Search results for "Abstract data type"

showing 10 items of 1140 documents

Bio-inspired security analysis for IoT scenarios

2020

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueService (systems architecture)Security analysisIoTDependency (UML)Computer scienceNetwork securityDistributed computingmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologyMetabolic networksAttack graphs; Bio-inspired algorithms; Bio-inspired techniques; IoT; Metabolic networks; Network security; Security analysis; System securityAttack graph03 medical and health sciences0302 clinical medicineUse casemedia_common021110 strategic defence & security studiesSecurity analysisbusiness.industryMetabolic network030208 emergency & critical care medicineBio-inspired techniquesNetwork securitySystem securityFlux balance analysisInterdependenceHardware and ArchitectureBio-inspired algorithmGraph (abstract data type)businessSoftwareAttack graphsBio-inspired algorithms
researchProduct

A bio-inspired approach to attack graphs analysis

2018

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graphs analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueTheoretical computer scienceComputer scienceNetwork securitybusiness.industrymedia_common.quotation_subjectComputer Science (all)Bio-inspired techniquesNetwork securityAttack graphPathway analysisFlux balance analysisTheoretical Computer ScienceInterdependenceAttack graphMetabolic network modelAttack graphs; Bio-inspired techniques; Network securityGraph (abstract data type)businessAttack graphsmedia_common
researchProduct

New Trends in Graph Mining

2010

Searching for repeated features characterizing biological data is fundamental in computational biology. When biological networks are under analysis, the presence of repeated modules across the same network (or several distinct ones) is shown to be very relevant. Indeed, several studies prove that biological networks can be often understood in terms of coalitions of basic repeated building blocks, often referred to as network motifs.This work provides a review of the main techniques proposed for motif extraction from biological networks. In particular, main intrinsic difficulties related to the problem are pointed out, along with solutions proposed in the literature to overcome them. Open ch…

Bioinformatics network analysisNetwork motifBiological dataColoredComputer scienceGraph (abstract data type)Network scienceData miningMotif (music)computer.software_genrecomputerBiological networkInternational Journal of Knowledge Discovery in Bioinformatics
researchProduct

Protein-protein interaction network querying by a "focus and zoom" approach

2008

We propose an approach to network querying in protein-protein interaction networks based on bipartite graph weighted matching. An algorithm is presented that first “focuses” the potentially relevant portion of the target graph by performing a global alignment of this one with the query graph, and then “zooms” on the actual matching nodes by considering their topological arrangement, hereby obtaining a (possibly) approximated occurrence of the query graph within the target graph. Approximation is related to node insertions, node deletions and edge deletions possibly intervening in the query graph. The technique manages networks of arbitrary topology. Moreover, edge labels are used to represe…

Bioinformatics network analysisTheoretical computer scienceVoltage graphGraph (abstract data type)Folded cube graphAdjacency matrixNull graphBiconnected graphButterfly graphSimplex graphMathematicsofComputing_DISCRETEMATHEMATICSMathematics
researchProduct

A Coclustering Approach for Mining Large Protein-Protein Interaction Networks

2012

Several approaches have been presented in the literature to cluster Protein-Protein Interaction (PPI) networks. They can be grouped in two main categories: those allowing a protein to participate in different clusters and those generating only nonoverlapping clusters. In both cases, a challenging task is to find a suitable compromise between the biological relevance of the results and a comprehensive coverage of the analyzed networks. Indeed, methods returning high accurate results are often able to cover only small parts of the input PPI network, especially when low-characterized networks are considered. We present a coclustering-based technique able to generate both overlapping and nonove…

Biologycomputer.software_genreBioinformatics network analysis co-clusteringTask (project management)Set (abstract data type)Protein Interaction MappingGeneticsCluster (physics)Cluster AnalysisHumansRelevance (information retrieval)Protein Interaction MapsCluster analysisStructure (mathematical logic)Applied MathematicsProteinsprotein-protein interaction networksbiological networksComputingMethodologies_PATTERNRECOGNITIONCover (topology)Co-clusteringData miningcomputerAlgorithmsBiological networkBiotechnologyIEEE/ACM Transactions on Computational Biology and Bioinformatics
researchProduct

A Robust Generic Method for Grid Detection in White Light Microscopy Malassez Blade Images in the Context of Cell Counting

2015

AbstractIn biology, cell counting is a primary measurement and it is usually performed manually using hemocytometers such as Malassez blades. This work is tedious and can be automated using image processing. An algorithm based on Fourier transform filtering and the Hough transform was developed for Malassez blade grid extraction. This facilitates cell segmentation and counting within the grid. For the present work, a set of 137 images with high variability was processed. Grids were accurately detected in 98% of these images.

Blade (geometry)Computer scienceMalassezImage processingContext (language use)Saccharomyces cerevisiaeHough transformlaw.inventionSet (abstract data type)symbols.namesakeOpticslawimage analysisMicroscopy[ INFO.INFO-TI ] Computer Science [cs]/Image ProcessingImage Processing Computer-AssistedComputer visionInstrumentationcell segmentationMicroscopybusiness.industrymorphological mathematicsGridFourier transformHough transform[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]symbolsFourier transformArtificial intelligencebusinessAlgorithms
researchProduct

Time-dependent asymmetric traveling salesman problem with time windows: Properties and an exact algorithm

2019

Abstract In this paper, we deal with the Time-Dependent Asymmetric Traveling Salesman Problem with Time Windows. First, we prove that under special conditions the problem can be solved as an Asymmetric Traveling Salesman Problem with Time Windows, with suitable-defined time windows and (constant) travel times. Second, we show that, if the special conditions do not hold, the time-independent optimal solution provides both a lower bound and (eventually) an upper bound with a worst-case guarantee for the Time-Dependent Asymmetric Traveling Salesman Problem with Time Windows. Finally, a branch-and-bound algorithm is presented and tested on a set of 4800 instances. The results have been compared…

Branch-and-boundApplied MathematicsTime dependenceUpper and lower boundsTravelling salesman problemSet (abstract data type)Traveling salesman problemExact algorithmTime windowsLower and upper boundTime windowDiscrete Mathematics and CombinatoricsApplied mathematicsConstant (mathematics)Discrete Mathematics and CombinatoricMathematics
researchProduct

Multi-channel search for squarks and gluinos in root s=7 TeV pp collisions with the ATLAS detector at the LHC

2013

A search for supersymmetric particles in final states with zero, one, and two leptons, with and without jets identified as originating from b-quarks, in 4.7 fb[superscript −1] of √s = 7 TeV pp collisions produced by the Large Hadron Collider and recorded by the ATLAS detector is presented. The search uses a set of variables carrying information on the event kinematics transverse and parallel to the beam line that are sensitive to several topologies expected in supersymmetry. Mutually exclusive final states are defined, allowing a combination of all channels to increase the search sensitivity. No deviation from the Standard Model expectation is observed. Upper limits at 95 % confidence level…

Brookhaven National LaboratoryParticle physicsPhysics and Astronomy (miscellaneous)Supergauge TransformationsContext (language use)ddc:500.253001 natural sciencesStandard ModelSet (abstract data type)CurrentsPions0103 physical sciencesddc:530Sensitivity (control systems)WeakHigh Energy Physics010306 general physicsEngineering (miscellaneous)QCCiencias ExactasPhysicsproton–proton collisionsHadron-Hadron ScatteringLarge Hadron ColliderATLAS detector010308 nuclear & particles physicsSettore FIS/01 - Fisica SperimentaleHigh Energy Physics::PhenomenologyFísicaSupersymmetryATLASgluinosHADRON-HADRON COLLISIONSExperimental High Energy PhysicsComputingMethodologies_DOCUMENTANDTEXTPROCESSINGsquarksHigh Energy Physics::ExperimentSupersymmetryLHCEvent (particle physics)LeptonModel
researchProduct

A Fuzzy Logic C-Means Clustering Algorithm to Enhance Microcalcifications Clusters in Digital Mammograms

2011

The detection of microcalcifications is a hard task, since they are quite small and often poorly contrasted against the background of images. The Computer Aided Detection (CAD) systems could be very useful for breast cancer control. In this paper, we report a method to enhance microcalcifications cluster in digital mammograms. A Fuzzy Logic clustering algorithm with a set of features is used for clustering microcalcifications. The method described was tested on simulated clusters of microcalcifications, so that the location of the cluster within the breast and the exact number of microcalcifications is known.

C-meanCOMPUTER-AIDED DETECTIONComputer scienceCADFuzzy logicSet (abstract data type)Cluster (physics)medicineMammographycancerComputer visionCLASSIFICATION.Cluster analysisbreastmedicine.diagnostic_testbusiness.industryPattern recognitionImage enhancementComputer aided detectionSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)microcalcificationComputingMethodologies_PATTERNRECOGNITIONbreast; cancer; microcalcifications; clustering; fuzzy logic; C-means; COMPUTER-AIDED DETECTION; CLASSIFICATION.Artificial intelligencefuzzy logicbusinessclustering
researchProduct

Gene Set to Diseases (GS2D): disease enrichment analysis on human gene sets with literature data

2016

Large sets of candidate genes derived from high-throughput biological experiments can be characterized by functional enrichment analysis. The analysis consists of comparing the functions of one gene set against that of a background gene set. Then, functions related to a significant number of genes in the gene set are expected to be relevant. Web tools offering disease enrichment analysis on gene sets are often based on gene-disease associations from manually curated or experimental data that is accurate but does not cover all diseases discussed in the literature. Using associations automatically derived from literature data could be a cost effective method to improve the coverage of disease…

Candidate genebusiness.industryBig dataExperimental dataGenomicsBiologycomputer.software_genreSet (abstract data type)WorkflowData miningToxicogenomicsbusinesscomputerGeneGenomics and Computational Biology
researchProduct