la identidad y establece la distinción entre modulación —el código social que el ego genuino elige para relacionarse— e impostura —la máscara que reemplaza al ego cuando la voluntad no está en la cadena. Argumenta que el enmascaramiento no es una condición de los neurodivergentes sino la condición humana: el mundo es una mascarada en la que los participantes han olvidado que llevan disfraz. A través de Odiseo —el hombre que supo ser nadie por el tiempo exacto que su vida dependió de serlo— traza el arco del retorno al ego genuino mediante la rendición, la vanidad soberana, la imputación causal y el encuentro sin negociación.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.19601758","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-04-16T04:20:20Z","registered":"2026-04-16T04:20:20Z","published":null,"updated":"2026-04-16T04:20:20Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}},{"id":"10.5281/zenodo.18790204","type":"dois","attributes":{"doi":"10.5281/zenodo.18790204","identifiers":[{"identifier":"oai:zenodo.org:18790204","identifierType":"oai"}],"creators":[{"name":"Liu, Ran","nameType":"Personal","givenName":"Ran","familyName":"Liu","affiliation":["UniBridgeAI"],"nameIdentifiers":[{"nameIdentifier":"0000-0003-4133-320X","nameIdentifierScheme":"ORCID"}]}],"titles":[{"title":"Eight Universal Methodology Paradigms (UM8): A Cross-Domain Framework for Complex Problem Solving"}],"publisher":"Zenodo","container":{},"publicationYear":2026,"subjects":[{"subject":"complex problem solving"},{"subject":"Methodology","subjectScheme":"GEMET"},{"subject":"meta-control"},{"subject":"universal methodology paradigms"},{"subject":"methodological framework"},{"subject":"paradigm selection"},{"subject":"paradigm interaction matrix"},{"subject":"cross-domain methodology"},{"subject":"multi-paradigm design"},{"subject":"methodological design space"},{"subject":"route selection"},{"subject":"AI workflows"},{"subject":"interdisciplinary transfer"},{"subject":"transformation"},{"subject":"inversion"},{"subject":"optimization"},{"subject":"probabilistic modeling"},{"subject":"rule-based system"},{"subject":"fusion"},{"subject":"evolutionary"},{"subject":"simulation"}],"contributors":[],"dates":[{"date":"2026-02-26","dateType":"Issued"}],"language":null,"types":{"ris":"FIGURE","bibtex":"misc","citeproc":"graphic","schemaOrg":"ImageObject","resourceType":"Figure","resourceTypeGeneral":"Image"},"relatedIdentifiers":[{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.18903246","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.18962806","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19032968","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19109098","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19152305","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19250879","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19351919","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"HasPart","relatedIdentifier":"10.5281/zenodo.19451866","resourceTypeGeneral":"Image","relatedIdentifierType":"DOI"},{"relationType":"IsVersionOf","relatedIdentifier":"10.5281/zenodo.18790203","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"v1.0","rightsList":[{"rights":"Creative Commons Attribution 4.0 International","rightsUri":"https://creativecommons.org/licenses/by/4.0/legalcode","schemeUri":"https://spdx.org/licenses/","rightsIdentifier":"cc-by-4.0","rightsIdentifierScheme":"SPDX"}],"descriptions":[{"description":"Researchers and practitioners now confront complex problems amid an expanding landscape of methods, models, and techniques. A central difficulty is deciding, before substantial design commitments are made, which solution logic should govern the organization of the problem. Relevant approaches are dispersed across disciplines, expressed through local vocabularies, and embedded in field-specific technical traditions. The solution logics underlying these approaches are therefore difficult to compare and select within a large, fragmented method space. Early route choices shape how the problem is formulated, what counts as evidence, how uncertainty is represented, which trade-offs become central, and which forms of intervention remain available downstream. Once work proceeds under a selected route, later refinement may improve performance within its organizing logic, but it rarely restores alternatives excluded when the problem was first structured.\n\nThe Eight Universal Methodology Paradigms framework, abbreviated as UM8, is proposed to support early methodological comparison and route design. At the overview level, it organizes recurrent solution logics into eight paradigms: Transformation-based, Optimization-based, Probabilistic-based, Inversion-based, Rule-based, Fusion-based, Simulation-based, and Evolutionary-based. The overview places major methodological alternatives in a common comparative space for complex problem solving. Many complex problems, however, cannot be adequately addressed within a single paradigm. The Paradigm Interaction Matrix extends the framework from paradigm identification to route composition by specifying how paradigms can be structurally combined. In this integrated form, the framework provides an upper-level structure for constructing, comparing, and refining composite routes before design becomes tied to specific technical implementations.\n\nUM8 operates at an intermediate level of abstraction. It remains close enough to problem structure to guide design directly, yet sufficiently independent of particular solvers, algorithms, and disciplinary toolkits to support stable comparison across domains. In this framework, a paradigm denotes a family of primary solution logics. A route denotes the methodological organization of work at a chosen unit of analysis. It specifies a leading paradigm family, any supporting paradigms that enter in defined roles, and the trade-offs that organize their combination. This is the level at which alternative solution logics remain explicitly comparable before they are translated into lower-level technical choices.\n\nAn Extensible, Multi-Scale Architecture\n\nUM8 is structured as an extensible, multi-scale methodology architecture whose layers serve distinct functions at different levels of resolution.\n\nAt the Overview Layer, Figure 1 maps the eight paradigms. Each paradigm is presented through a characteristic mode of thinking, a concise functional definition, and a trigger indicating when that it becomes especially relevant. This layer provides orientation. It makes the major forms of methodological organization visible at the paradigm level and establishes a common comparative space before local implementation commitments dominate the design.\n\nAt the Composition Layer, Figure 2 makes cross-paradigm composition explicit. This layer becomes necessary when a problem cannot be adequately organized within a single paradigm and the route must instead be constructed through the coordinated entry of multiple paradigms. Read from row to column, the matrix identifies canonical operator relations through which one paradigm can support, constrain, extend, stabilize, or modify another at the level of structural role. It therefore shows how paradigms can be combined and what role each one plays within a composite route.\n\nAt the Compass Layer, each module opens the internal design space of one paradigm. It identifies the design decisions that must be made if that paradigm is to organize a task in a disciplined way. These modules make explicit the dimensions along which a route must be specified, so that the paradigm can be instantiated, refined, and revised before implementation begins. The Compass Layer therefore supports design and planning at the route level. It clarifies how a chosen paradigm should be structured, what kinds of commitments it requires, and which decisions must be settled before lower-level technique selection becomes meaningful.\n\nThe hierarchical modular design supports movement across levels as the task requires: the overview for orientation, the interaction matrix for composition, Compass modules for paradigm-specific design, and future zoom-in modules for finer-grained specialization and domain-specific adaptation. Different layers of the framework evolve at different rates. This allows the framework to preserve the stability of its upper-level structure while absorbing faster-moving methods, models, and algorithms at lower levels.\n\nHow the Framework Was Developed\n\nUM8 was developed through iterative abstraction from concrete problem-solving methods and research practices, followed by cross-domain consolidation and refinement across broader disciplinary traditions. The aim was to recover recurrent methodological families that remain legible across changing terminology, technical implementation, and local problem-solving traditions. The framework operates at the level where diverse methods can be reinterpreted through more stable families of solution logic and placed within the same upper-level structure. At this level, existing methods become comparable within one framework, and new advances can be incorporated without repeated reconstruction of the framework.\n\nCore Significance\n\nThe central contribution of UM8 lies in the upper-level methodological structure it makes explicit and stabilizes. Much problem-solving knowledge remains embedded in disciplinary terminology, local technical packaging, and field-specific traditions. UM8 reorganizes that knowledge at an upper methodological level, where diverse methods can be understood through more stable solution logics and retained within a common comparative structure. In this form, methodological knowledge can remain comparable, composable, transferable, and cumulative across problems, domains, and changing technical contexts. This foundational contribution structures the practice of complex problem solving across its successive stages.\n\nPractical Value\n\nThis upper-level structure enable researchers and practitioners to identify a primary route at the framing stage, compose additional routes during solution design, preserve route rationale as implementations change, and convert local advances into methodological knowledge that remains usable across fields.\n\n1. Early route orientation. UM8 creates a comparative space in which major paradigms can be assessed before lower-level implementation choices begin to govern design. This makes route selection more deliberate and expands the range of alternatives that become genuinely visible. Paradigms that would otherwise remain obscured by disciplinary packaging can enter the same frame and be evaluated alongside more familiar options.\n\n2. Explicit multi-paradigm composition. Many complex problems require more than one paradigm. The Paradigm Interaction Matrix makes these combinations explicit by specifying how supporting paradigms enter and how their interaction modifies the primary route. The pairwise cross-paradigm relations provide a structured basis from which more complex routes can be built through chaining. Once route composition is represented in this way, composite designs become easier to inspect, diagnose, and revise. Multi-paradigm integration thus becomes an explicit architectural design problem whose structure can be tracked and improved over time. \n\n3. Preservation of route rationale across technical change. Complex projects often outlast the tools, models, libraries, and implementation patterns through which they are first realized. What is easily lost over time is the reasoning that made a route appropriate in the first place. UM8 preserves that rationale by making route structure explicit: which paradigm carries the main burden, which additional paradigms enter in supporting roles, and which trade-offs those choices are meant to manage. Technical instantiations can then change without dissolving the logic of the route itself. This supports stronger continuity across revision, maintenance, redevelopment, and technical replacement. \n\n4. Cross-domain accumulation of methodological knowledge. Once methodological structure has been made explicit above local terminology, advances developed in one setting become easier to recognize, reinterpret, and reuse in another. This changes what can be retained from problem-solving work. Knowledge that would otherwise remain sealed within disciplinary packaging can instead enter a more stable upper-level structure, where it can be compared with related developments, adapted under new constraints, and carried into new domains. UM8 thus turns local methodological advances into reusable methodological assets and supports a more cumulative form of learning across fields. This explicit structure also provides a stable foundation for future machine-readable schemas and agent-oriented meta-policy learning.\n\nThe Anatomy of the Framework\n\nEight Universal Methodology Paradigms (Overview Map) \n\nFigure 1 provides the overview map of the Eight Universal Methodology Paradigms at the paradigm-family level. At its center are four high-leverage cognitive operators: Decomposition, Abstraction, Integration, and Reasoning. These operators recur across all eight paradigms. What differs from one paradigm to another is the methodological stance through which they are operationalized.\n\nTo keep the overview stable and legible, each paradigm in Figure 1 is expressed through a role-separated structure:\n\n\n\nParadigm Name: the stable unit of methodological classification\n\nThinking: the higher-level cognitive stance that anchors the paradigm beyond any toolchain\n\nDefinition: the function description of what the paradigm-family does\n\nTrigger: the selection cue indicating when the paradigm is especially useful\n\nTag: the compact handle that supports rapid scanning and cross-domain mapping\n\n\nThe 8 Paradigm Summaries:\n\n1. Transformation-based\n\nTransformation-based methodology is useful when the main obstacle lies in the current form of the problem. The object may need to be reformulated, recoded, decomposed, moved into another frame, or conceptually reframed before a workable route becomes available. The distinctive strength is that it opens new routes by changing form itself.\n\nZoom-in module: Transformation Compass (DOI: 10.5281/zenodo.19351919) develops the Transformation paradigm through Transformation Purpose, Transformation Object, Transformation Approach, and Preservation Commitment.\n\n2. Optimization-based\n\nOptimization-based methodology becomes central when the task requires disciplined choice under explicit criteria and admissibility conditions. It is most relevant when the problem demands calibration, allocation, scheduling, configuration, or control, and when success depends on defining what counts as better and what counts as acceptable. The central difficulty lies in structuring selection itself. This paradigm turns choice into a formally organized selection process.\n\nZoom-in module: Optimization Compass (DOI: 10.5281/zenodo.19451866) develops the Optimization paradigm through Optimization Role, Problem Architecture, and Solution Logic.\n\n3. Probabilistic-based\n\nProbabilistic-based methodology is appropriate whenever uncertainty must be represented explicitly and carried through reasoning. It becomes especially important when latent structure must be inferred, forecasts must be made under incomplete information, or action must be taken under risk. When ambiguity is part of the problem itself and cannot be treated as a secondary complication, this paradigm makes uncertainty tractable in a mathematically disciplined way.\n\nZoom-in module: Probabilistic Compass (DOI: 10.5281/zenodo.19032968) develops the Probabilistic paradigm through Purpose, Probabilistic Formulation, and Inference Scheme.\n\n4. Inversion-based\n\nInversion-based methodology is appropriate when the object of interest is hidden and must be recovered indirectly from its observable effects. It becomes central in settings where causes, states, parameters, or governing structure cannot be accessed directly and must be recovered from observations generated by a forward process. Its value lies in organizing backward reasoning under conditions of incomplete and often ill-posed evidence.\n\nZoom-in module: Inversion Compass (DOI: 10.5281/zenodo.19109098) develops the Inversion-based paradigm through Inversion Objective, Forward Model Class, Inversion Stabilization, and Inversion Approach.\n\n5. Rule-based\n\nRule-based methodology is appropriate when a problem requires explicit governance through codified constraints, priorities, judgments, or procedures. It becomes especially relevant in settings where admissibility, accountability, procedural consistency, or controllability depend on keeping the governing logic inspectable and revisable. This paradigm is well suited to systems that must retain explicit control over how conclusions are authorized, how exceptions are handled, and how actions are triggered. The key advantage is the codification of operational logic into a form that can be examined, maintained, and reorganized directly.\n\nZoom-in module: Rule Compass (DOI: 10.5281/zenodo.19152305) develops the Rule-based paradigm through Rule Function, Rule Type, Rule Representation, and Execution Pattern.\n\n6. Fusion-based\n\nFusion-based methodology becomes relevant when no single source, model, or perspective is sufficient and the problem depends on combining heterogeneous parts into a coherent whole. It is especially useful when information is partial, perspectives differ, components disagree, or different sources must be made to work together in order to achieve coverage, robustness, coherence, or new capability. The core contribution is that it treats fusion as a design problem in its own right.\n\nZoom-in module: Fusion Compass (DOI: 10.5281/zenodo.18962806) develops the Fusion paradigm through Fusion Purpose, Fusion Locus, and Fusion Integration Logic.\n\n7. Simulation-based\n\nSimulation-based methodology is appropriate when a problem must be examined through a constructed model world because direct experimentation is too costly, too dangerous, too slow, or unavailable. It becomes especially useful when the task requires scenario analysis, counterfactual exploration, projection under uncertainty, calibration against evidence, or decision support under dynamic conditions. Its main strength is enabling structured indirect experimentation when direct manipulation cannot adequately probe the system.\n\nZoom-in module: Simulation Compass (DOI: 10.5281/zenodo.18903246) develops the Simulation paradigm through Purpose, World Modeling Approach, and Execution Protocol.\n\n8. Evolutionary-based\n\nEvolutionary-based methodology becomes central when progress depends on organized change across time. It is especially useful in settings where adaptation, iterative improvement, transfer, selective retention, or continued revision matter more than one-shot optimization or static design. It organizes adaptation and change across time when the route itself must evolve or remain open to changing conditions.\n\nZoom-in module: Evolutionary Compass (DOI: 10.5281/zenodo.19250879) develops the Evolutionary paradigm through Evolutionary Role, Update Architecture, and Carryover Logic.\n\nThese eight paradigms define eight primary solution logics for complex problem solving. Each paradigm is distinguished by a different primary mode of intervention: changing form, structuring choice under explicit criteria, reasoning under uncertainty, recovering hidden structure, governing behavior through explicit rules, integrating heterogeneous parts, interrogating a model world, or organizing adaptive change across time. Some problems are best approached through one dominant paradigm, while others require a coordinated route drawing on several paradigms. The framework provides a stable basis for identifying which paradigm should carry the principle methodological burden in a given task, which paradigms should enter in supporting roles, and where cross-paradigm composition is likely to produce additional explanatory, operational, or design value.\n\nParadigm Interaction Matrix (Composition Grammar)\n\nFigure 2 provides the compositional layer of the framework. It should be read from row to column. The row paradigm contributes an additional methodological logic, while the column paradigm retains the primary organizing logic of the route. Each cell names a canonical operator family that specifies how the row paradigm enters that route in a defined structural role. The matrix thereby makes cross-paradigm composition explicit and extends the framework from paradigm identification to route composition. Each cell represents a first-order pairwise composition, but the compositional grammar of the matrix extends beyond two-paradigm routes. These operator families are intentionally canonical and non-exhaustive. They provide a stable upper-level grammar through which pairwise relations can be chained, nested, or hierarchically combined into larger multi-paradigm routes while keeping the role of each paradigm legible within the composite architecture.\n\nThis compositional layer preserves the rationale of hybrid routes in explicit form. It makes composite architectures easier to inspect, communicate, revise, and extend across design, maintenance, and transfer. Once compositional choices are represented in this way, complex routes can be diagnosed and reconfigured while preserving the methodological role of each participating paradigm. This explicit representation is also valuable for agentic systems, where route composition must remain traceable, decomposable, and revisable during planning and re-planning.\n\nHow to Use the Framework (Exploit vs. Explore)\n\nThe framework functions as a navigation scaffold for flexible route selection, composition, and revision. It supports both efficient default routing (Exploit: prioritizing reliability) and structured methodological discovery (Explore: prioritizing novelty).\n\nStep 1: Identify dominant tensions (at your chosen granularity).\n\nWrite down 2–3 key tensions for your current task.\n\n\n\n\n\nExploit: Pick the most rigidly constraining tension to address first.\n\n\n\n\nExplore: Pick the most uncertain or ambiguous tension to challenge.\n\n\n\nStep 2: Select a base paradigm (Figure 1).\n\nChoose one base paradigm that organizes the solution route around your chosen tension.\n\n\n\n\n\nExploit: Start with the literature-default or your historically proven paradigm for that tension.\n\n\n\n\nExplore: Generate 1–2 alternative base paradigms that are plausible but non-default.\n\n\n\nStep 3: Compose 0–2 supporting paradigms (Figure 2, Row → Column).\n\nAdd supporting paradigms only to address the base paradigm leaves an important burden unresolved or when the route requires an additional structural role.\n\n\n\n\n\nExploit: Keep the stack minimal. Add at most one necessary augmenter.\n\n\n\n\nExplore: Test an alternative composition or an unconventional augmenter that targets a different structural trade-off.\n\n\n\nStep 4: Record rationale and iterate under change.\n\nLog the route explicitly at the paradigm-family level (Base + Augmenters + Intended Trade-offs).\n\n\n\n\n\nExploit: Keep the log short and stable to guide immediate execution.\n\n\n\n\nExplore: Explicitly record shifts in trade-offs and evaluate why the alternative route performed better or worse.\n\n\n\nWho This is For\n\nThis record is for researchers and practitioners working on complex problems where methodological routes are difficult to compare explicitly, trade-offs are difficult to assess clearly, multi-paradigm solutions must be composed deliberately, and route rationale must remain stable as implementations evolve. It makes paradigm choice and composition explicit, comparable, and revisable without prescribing any single implementation.\n\nAI Workflows and Autonomous Agents\n\nBeyond human decision support, the framework also aligns naturally with AI workflows in which systems must select, compose, and revise tool-use strategies under operational constraints. In agentic settings, the UM8 paradigms can serve as a compact vocabulary for meta-control, while the interaction matrix provides a structural basis for future machine-readable composition.\n\nNote: This record focuses on the human-readable overview layer. Machine-readable schemas and operational interfaces for AI agents will be released as separate artifacts.","descriptionType":"Abstract"}],"geoLocations":[],"fundingReferences":[],"url":"https://zenodo.org/doi/10.5281/zenodo.18790204","contentUrl":null,"metadataVersion":49,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"api","isActive":true,"state":"findable","reason":null,"viewCount":0,"downloadCount":0,"referenceCount":0,"citationCount":0,"partCount":8,"partOfCount":0,"versionCount":0,"versionOfCount":1,"created":"2026-02-26T17:42:49Z","registered":"2026-02-26T17:42:49Z","published":null,"updated":"2026-04-16T04:20:06Z"},"relationships":{"client":{"data":{"id":"cern.zenodo","type":"clients"}}}}],"meta":{"total":4451552,"totalPages":400,"page":1},"links":{"self":"https://api.datacite.org/dois?query=publicationYear%3A2026+AND+NOT+types.resourceTypeGeneral%3ADataset","next":"https://api.datacite.org/dois?page%5Bnumber%5D=2\u0026page%5Bsize%5D=25\u0026query=publicationYear%3A2026+AND+NOT+types.resourceTypeGeneral%3ADataset"}}