added publications
This commit is contained in:
parent
766e0962db
commit
2c6e71c042
41
content/blog/ug_diss_faq.md
Normal file
41
content/blog/ug_diss_faq.md
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
---
|
||||||
|
author: Jeremy Kidwell
|
||||||
|
date: "2018-03-27"
|
||||||
|
#layout: post
|
||||||
|
slug: ug_diss_faq
|
||||||
|
status: publish
|
||||||
|
title: Undergraduate Dissertation FAQ
|
||||||
|
categories:
|
||||||
|
- FAQ
|
||||||
|
- UG teaching
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
One of the joys of my work is to supervise bright and highly motivated undergraduates on a year-long dissertation project. This post will serve as a periodically updated guide to working with me as a supervisor on a UG dissertation at UOB.
|
||||||
|
|
||||||
|
Last updated:
|
||||||
|
|
||||||
|
Undergraduate Dissertation FAQ
|
||||||
|
|
||||||
|
1. When is the thesis due
|
||||||
|
|
||||||
|
2. How do supervisions work?
|
||||||
|
|
||||||
|
We meet once a month, for a total of 7 meetings (the first is for planning and subsequent meetings are to discuss progress). For each of the subsequent six supervisions, I'll expect you to send me some form of written work that we can use as the basis for our discussion no less than 3 working days in advance of our meeting. Ideally, we should schedule these meetings in advance so you can plan towards these deadlines as writing milestones. You should also bear in mind that supervisors are not allowed to review written work in the final month of your dissertation period, though in light of what I note below, this shouldn't be an issue as hopefully by this time you'll be an independent writer!
|
||||||
|
|
||||||
|
3. What kind of supervisor am I?
|
||||||
|
|
||||||
|
Of all the work you'll complete during your degree programme, the dissertation is the piece of work which you have the most ownership over. On the basis of this, I approach supervisions as a kind of coaching - I will be ready to answer any questions you have that have arisen during your research and writing, whether about writing mechanics, the research process, or about your topic more specifically. I will also raise probing questions for you, drawing on examples from written work I have been able to review in order to highlight problems or issues more broadly for you as a writer. I will not provide a proofreading service (you should recruit a good friend or two to help with this), so you should always bear in mind that mark-up and feedback is not comprehensive. I expect you to take notes from our discussions and then review your work to find all the areas where my feedback may be relevant.
|
||||||
|
|
||||||
|
4. How do I format my bibliography? Citations? Title Page? Table of contents...
|
||||||
|
|
||||||
|
We have a flexible policy regarding citation style, it's up to you to choose the one that you are most familiar with and then apply that style consistently throughout your dissertation. Please note - I will not serve as a reference for specific aspects of formatting. This is one of the aspects of independent research you should master early on in your research journey (if you haven't already). Each major referencing style has a styleguide which covers all the intricacies of formatting as well as other aspects including table of contents formatting, headings, and really anything you could possibly imagine. Given how frequently you may have questions about this, you should strongly consider purchasing a paperback copy of the style guide. Most frequently used styles, in order of my personal preference are:
|
||||||
|
|
||||||
|
a. Chicago Style (a.k.a. Turabian)
|
||||||
|
|
||||||
|
Generally favoured by Theology, Religious Studies, History, and Philosophy Chicago has both short and long form versions. As above, you can pick one.
|
||||||
|
|
||||||
|
|
||||||
|
Online guide: http://www.chicagomanualofstyle.org/home.html
|
||||||
|
|
||||||
|
5. How many books should I read for a dissertation?
|
32
content/presentations/201803_data_security.md
Executable file
32
content/presentations/201803_data_security.md
Executable file
|
@ -0,0 +1,32 @@
|
||||||
|
---
|
||||||
|
date: 2018-03-14T12:00:00+01:00
|
||||||
|
title: "Digital Research Conversations: Security"
|
||||||
|
host: "Birmingham Environment for Academic Research"
|
||||||
|
publishdate: 2017-03-10
|
||||||
|
---
|
||||||
|
|
||||||
|
I'll be presenting as part of a panel on digital security and scholarly research this March as part of a series Birmingha Uni's BEAR group has been hosting on "Digital Research Conversations." I'll be presenting from 12:35-12:50. You can get [tickets here.](https://www.eventbrite.com/e/digital-research-conversations-data-security-peeping-through-the-great-digital-wall-tickets-42452940889).
|
||||||
|
|
||||||
|
You can view my [slides for the presentation here:](https://jeremykidwell.info/files/presentations/presentation_201803_data_security.html)
|
||||||
|
|
||||||
|
Slido for Q&A for the session [is here:](https://app.sli.do/event/qxi2apio) (event code: 7088).
|
||||||
|
|
||||||
|
Here's the official blurb:
|
||||||
|
|
||||||
|
>Digital Research Conversations (#UoBDigRes): 14th March 2018
|
||||||
|
Data Security ‘Peeping Through the Great Digital Wall’
|
||||||
|
Computer Centre (Committee Room), Elms Rd, 12-2 pm
|
||||||
|
|
||||||
|
>With so much attention being given to data security, should we just carry on as normal or do we become paranoid?
|
||||||
|
|
||||||
|
>The second in our series of Digital Research Conversations, we will look at data security from the varied angles of our provocative and engaging speakers, leading to a stimulating conversation.
|
||||||
|
|
||||||
|
>Data security both refers to preventing unauthorised access to computers, databases and websites but also to protecting data from corruption. When looking after data, researchers need to consider; Do you have permission to keep it, re-use it or advertise it? What risks are involved as an individual researcher or as an institution if we lose data, or if the data we re-use is not reliable? Whether we have created data, purchased it or downloaded it; the data we keep is the building blocks of our research.
|
||||||
|
|
||||||
|
>Jeremy Kidwell, previously a Network security manager and now a lecturer in Theological Ethics, will propose the use of security in the overzealous world.
|
||||||
|
|
||||||
|
>Ian Batten is part of the Security and Privacy Group, Computer Science where he currently lectures on ‘where computer security and networks meet’.
|
||||||
|
|
||||||
|
>David W. Evans is a clinician and expert in musculoskeletal pain based in Sports Science. Being involved in collecting patient data, David is concerned about the new Data Protection laws (GDPR) starting in May and how it is going to affect researchers.
|
||||||
|
|
||||||
|
>We will also be joined by Alberto Guglielmi for the panel session. As Project Officer for GDPR within Legal Services, he will be able to answer questions regarding data protection.
|
8
content/presentations/201803_xn_academic_netwrk.md
Executable file
8
content/presentations/201803_xn_academic_netwrk.md
Executable file
|
@ -0,0 +1,8 @@
|
||||||
|
---
|
||||||
|
date: 2018-03-10T13:35:00+01:00
|
||||||
|
title: "Theological Insights on AI – Big Data and Self-learning in Social Research"
|
||||||
|
host: "Christian Academic Network (C-A-N-)"
|
||||||
|
publishdate: 2017-03-10
|
||||||
|
---
|
||||||
|
|
||||||
|
I'll be presenting as part of a workshop this March on Theological responses to AI, hosted by the [Christian Academic Network](http://christianacademicnetwork.net). Download the event [flyer here](https://jeremykidwell.info/files/misc/2018_AI_Conference.pdf). Download full text, [with links, here: as a PDF](https://jeremykidwell.info/files/presentations/ai_presentation_can_march18.pdf).
|
12
content/presentations/201805_cryptocurrency_ethics.md
Executable file
12
content/presentations/201805_cryptocurrency_ethics.md
Executable file
|
@ -0,0 +1,12 @@
|
||||||
|
---
|
||||||
|
date: 2018-05-31T12:00:00+01:00
|
||||||
|
title: "Crypto-currency and anarcho-crypto-capitalism: has technology made Anarchism a feasible political option (at last)?"
|
||||||
|
host: "Global Ethics Conference: A Post-liberal World?"
|
||||||
|
publishdate: 2017-03-10
|
||||||
|
---
|
||||||
|
|
||||||
|
I'll be presenting a paper at the [Conference of the Centre for Global Ethics](https://globalethics2018.weebly.com) - which has the theme this year of "A Post-liberal World?"
|
||||||
|
|
||||||
|
My paper title is: "Crypto-currency and anarcho-crypto-capitalism: has technology made Anarchism a feasible political option (at last)?" Here's the abstract for anyone who is curious (slides and notes will be posted asap):
|
||||||
|
|
||||||
|
> One major problem for ethicists and political philosophers is the cultivation of "hope" – expanding the horizons of what options seem possible, particularly in the midst of oppressive neo-liberal regimes. Too often liberal democracy is seen as a lesser evil, or greatest but nonetheless quite modest possible political good. Some of this deference to the “modestly effective good” comes in the wake of the many preferred (radical) alternatives which are simply (and justifiably) dismissed as "impossible". Given the massive population of modern states in many instances, a persistent argument against more communitarian or anarchist political arrangements has been that of scale. Communitarians from Aristotle to Macintyre convey an awareness that the notion of radical democracy and the forms of consensus and inclusion which they imply simply do not scale past a certain critical mass of human participation. In this paper, I will explore the possibility which has been mooted by many techno-futurists that newly available digital technologies – particularly the federated blockchain which lies behind the recent innovation of bitcoins – may open up new and more participatory political horizons in the form of automated algorithmic contracts. The paper will include a brief introduction to the technology and a survey of some of the techno-futurist rhetoric which has begun to emerge in mainstream media outlets and then conclude with an assessment of blockchain as a political tool.
|
16
content/publications/2018_restoration_principles.md
Executable file
16
content/publications/2018_restoration_principles.md
Executable file
|
@ -0,0 +1,16 @@
|
||||||
|
---
|
||||||
|
title: "On principles and standards in ecological restoration"
|
||||||
|
author: Eric Higgs, Jim Harris, Stephen Murphy, Keith Bowers, Richard Hobbs, Willis Jenkins, Jeremy Kidwell, Nikita Lopoukhine, Bethany Sollereder, Katherine Suding, Allen Thompson, Steven Whisenant
|
||||||
|
status: Published
|
||||||
|
type: published
|
||||||
|
citation: "“On principles and standards in ecological restoration” in <em>Restoration Ecology</em>, 2018"
|
||||||
|
tag: restoration-ecology
|
||||||
|
subjects: restoration-ecology
|
||||||
|
comments: no
|
||||||
|
file: Higgs_et_al-2017-Restoration_Ecology.pdf
|
||||||
|
date: 2018-03-01
|
||||||
|
publishdate: 2018-03-24
|
||||||
|
doi: https://doi.org/10.1111/rec.12691
|
||||||
|
---
|
||||||
|
|
||||||
|
The Society for Ecological Restoration (SER) has long debated how to define best practices. We argue that a principles‐first approach offers more flexibility for restoration practitioners than a standards‐based approach, is consistent with the developmental stage of restoration, and functions more effectively at a global level. However, the solution is not as simple as arguing that one approach to professional practice is sufficient. Principles and standards can and do operate effectively together, but only if they are coordinated in a transparent and systematic way. Effective professional guidance results when standards anchored by principles function in a way that is contextual and evolving. Without that clear relation to principles, the tendency to promote performance standards may lead to a narrowing of restoration practice and reduction in the potential to resolve very difficult and diverse ecological and environmental challenges. We offer recommendations on how the evolving project of restoration policy by SER and other agencies and organizations can remain open and flexible.
|
15
content/publications/2018_science_religion_debate.md
Executable file
15
content/publications/2018_science_religion_debate.md
Executable file
|
@ -0,0 +1,15 @@
|
||||||
|
---
|
||||||
|
title: "What are the ethical implications of the science-and-religion debate?"
|
||||||
|
author: Jeremy Kidwell
|
||||||
|
status: Published
|
||||||
|
type: published
|
||||||
|
citation: "“What are the ethical implications of the science-and-religion debate?” in <em>Philosophy, Science and Religion for Everyone</em>, ed. Duncan Pritchard and Mark Harris, Routledge, 2018, pp. 149-159"
|
||||||
|
tag: environmental-ethics
|
||||||
|
subjects: climate-change religion-science-debate
|
||||||
|
comments: no
|
||||||
|
file: religion_science_chapter_rev2.pdf
|
||||||
|
date: 2017-07-28
|
||||||
|
publishdate: 2017-07-28
|
||||||
|
---
|
||||||
|
|
||||||
|
What are the ethics of the modern debates between science and religion? In this chapter I suggest that there are actually a range of different ways that the debate between religion and science might be described as ethical. I note several ways that science and religion are brought into relationship in professional scientific ethics and suggest that within the space of professional scientific ethics there has been a tendency to sideline or absorb religious ethical perspectives. I then turn to more constructive "big issue" ethics and examine two specific cases: embryonic stem cell research and climate change in order to highlight ways that science and religion can sometimes be reduced to stereotypes: that scientists work with the real world and religion deals with ideas (and not reality!). I argue that looking more closely at the range of perspectives represented by scientists and religious leaders in both cases presents a much more complex case and that this in turn commends a kind of ethics which should be jointly pursued by both science and religion.
|
15
content/publications/2018_temporality_activism.md
Executable file
15
content/publications/2018_temporality_activism.md
Executable file
|
@ -0,0 +1,15 @@
|
||||||
|
---
|
||||||
|
title: "Temporality and Christian Environmental Activism"
|
||||||
|
author: Jeremy Kidwell and Michael S. Northcott
|
||||||
|
status: Published
|
||||||
|
type: published
|
||||||
|
citation: "“Temporality and Christian Environmental Activism” in <em>Greening of Religion: Hope in the Eye of the Storm</em>, ed. Jonathan Leader, Cherry Hill Seminary Press, 2018, pp. 167-175"
|
||||||
|
tag: environmental-ethics
|
||||||
|
subjects: climate-change temporality
|
||||||
|
comments: no
|
||||||
|
file: temporality_and_activism.pdf
|
||||||
|
date: 2018-03-01
|
||||||
|
publishdate: 2018-01-31
|
||||||
|
---
|
||||||
|
|
||||||
|
In this book, Michael and I share some results from fieldwork (2014-2016) with members of Eco-Congregation Scotland particularly towards testing for ways that conceptions of time have an impact on the way that Scottish Christians respond to an issue like climate change.
|
BIN
static/files/papers/Higgs_et_al-2017-Restoration_Ecology.pdf
Normal file
BIN
static/files/papers/Higgs_et_al-2017-Restoration_Ecology.pdf
Normal file
Binary file not shown.
BIN
static/files/papers/religion_science_chapter_rev2.pdf
Normal file
BIN
static/files/papers/religion_science_chapter_rev2.pdf
Normal file
Binary file not shown.
BIN
static/files/papers/temporality_and_activism.pdf
Normal file
BIN
static/files/papers/temporality_and_activism.pdf
Normal file
Binary file not shown.
Binary file not shown.
BIN
static/files/presentations/ai_presentation_can_march18.pdf
Normal file
BIN
static/files/presentations/ai_presentation_can_march18.pdf
Normal file
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,201 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Digital Research Conversations: How to do Digital Research Without Data Security</title>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<style>
|
||||||
|
@import url(https://fonts.googleapis.com/css?family=Yanone+Kaffeesatz);
|
||||||
|
@import url(https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic);
|
||||||
|
@import url(https://fonts.googleapis.com/css?family=Ubuntu+Mono:400,700,400italic);
|
||||||
|
|
||||||
|
body { font-family: 'Droid Serif'; }
|
||||||
|
h1, h2, h3 {
|
||||||
|
font-family: 'Yanone Kaffeesatz';
|
||||||
|
font-weight: normal;
|
||||||
|
}
|
||||||
|
.remark-code, .remark-inline-code { font-family: 'Ubuntu Mono'; }
|
||||||
|
.footnote {
|
||||||
|
position: absolute;
|
||||||
|
bottom: 3em;
|
||||||
|
font-size: small;
|
||||||
|
}
|
||||||
|
.red { color: #fa0000; }
|
||||||
|
/* Two-column layout */
|
||||||
|
.left-column {
|
||||||
|
width: 50%;
|
||||||
|
float: left;
|
||||||
|
}
|
||||||
|
.right-column {
|
||||||
|
width: 49%;
|
||||||
|
float: right;
|
||||||
|
padding-top: 0em;
|
||||||
|
margin-top: 0em;
|
||||||
|
text-align: left;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<textarea id="source">
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
# Jeremy Kidwell
|
||||||
|
## University of Birmingham, School of Philosophy, Theology and Religion
|
||||||
|
### "How to do Digital Research Without Data Security?"
|
||||||
|
|
||||||
|
14 Mar 2018
|
||||||
|
Digital Research Conversations
|
||||||
|
|
||||||
|
.footnote[Email: [j.kidwell@bham.ac.uk](mailto:j.kidwell@bham.ac.uk) • Twitter [@kidwellj](https://twitter.com/kidwellj)]
|
||||||
|
|
||||||
|
???
|
||||||
|
|
||||||
|
Engineered to use remark: https://github.com/gnab/remark/wiki
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
Why do we need data security?
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# Let's review!
|
||||||
|
|
||||||
|
### Major Data breaches in 2017, [compliments of wikipedia](https://en.wikipedia.org/wiki/List_of_data_breaches):
|
||||||
|
(at least, the ones we know about)
|
||||||
|
|
||||||
|
Uber - 57,000,000 records
|
||||||
|
Heathrow Airport - 2.5 gigabytes
|
||||||
|
Deloitte
|
||||||
|
Equifax - 143,000,000 records
|
||||||
|
|
||||||
|
Also: The Pizza Hut app, Sonic Drive-In, HBO (internal documents), Ethereum Cryptocurrency, USA Nuclear Power Plants, Petya and WannaCry ransomware (Honda factory in Japan and traffic cameras in Australia), Disney, Emmanuel Macron, CNN...
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Major University Data breaches in 2016 ([the Rasputin SQLi hack](https://www.recordedfuture.com/recent-rasputin-activity/))
|
||||||
|
|
||||||
|
- University of Cambridge
|
||||||
|
- University of Oxford
|
||||||
|
- Architectural Association School of Architecture
|
||||||
|
- University of Chester
|
||||||
|
- University of Leeds
|
||||||
|
- Coleg Gwent
|
||||||
|
- University of Glasgow
|
||||||
|
- University of the Highlands and Islands
|
||||||
|
- University of the West of England
|
||||||
|
- The University of Edinburgh
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
### As researchers, we help ".red[vulnerable people]" tell their stories.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
## We do this, in part by anonymising our data sets.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: middle
|
||||||
|
|
||||||
|
### But does "anonymised" data stay that way?
|
||||||
|
|
||||||
|
See deanonymising studies:
|
||||||
|
- [Melissa Gymrek, Amy L. McGuire, David Golan, Eran Halperin, Yaniv Erlich, "Identifying Personal Genomes by Surname Inference"](http://science.sciencemag.org/content/339/6117/321) (on anonymised human genome data sets)
|
||||||
|
- Arvind Narayanan and Vitaly Shmatikov, ["Robust De-anonymization of Large Sparse Datasets"](http://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf) (on anonymisedNetflix subscriber data)
|
||||||
|
- Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen and Vincent D. Blondel, ["Unique in the Crowd: The privacy bounds of human mobility"](https://www.nature.com/articles/srep01376) (cell phone subscriber data)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
## No.
|
||||||
|
|
||||||
|
Given the availability of other data streams for cross-referencing, it is possible, even likely that a motivated agent could de-anonymise your data.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
class: center, middle
|
||||||
|
|
||||||
|
### Counterproductive option #1
|
||||||
|
|
||||||
|
Let's just destroy our data.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### This is a terrible idea:
|
||||||
|
|
||||||
|
- Destroyed data prevents (social)scientific studies from bing tested or reproduced
|
||||||
|
|
||||||
|
- Destroyed data prevents biographers and historians from illuminating the contexts of cultural studies
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### Example of Franz Boas, George Hunt, and the Hunt family
|
||||||
|
|
||||||
|
[See write-up on Anthrodendum Blog](https://anthrodendum.org/2018/02/15/this-anthropology-day-lets-remember-george-hunt/)
|
||||||
|
|
||||||
|
Boas, (co-author with Hunt) of The Mind of Primitive Man (1911)
|
||||||
|
|
||||||
|
> I hope the discussions outlined in these pages have shown that the data of anthropology teach us a greater tolerance of forms of civilization different from our own, that we should learn to look on foreign races with greater sympathy and with a conviction that, as all races have contributed in the past to cultural progress in one way or another, so they will be capable of advancing the interests of mankind if we are only willing to give them a fair opportunity.
|
||||||
|
|
||||||
|
Subsequent studies of Boaz's correspondence and field notes have enabled contemporary researchers to reach some startling conclusions.
|
||||||
|
|
||||||
|
*Almost 100 years later.*
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# Let's recap:
|
||||||
|
|
||||||
|
1. We need to preserve data. For a long time.
|
||||||
|
|
||||||
|
2. This data is increasingy digital.
|
||||||
|
|
||||||
|
3. The digital space is increasingly susceptible to hacking.
|
||||||
|
|
||||||
|
4. Even anonymised data may be subject to deanonmisation.
|
||||||
|
|
||||||
|
5. Conclusion: we need to secure our data. .red[*]
|
||||||
|
|
||||||
|
|
||||||
|
.footnote[.red[*] Sysadmins take note: The solution to this is NOT to require users to change their passwords every six months. NIST Special Publication 800-63. Appendix A. [has been revised](https://www.nist.gov/itl/tig/projects/special-publication-800-63)!]
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
# Brief Coda
|
||||||
|
|
||||||
|
## But, do we need to secure our data?
|
||||||
|
|
||||||
|
The crisis of data security provides a good opportunity to consider new ways of conducting research.
|
||||||
|
|
||||||
|
Projects which are open and transparent from the start do not need to be locked in a "digital safe".red[*]
|
||||||
|
|
||||||
|
### Might we also consider reproducible open research?
|
||||||
|
|
||||||
|
See here, for a rough example: [https://github.com/kidwellj/mapping_environmental_action](https://github.com/kidwellj/mapping_environmental_action)
|
||||||
|
|
||||||
|
### As well as co-produced research?
|
||||||
|
|
||||||
|
[See here](http://blogs.lse.ac.uk/impactofsocialsciences/2012/09/28/collaborating-with-academics-hayman/)? and [here](https://www.theguardian.com/higher-education-network/blog/2012/jul/18/politics-coproduction-research-academics-practitioners)
|
||||||
|
|
||||||
|
.footnote[.red[*] Caveat: to be fair, data produced by fully open co-produced participatory projects will still need to be secured against tampering. And there will remain some studies which simply require anonymity and distance.]
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Let's discuss!
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
</textarea>
|
||||||
|
<script src="https://remarkjs.com/downloads/remark-latest.min.js">
|
||||||
|
</script>
|
||||||
|
<script>
|
||||||
|
var slideshow = remark.create();
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
BIN
static/images/ERC_research_levels.png
Normal file
BIN
static/images/ERC_research_levels.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 76 KiB |
BIN
static/images/ERC_research_questions.png
Normal file
BIN
static/images/ERC_research_questions.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 100 KiB |
BIN
static/images/ERC_workflow.png
Normal file
BIN
static/images/ERC_workflow.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 106 KiB |
Loading…
Reference in a new issue