Search results for "Cr]"
showing 5 items of 55 documents
A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning
2022
Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…
Computer-assisted enumeration and classification of multi-qubit doilies
2022
For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N > 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Immediate dental implant placement in post-extraction-infected sites decontaminated with Er,Cr:YSGG laser: a retrospective cohort study
2022
Antecedentes científicos y objetivos de estudio La técnica quirúrgica para la colocación inmediata de un implante dental en un alvéolo post-extracción fue propuesta inicialmente en 1976 por Schulte y Heimke. La colocación de implantes dentales en alveolos post-extracción ofrece ventajas tales como un tiempo de tratamiento reducido y una mayor comodidad para el paciente; además esta técnica permite reducir la exposición quirúrgica del paciente y limitar la reabsorción fisiológica ósea posterior a la extracción del diente, conservando la estética. La justificación para la extracción de un diente comprometido a menudo está relacionada con la presencia de una lesión periapical, consecuencia de …
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…