Search results for "Computer security"

showing 10 items of 433 documents

Graphical Workflow System for Modification Calling by Machine Learning of Reverse Transcription Signatures

2019

Modification mapping from cDNA data has become a tremendously important approach in epitranscriptomics. So-called reverse transcription signatures in cDNA contain information on the position and nature of their causative RNA modifications. Data mining of, e.g. Illumina-based high-throughput sequencing data, is therefore fast growing in importance, and the field is still lacking effective tools. Here we present a versatile user-friendly graphical workflow system for modification calling based on machine learning. The workflow commences with a principal module for trimming, mapping, and postprocessing. The latter includes a quantification of mismatch and arrest rates with single-nucleotide re…

0301 basic medicinelcsh:QH426-470Downstream (software development)Computer scienceRT signatureMachine learningcomputer.software_genre[SDV.BBM.BM] Life Sciences [q-bio]/Biochemistry Molecular Biology/Molecular biologyField (computer science)m1A03 medical and health sciencesRNA modifications0302 clinical medicineEpitranscriptomics[SDV.BBM.GTP]Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]GeneticsTechnology and CodeGalaxy platformGenetics (clinical)ComputingMilieux_MISCELLANEOUSbusiness.industryPrincipal (computer security)[SDV.BBM.BM]Life Sciences [q-bio]/Biochemistry Molecular Biology/Molecular biologyAutomationWatson–Crick faceVisualizationlcsh:Geneticsmachine learningComputingMethodologies_PATTERNRECOGNITION030104 developmental biologyWorkflow030220 oncology & carcinogenesisMolecular Medicine[SDV.BBM.GTP] Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]TrimmingArtificial intelligencebusinesscomputer
researchProduct

Transport engineering and reduction in crime: the Medellín case

2016

This study analyses the impact of the aerial cable car public transport system, locally known as Metrocable, in Medellín (Colombia), on the reduction in crime. As part of the municipal policies of social urbanism, Metrocable has contributed to the social integration of the population in the outlying neighbourhoods, which has increased safety in Medellín. This case is clearly of great interest from the point of view of Criminal Sciences, demonstrating how crime can be combated by using tools beyond ius puniendi. DOI: http://dx.doi.org/10.4995/CIT2016.2016.3434

050210 logistics & transportationeducation.field_of_studyReduction in crimebusiness.industry05 social sciencesPopulationMetrocable0211 other engineering and technologies021107 urban & regional planning02 engineering and technologyPolicy analysisComputer securitycomputer.software_genreSocial integrationPublic transportPolitical science0502 economics and businessSocial urbanismRegional sciencebusinesseducationUrbanismcomputerLibro de Actas CIT2016. XII Congreso de Ingeniería del Transporte
researchProduct

The Sociology of Nazism

1994

In a previous paper, we tested a number of critical hypotheses derived from the three principal explanations of the sociology of Nazism. Our major finding was that the mass society, lower middle-class party of protest, and political confessionalism theses are empirically flawed. In this article, we apply an interest-based theory to the sociology of blue-collar Nazism. Using a sample of 15,006 workers who joined the Nazi Party between 1925 and 1932, we test the validity of our interest-based theory. The data demonstrate significant support for an interest-based account of Nazi Party working-class joining.

050402 sociology0504 sociologySociology and Political Science05 social sciencesPrincipal (computer security)050602 political science & public administrationMass societyNazismSociologySocial Sciences (miscellaneous)0506 political scienceEpistemologyRationality and Society
researchProduct

COVID-19 Contact Tracing and Data Protection Can Go Together

2020

We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.

2019-20 coronavirus outbreakCoronavirus disease 2019 (COVID-19)Computer scienceSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)Pneumonia ViralPatient rightsHealth InformaticsInformation technologyprivacycontact tracingDisease OutbreaksBetacoronavirusHuman–computer interactionHumansData Protection Act 1998Guest Editorialproximity tracingPandemicsappComputer Securitydata protectionUser acceptabilitySARS-CoV-2BluetoothCOVID-19T58.5-58.64Mobile ApplicationsPatient RightsGeographic Information SystemsSmartphonePublic aspects of medicineRA1-1270Coronavirus InfectionsContact tracingCoronavirus InfectionsJMIR mHealth and uHealth
researchProduct

Brauer correspondent blocks with one simple module

2019

One of the main problems in representation theory is to understand the exact relationship between Brauer corresponding blocks of finite groups. The case where the local correspondent has a unique simple module seems key. We characterize this situation for the principal p-blocks where p is odd.

20C20 20C15MatemáticasApplied MathematicsGeneral Mathematics010102 general mathematicsPrincipal (computer security)MathematicsofComputing_GENERAL01 natural sciencesRepresentation theoryAlgebra0103 physical sciencesKey (cryptography)FOS: Mathematics010307 mathematical physics0101 mathematicsRepresentation Theory (math.RT)Simple moduleMathematics - Representation TheoryMathematics
researchProduct

Powers and Fundamental Rights in Cyber Security

2015

Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…

Active securityPolitical scienceAccountabilityFundamental rightsProfiling (information science)Information securityConfidential communicationsInformation societyComputer securitycomputer.software_genreEmergency situationscomputer
researchProduct

Combining Benford's Law and machine learning to detect money laundering. An actual Spanish court case.

2017

Abstract Objectives This paper is based on the analysis of the database of operations from a macro-case on money laundering orchestrated between a core company and a group of its suppliers, 26 of which had already been identified by the police as fraudulent companies. In the face of a well-founded suspicion that more companies have perpetrated criminal acts and in order to make better use of what are very limited police resources, we aim to construct a tool to detect money laundering criminals. Methods We combine Benford’s Law and machine learning algorithms (logistic regression, decision trees, neural networks, and random forests) to find patterns of money laundering criminals in the conte…

Actuarial scienceScrutinyArtificial neural networkComputer sciencebusiness.industryDecision treeContext (language use)02 engineering and technologySpace (commercial competition)Money launderingComputer securitycomputer.software_genreMachine learning01 natural sciencesPathology and Forensic MedicineBenford's law010104 statistics & probabilityOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligence0101 mathematicsbusinessLawcomputerForensic science international
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Effectance and control as determinants of video game enjoyment

2007

This article explores video game enjoyment originated by games' key characteristic, interactivity. An online experiment (N = 500) tested experiences of effectance (perceived influence on the game world) and of being in control as mechanisms that link interactivity to enjoyment. A video game was manipulated to either allow normal play, reduce perceived effectance, or reduce perceived control. Enjoyment ratings suggest that effectance is an important factor in video game enjoyment but that the relationship between control of the game situation and enjoyment is more complex. © 2007 Mary Ann Liebert, Inc.

AdultEngineeringInjury controlAdolescentAccident preventionControl (management)HappinessPoison controlComputer securitycomputer.software_genreUser-Computer InterfaceInteractivityHumansPerceived controlVideo gameApplied PsychologyAgedbusiness.industryCommunicationComputingMilieux_PERSONALCOMPUTINGGeneral MedicineConsumer BehaviorMiddle AgedPlay and PlaythingsHuman-Computer InteractionVideo GamesbusinesscomputerSocial psychology
researchProduct

Testing the validity of the International Atomic Energy Agency (IAEA) safety culture model

2012

This paper takes the first steps to empirically validate the widely used model of safety culture of the International Atomic Energy Agency (IAEA), composed of five dimensions, further specified by 37 attributes. To do so, three independent and complementary studies are presented. First, 290 students serve to collect evidence about the face validity of the model. Second, 48 experts in organizational behavior judge its content validity. And third, 468 workers in a Spanish nuclear power plant help to reveal how closely the theoretical five-dimensional model can be replicated. Our findings suggest that several attributes of the model may not be related to their corresponding dimensions. Accordi…

AdultMaleEngineeringAdolescentOperations researchPoison controlHuman Factors and ErgonomicsOCCUPATIONAL SAFETYComputer securitycomputer.software_genrelaw.inventionYoung AdultATOMIC PROCESSESlawSurveys and QuestionnairesNuclear power plantAgency (sociology)Content validityHumansSafety cultureSafety Risk Reliability and QualityFace validityModels Statisticalbusiness.industryAtomic energyPublic Health Environmental and Occupational HealthInternational AgenciesReproducibility of ResultsMiddle AgedNuclear EnergyOrganizational CultureSpainOrganizational behaviorModels OrganizationalSafety cultureFemaleSafetyFactor Analysis Statisticalbusinesscomputer
researchProduct