Search results for "Cryptography"

showing 10 items of 657 documents

Application of modern computer algebra systems in food formulations and development: A case study

2017

Abstract Background Nutritional security determines the level of public health within a population while inadequate nutrition is one of the major factors in development of various health problems. This can be alleviated with sufficient and affordable access to currently available or newly designed nutritious foods. Scope and approach Formulation of new foods can be very costly, so methods able to lower design expanses are of utmost importance to the industry. Hence, the purpose of this work was to rationalize utilization of modern computerized algebraic systems (CAS) in solving traditional problems for formulating food mixtures by food combinatoric principles (FCP). Key findings and conclus…

0301 basic medicineEngineering[SDV.BIO]Life Sciences [q-bio]/BiotechnologyIndustrial production[SDV]Life Sciences [q-bio]PopulationFood combinatoric principles ; Food design of composite product ; Calculation of mixes ; Food formulation ; Computer algebra system ; PTC MathCAD03 medical and health sciences0404 agricultural biotechnologyDevelopment (topology)Calculation of mixesProduction (economics)Operations management[SPI.GPROC]Engineering Sciences [physics]/Chemical and Process EngineeringPTC MathCADeducation2. Zero hungereducation.field_of_study030109 nutrition & dieteticsScope (project management)Food combinatoric principlesbusiness.industryScale (chemistry)04 agricultural and veterinary sciencesSymbolic computation040401 food scienceFood formulationRisk analysis (engineering)Key (cryptography)Computer algebra systemFood design of composite productbusiness[SDV.AEN]Life Sciences [q-bio]/Food and NutritionFood ScienceBiotechnology
researchProduct

Stopping injection attacks with code and structured data

2018

Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed

0301 basic medicineExploitComputer scienceCross-site scriptingCryptographyComputer securitycomputer.software_genreSQL injection03 medical and health sciences0302 clinical medicineSoftwareSQL injectionCode (cryptography)Cryptographic hash functionProof-carrying codeproof-carrying codetietoturvaSQLbusiness.industryXSS030104 developmental biologyinjection030220 oncology & carcinogenesiscryptographic hashbusinesscomputer
researchProduct

High-Performance Biocomputing in Synthetic Biology-Integrated Transcriptional and Metabolic Circuits

2019

Biocomputing uses molecular biology parts as the hardware to implement computational devices. By following pre-defined rules, often hard-coded into biological systems, these devices are able to process inputs and return outputs-thus computing information. Key to the success of any biocomputing endeavor is the availability of a wealth of molecular tools and biological motifs from which functional devices can be assembled. Synthetic biology is a fabulous playground for such purpose, offering numerous genetic parts that allow for the rational engineering of genetic circuits that mimic the behavior of electronic functions, such as logic gates. A grand challenge, as far as biocomputing is concer…

0301 basic medicineHistologyComputer scienceProcess (engineering)lcsh:BiotechnologyBiomedical EngineeringBioengineering02 engineering and technologyField (computer science)Metabolic engineering03 medical and health sciencesSynthetic biologygenetic circuitslcsh:TP248.13-248.65ConceptualizationIntersection (set theory)business.industryBioengineering and Biotechnologybiocomputing021001 nanoscience & nanotechnologyboolean logic030104 developmental biologyPerspectiveKey (cryptography)metabolic networkssynthetic biology0210 nano-technologySoftware engineeringbusinessmetabolic engineeringHost (network)Biotechnology
researchProduct

Global emergence of the widespread Pseudomonas aeruginosa ST235 clone

2018

Abstract Objectives Despite the non-clonal epidemic population structure of Pseudomonas aeruginosa , several multi-locus sequence types are distributed worldwide and are frequently associated with epidemics where multidrug resistance confounds treatment. ST235 is the most prevalent of these widespread clones. In this study we aimed to understand the origin of ST235 and the molecular basis for its success. Methods The genomes of 79 P. aeruginosa ST235 isolates collected worldwide over a 27-year period were examined. A phylogenetic network was built, using a Bayesian approach to find the Most Recent Common Ancestor, and we identified antibiotic resistance determinants and ST235-specific genes…

0301 basic medicineMost recent common ancestorClone (cell biology)[ SDV.MP.BAC ] Life Sciences [q-bio]/Microbiology and Parasitology/Bacteriologymedicine.disease_causeGlobal HealthGenome[ SDV.MP ] Life Sciences [q-bio]/Microbiology and ParasitologyPrevalenceCluster Analysis[ SDV.BIBS ] Life Sciences [q-bio]/Quantitative Methods [q-bio.QM]High-risk clonesPhylogenyComputingMilieux_MISCELLANEOUSMolecular EpidemiologyGeneral Medicine3. Good healthInfectious Diseases[SDV.MP]Life Sciences [q-bio]/Microbiology and Parasitology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][ SDV.BBM.GTP ] Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]Pseudomonas aeruginosaEfflux[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]FluoroquinolonesMicrobiology (medical)Genotype030106 microbiologyEpidemic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]BiologyBacterial resistanceMicrobiology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Antibiotic resistanceDrug Resistance BacterialmedicinePseudomonas InfectionsGenePseudomonas aeruginosaPathogenInternational clones[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationMultiple drug resistanceGenes Bacterial[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Multilocus Sequence Typing
researchProduct

A clustering package for nucleotide sequences using Laplacian Eigenmaps and Gaussian Mixture Model.

2018

International audience; In this article, a new Python package for nucleotide sequences clustering is proposed. This package, freely available on-line, implements a Laplacian eigenmap embedding and a Gaussian Mixture Model for DNA clustering. It takes nucleotide sequences as input, and produces the optimal number of clusters along with a relevant visualization. Despite the fact that we did not optimise the computational speed, our method still performs reasonably well in practice. Our focus was mainly on data analytics and accuracy and as a result, our approach outperforms the state of the art, even in the case of divergent sequences. Furthermore, an a priori knowledge on the number of clust…

0301 basic medicineNematoda01 natural sciencesGaussian Mixture Model[STAT.ML]Statistics [stat]/Machine Learning [stat.ML][MATH.MATH-ST]Mathematics [math]/Statistics [math.ST]ComputingMilieux_MISCELLANEOUScomputer.programming_language[STAT.AP]Statistics [stat]/Applications [stat.AP]Phylogenetic treeDNA ClusteringGenomicsHelminth ProteinsComputer Science Applications[STAT]Statistics [stat]010201 computation theory & mathematics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Data analysisEmbeddingA priori and a posteriori[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Health Informatics0102 computer and information sciences[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Biology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Laplacian EigenmapsAnimalsCluster analysis[SDV.GEN]Life Sciences [q-bio]/GeneticsModels Geneticbusiness.industryPattern recognitionNADH DehydrogenaseSequence Analysis DNAPython (programming language)Mixture model[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationVisualization030104 developmental biologyComputingMethodologies_PATTERNRECOGNITIONPlatyhelminths[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Programming LanguagesArtificial intelligence[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM]businesscomputerComputers in biology and medicine
researchProduct

Multi-level integration of environmentally perturbed internal phenotypes reveals key points of connectivity between them

2017

The genotype and external phenotype of organisms are linked by so-called internal phenotypes which are influenced by environmental conditions. In this study, we used five existing -omics datasets representing five different layers of internal phenotypes, which were simultaneously measured in dietarily perturbed mice. We performed 10 pair-wise correlation analyses verified with a null model built from randomized data. Subsequently, the inferred networks were merged and literature mined for co-occurrences of identified linked nodes. Densely connected internal phenotypes emerged. Forty-five nodes have links with all other data-types and we denote them "connectivity hubs." In literature, we fou…

0301 basic medicineProteomicsPhysiologySystems biologyComputational biologyBiologyProteomicslcsh:PhysiologyCorrelation03 medical and health sciences0302 clinical medicineGenotype-phenotype distinctionGastrointestinal tractPhysiology (medical)GenotypeMetabolomicsSystems and Synthetic BiologyHost-Microbe InteractomicsFokkerij & GenomicaTranscriptomicsOriginal ResearchVLAGHost Pathogen Interaction & DiagnosticsGeneticsSysteem en Synthetische BiologieInternal phenotypelcsh:QP1-981Null modelMicrobiotaBacteriologieBacteriologyBacteriology Host Pathogen Interaction & DiagnosticsPhenotypeHost Pathogen Interactie & Diagnostiek030104 developmental biologyBacteriologie Host Pathogen Interactie & DiagnostiekKey (cryptography)Data integrationSystems biology030217 neurology & neurosurgeryAnimal Breeding & Genomics
researchProduct

panISa: ab initio detection of insertion sequences in bacterial genomes from short read sequence data.

2018

Abstract Motivation The advent of next-generation sequencing has boosted the analysis of bacterial genome evolution. Insertion sequence (IS) elements play a key role in prokaryotic genome organization and evolution, but their repetitions in genomes complicate their detection from short-read data. Results PanISa is a software pipeline that identifies IS insertions ab initio in bacterial genomes from short-read data. It is a highly sensitive and precise tool based on the detection of read-mapping patterns at the insertion site. PanISa performs better than existing IS detection systems as it is based on a database-free approach. We applied it to a high-risk clone lineage of the pathogenic spec…

0301 basic medicineStatistics and ProbabilityLineage (genetic)Computer scienceAb initioComputational biologyBacterial genome size[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]BiochemistryGenome[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][SDV.BBM.GTP]Life Sciences [q-bio]/Biochemistry Molecular Biology/Genomics [q-bio.GN]Insertion sequenceMolecular BiologyGenomic organizationHigh-Throughput Nucleotide SequencingSequence Analysis DNA[SDV.BIBS]Life Sciences [q-bio]/Quantitative Methods [q-bio.QM][SDV.MP.BAC]Life Sciences [q-bio]/Microbiology and Parasitology/BacteriologyPipeline (software)[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsComputational Mathematics030104 developmental biologyComputational Theory and Mathematics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]DNA Transposable Elements[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Genome BacterialSoftwareBioinformatics (Oxford, England)
researchProduct

Simulation-based estimation of branching models for LTR retrotransposons

2017

Abstract Motivation LTR retrotransposons are mobile elements that are able, like retroviruses, to copy and move inside eukaryotic genomes. In the present work, we propose a branching model for studying the propagation of LTR retrotransposons in these genomes. This model allows us to take into account both the positions and the degradation level of LTR retrotransposons copies. In our model, the duplication rate is also allowed to vary with the degradation level. Results Various functions have been implemented in order to simulate their spread and visualization tools are proposed. Based on these simulation tools, we have developed a first method to evaluate the parameters of this propagation …

0301 basic medicineStatistics and ProbabilitySource codeTheoretical computer scienceRetroelementsmedia_common.quotation_subjectRetrotransposon[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]BiologyBiochemistryGenomeChromosomesBranching (linguistics)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SoftwareAnimalsComputer SimulationMolecular BiologyComputingMilieux_MISCELLANEOUSmedia_commoncomputer.programming_languageGeneticsGenomeModels Geneticbusiness.industry[SDV.BID.EVO]Life Sciences [q-bio]/Biodiversity/Populations and Evolution [q-bio.PE]Python (programming language)[SDV.BIBS]Life Sciences [q-bio]/Quantitative Methods [q-bio.QM][INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsVisualizationComputational Mathematics030104 developmental biologyDrosophila melanogasterComputational Theory and Mathematics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Programming Languages[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Mobile genetic elements[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputerSoftware
researchProduct

REGGAE : a novel approach for the identification of key transcriptional regulators

2019

Abstract Motivation Transcriptional regulators play a major role in most biological processes. Alterations in their activities are associated with a variety of diseases and in particular with tumor development and progression. Hence, it is important to assess the effects of deregulated regulators on pathological processes. Results Here, we present REGulator-Gene Association Enrichment (REGGAE), a novel method for the identification of key transcriptional regulators that have a significant effect on the expression of a given set of genes, e.g. genes that are differentially expressed between two sample groups. REGGAE uses a Kolmogorov–Smirnov-like test statistic that implicitly combines assoc…

0301 basic medicineStatistics and ProbabilityTranscription Genetic610Computational biologyBiologyBiochemistry03 medical and health sciencesNeoplasmsHumansTwo sampleMolecular BiologyGeneProbabilitySupplementary dataRegulation of gene expressionSystems Biology500Original PapersComputer Science Applications004Computational Mathematics030104 developmental biologyComputational Theory and MathematicsGene Expression RegulationKey (cryptography)Identification (biology)FemaleSoftware
researchProduct

Decentralised trust-management inspired by ant pheromones

2017

Computational trust is increasingly utilised to select interaction partners in open technical systems consisting of heterogeneous, autonomous agents. Current approaches rely on centralised elements for managing trust ratings (i.e. control and provide access to aggregated ratings). Consider a grid computing application as illustrating example: agents share their computing resources and cooperate in terms of processing computing jobs. These agents are free to join and leave, and they decide on their own with whom to interact. The impact of malicious or uncooperative agents can be countered by only cooperating with agents that have shown to be benevolent: trust relationships are established. T…

0301 basic medicinebusiness.industryComputer scienceComputer Networks and CommunicationsMulti-agent systemAutonomous agent02 engineering and technologyOrganic computingGridcomputer.software_genreComputer securityManagement Information SystemsPublic-key cryptography03 medical and health sciences030104 developmental biologyGrid computingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringTrust management (information system)020201 artificial intelligence & image processingComputational trustbusinesscomputerSoftwareInternational Journal of Mobile Network Design and Innovation
researchProduct