Search results for " Machine Learning"

showing 10 items of 300 documents

Computational methods and theory for ion channel research

2022

Ion channels are fundamental biological devices that act as gates in order to ensure selective ion transport across cellular membranes; their operation constitutes the molecular mechanism through which basic biological functions, such as nerve signal transmission and muscle contraction, are carried out. Here, we review recent results in the field of computational research on ion channels, covering theoretical advances, state-of-the-art simulation approaches, and frontline modeling techniques. We also report on few selected applications of continuum and atomistic methods to characterize the mechanisms of permeation, selectivity, and gating in biological and model channels.

continuum modelsmolecular dynamicselectivityIon channels; biomimetic nanopores; conductance; continuum models; gating; machine learning; molecular dynamics; rare events; selectivityGeneral Physics and AstronomyArticlemolecular dynamicsSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)rare eventsmachine learningcontinuum modelIon channelsgatingddc:530biomimetic nanoporesIon channelbiomimetic nanoporerare eventconductance
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

Architettura e second digital turn, l’evoluzione degli strumenti informatici e il progetto

2021

La condizione digitale che ha gradualmente ibridato le nostre esistenze, trasformando atomi in bit, si è oggi cementificata sulla nostra società, arricchendone la postmodernità e determinando una nuova liquidità acuitasi con l’avvento di internet. Un momento storico segnato da una nuova maturità del digitale, evidente nel nostro diverso rapporto con i dati, e nella diffusione di metodi di machine learning avanzato, che promettono una nuova capacità di comprensione della complessità contemporanea e nel frattempo contribuiscono alla propagazione dell’apparato tecnico sul mondo. Questi cambiamenti, tanto profondi da toccare la nostra cultura, stanno modificando il nostro modo di interpretare e…

digital architecture architectural design machine learning data cad digital tools parametric architecture communication design process project managementSettore ICAR/14 - Composizione Architettonica E UrbanaArchitettura architettura digitale machine learning dati Cad strumenti digitali architettura parametrica comunicazione processo progettuale gestione dei processi
researchProduct

CoproID predicts the source of coprolites and paleofeces using microbiome composition and host DNA content

2020

Shotgun metagenomics applied to archaeological feces (paleofeces) can bring new insights into the composition and functions of human and animal gut microbiota from the past. However, paleofeces often undergo physical distortions in archaeological sediments, making their source species difficult to identify on the basis of fecal morphology or microscopic features alone. Here we present a reproducible and scalable pipeline using both host and microbial DNA to infer the host source of fecal material. We apply this pipeline to newly sequenced archaeological specimens and show that we are able to distinguish morphologically similar human and canine paleofeces, as well as non-fecal sediments, fro…

dogsArcheologyMicrobial DNAData Mining and Machine LearningCoprolitemicrobiomeendogenous DNAlcsh:MedicineMorphology (biology)Genomechemistry.chemical_compoundPaleofecesDog0601 history and archaeologyGutArqueologia Metodologia0303 health sciences060102 archaeologyGeneral NeuroscienceGeneral Medicine06 humanities and the artsGenomicsNextflowmachine learningnextflowgutGeneral Agricultural and Biological SciencesShotgun metagenomicsPaleofecesHumanpaleofecesBioinformaticsBiologyMicrobiologyGeneral Biochemistry Genetics and Molecular Biologydiversity03 medical and health sciencesEndogenous DNAMachine learningcoprolitedog molecular analysishumanMicrobiomeancient DNAgenome030304 developmental biology030306 microbiologyHost (biology)lcsh:RcultureAncient DNAarcheologychemistryEvolutionary biologyAnthropologyCoproliteMicrobiomedietDNAPeerJ
researchProduct

The Riverine Organism Drift Imager: A new technology to study organism drift in rivers and streams

2023

1. Drift or downstream dispersal is a fundamental process in the life cycle of many riverine organisms. In the face of rapidly declining freshwater biodiversity, there is a need to enhance our capacity to study the drift of riverine organisms, by overcoming the limitations of traditional labour-intensive sampling methods that result in data of low temporal and spatial resolution. 2. To address this need, we developed a new technology, the Riverine Organism Drift Imager (RODI), which combines in situ imaging with machine-learning classification. This technique expands on the traditional methodology by replacing the collection cup of a drift net with a camera system that continuously images r…

fishneural networkEcological Modelinghermoverkot (biologia)monitorointistreamscomputer visionriversmonitoringkoneoppiminenmachine learningbenthic invertebrateskonenäköjoetbenthic invertebrates; computer vision; fish; machine learning; monitoring; neural network; rivers; streamsEcology Evolution Behavior and SystematicskalatMethods in Ecology and Evolution
researchProduct

Modular Point-of-Care Breath Analyzer and Shape Taxonomy-Based Machine Learning for Gastric Cancer Detection

2022

Background: Gastric cancer is one of the deadliest malignant diseases, and the non-invasive screening and diagnostics options for it are limited. In this article, we present a multi-modular device for breath analysis coupled with a machine learning approach for the detection of cancer-specific breath from the shapes of sensor response curves (taxonomies of clusters). Methods: We analyzed the breaths of 54 gastric cancer patients and 85 control group participants. The analysis was carried out using a breath analyzer with gold nanoparticle and metal oxide sensors. The response of the sensors was analyzed on the basis of the curve shapes and other features commonly used for comparison. These f…

gastric cancer; breath analysis; electronic nose; machine learning; screeningClinical BiochemistryDiagnostics
researchProduct

On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples

2022

The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In …

koneoppiminenGeneral Computer ScienceGeneral Engineeringdeep learningsyväoppiminenGeneral Materials Science5G-tekniikkaElectrical and Electronic Engineeringtekoälyartificial intelligenceadversarial machine learning5G networks
researchProduct

Anomaly detection in wireless sensor networks

2016

Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmental sensing, data processing and communication with other sensors and the base station while consuming low power. Today, WSNs are being used in almost every part of life. The cost effective nature of WSNs is beneficial for environmental monitoring, production facilities and security monitoring. At the same time WSNs are vulnerable to security breaches, attacks and information leakage. Anomaly detection techniques are used to detect such activities over the network that do not conform to the normal behavior of the network communication. Supervised Machine learning approach is one way to detect…

koneoppiminensensoriverkotsupervised machine learningWireless sensor networksanomaly detection
researchProduct

Investigating Novice Developers’ Code Commenting Trends Using Machine Learning Techniques

2023

Code comments are considered an efficient way to document the functionality of a particular block of code. Code commenting is a common practice among developers to explain the purpose of the code in order to improve code comprehension and readability. Researchers investigated the effect of code comments on software development tasks and demonstrated the use of comments in several ways, including maintenance, reusability, bug detection, etc. Given the importance of code comments, it becomes vital for novice developers to brush up on their code commenting skills. In this study, we initially investigated what types of comments novice students document in their source code and further categoriz…

luokitus (toiminta)Numerical Analysismachine learning techniquesohjelmistokehittäjätvasta-alkajatTheoretical Computer Sciencesource code commentsComputational MathematicskoneoppiminenclassificationComputational Theory and Mathematicssource code comments; classification; machine learning techniqueslähdekooditohjelmointiohjelmistokehitysAlgorithms; Volume 16; Issue 1; Pages: 53
researchProduct