Search results for "Cryptography"

showing 10 items of 657 documents

unitas: the universal tool for annotation of small RNAs

2017

AbstractBackgroundNext generation sequencing is a key technique in small RNA biology research that has led to the discovery of functionally different classes of small non-coding RNAs in the past years. However, reliable annotation of the extensive amounts of small non-coding RNA data produced by high-throughput sequencing is time-consuming and requires robust bioinformatics expertise. Moreover, existing tools have a number of shortcomings including a lack of sensitivity under certain conditions, limited number of supported species or detectable sub-classes of small RNAs.ResultsHere we introduce unitas, an out-of-the-box ready software for complete annotation of small RNA sequence datasets, …

Small RNAtRNA-derived fragments (tRFs)Computational biologypiRNABiologyDNA sequencing570 Life sciencesAnnotationEnsemblHumansRNA-seq data analysismiRNAGeneticsbusiness.industryphasiRNARNAHigh-Throughput Nucleotide SequencingUsabilityMolecular Sequence AnnotationNon-coding RNAKey (cryptography)RNA Small UntranslatedSmall non-coding RNAsbusinessSoftwareHeLa Cells570 Biowissenschaften
researchProduct

First-Order Calculus on Metric Measure Spaces

2020

In this chapter we develop a first-order differential structure on general metric measure spaces. First of all, the key notion of cotangent module is obtained by combining the Sobolev calculus (discussed in Chap. 2) with the theory of normed modules (described in Chap. 3). The elements of the cotangent module L2(T∗X), which are defined and studied in Sect. 4.1, provide a convenient abstraction of the concept of ‘1-form on a Riemannian manifold’.

Sobolev spaceMetric (mathematics)CalculusKey (cryptography)Trigonometric functionsDifferential structureRiemannian manifoldMathematics::Symplectic GeometryMeasure (mathematics)MathematicsAbstraction (mathematics)
researchProduct

Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation

2021

Recently, Social Network Analysis studies have led to an improvement and to a generalization of existing tools to networks with multiple subsystems and layers of connectivity. These kind of networks are usually called multilayer networks. Multilayer networks in which each layer shares at least one node with some other layer in the network are called multiplex networks. Being a multiplex network does not require all nodes to exist on every layer. In this paper, we built a criminal multiplex network which concerns an anti-mafia operation called “Montagna” and it is based on the examination of a pre-trial detention order issued on March 14, 2007 by the judge for preliminary investigations of t…

Social and Information Networks (cs.SI)FOS: Computer and information sciencesPhysics - Physics and SocietyFocus (computing)Settore INF/01 - InformaticaMultilayer networksComputer sciencebusiness.industryNode (networking)Criminal networks; Multilayer networks; Social network analysisSocial network analysis (criminology)FOS: Physical sciencesComputer Science - Social and Information NetworksPhysics and Society (physics.soc-ph)Criminal networksSocial network analysisIdentification (information)PhoneKey (cryptography)Layer (object-oriented design)businessNetwork analysisComputer network
researchProduct

Secrets to design an effective message on Facebook: an application to a touristic destination based on big data analysis

2018

The objective of this research is to identify which are the key variables for designing a message in a social network that can be used by an advertiser to generate Positive/Negative Engagement. The...

Social networkComputer sciencebusiness.industry05 social sciencesGeography Planning and DevelopmentBig dataWorld Wide WebTourism Leisure and Hospitality Management0502 economics and businessKey (cryptography)050211 marketingSocial mediabusiness050212 sport leisure & tourismCurrent Issues in Tourism
researchProduct

Does the platform matter? Social media and COVID-19 conspiracy theory beliefs in 17 countries

2021

While the role of social media in the spread of conspiracy theories has received much attention, a key deficit in previous research is the lack of distinction between different types of platforms. This study places the role of social media affordances in facilitating the spread of conspiracy beliefs at the center of its enquiry. We examine the relationship between platform use and conspiracy theory beliefs related to the COVID-19 pandemic. Relying on the concept of technological affordances, we theorize that variation across key features make some platforms more fertile places for conspiracy beliefs than others. Using data from a crossnational dataset based on a two-wave online survey cond…

Sociology and Political ScienceCoronavirus disease 2019 (COVID-19)teorías conspirativasConspiracy theorysocial mediaaffordancesPandemia de COVID-19 2020-oferimentsCOVID-19 Pandemic 2020-10240 Department of Communication and Media Researchconspiracy theories3312 Sociology and Political SciencePandèmia de COVID-19 2020-Social mediateories conspirativesSociologypercepción erróneaAffordance070 News media journalism & publishingCOVIDCommunicationCOVID-19misperceptionsofrecimientosEpistemologyddc:19Mass communicationsKey (cryptography)percepció erròniaAffordances3315 Communication
researchProduct

Definition and Holders of Key Functions

2015

This chapter takes up the four key functions established in the Solvency II Directive. In this vein, the significance of the key functions is highlighted first. Then follows the analysis of the terms “key function” and “key function holders”, terms undefined in the Solvency II Directive. The next step points out the distinctions among key function holders and their subordinate staff members. A part of this breakdown is to examine in practice who exercises which function in an insurance undertaking. The chapter wraps up by looking at whether key functions are performed in a centralized or decentralized organization.

SolvencyProcess managementInternal auditSupervisory boardmedia_common.quotation_subjectKey (cryptography)BusinessFunction (engineering)DirectiveDecentralizationmedia_common
researchProduct

Development of the BCI Device Controlling C++ Software, Based on Existing Open Source Projects

2021

The possibility of using the BCI open source code for building BCI controlled device, based on small AVR or ARM microcontrollers was considered. Some techniques to extract code snippets from other BCI projects were presented in the case of OpenViBE as the code donor. Problem with obtaining driver source codes for factory BCI devices has been pointed out.

Source codeOpenVibeInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industrymedia_common.quotation_subjectBCI driversMicrocontrollerInformationSystems_MODELSANDPRINCIPLESSoftwareDevelopment (topology)BCI softwareEmbedded systemCode (cryptography)Factory (object-oriented programming)BCIbusinessBrain–computer interfacemedia_common
researchProduct

Single-channel polychromatic pattern recognition by the use of a joint-transform correlator.

2010

We present a single-channel system for color image recognition that is based on a joint-transform correlator setup. The color images are encoded as phase and amplitude functions, inspired from the Munsell color representation. A real-time implementation of the new codification method can be achieved by the use of a spatial light modulator operating in phase-only modulation mode. We determine the optimal codification for a linear color-phase code. Its performance is compared with a conventional multichannel correlator by means of computer simulations. Experimental results are also presented.

Spatial light modulatorChannel (digital image)Color imageComputer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPhase (waves)Industrial and Manufacturing EngineeringOpticsModulationPattern recognition (psychology)Code (cryptography)Business and International ManagementJoint (audio engineering)businessApplied optics
researchProduct

Finding near-perfect parameters for hardware and code optimizations with automatic multi-objective design space explorations

2012

Summary In the design process of computer systems or processor architectures, typically many different parameters are exposed to configure, tune, and optimize every component of a system. For evaluations and before production, it is desirable to know the best setting for all parameters. Processing speed is no longer the only objective that needs to be optimized; power consumption, area, and so on have become very important. Thus, the best configurations have to be found in respect to multiple objectives. In this article, we use a multi-objective design space exploration tool called Framework for Automatic Design Space Exploration (FADSE) to automatically find near-optimal configurations in …

SpeedupComputer Networks and CommunicationsDesign space explorationComputer sciencebusiness.industryParallel computingProgram optimizationMulti-objective optimizationComputer Science ApplicationsTheoretical Computer ScienceMicroarchitectureComputational Theory and MathematicsScalabilityCode (cryptography)Engineering design processbusinessSoftwareComputer hardwareConcurrency and Computation: Practice and Experience
researchProduct

FPGA implementation of Spiking Neural Networks supported by a Software Design Environment

2011

Abstract This paper is focused on the creation of Spiking Neural Networks (SNN) in hardware due to their advantages for certain problem solving and their similarity to biological neural system. One of the main uses of this neural structure is pattern classification. The chosen model for the spiking neuron is the Spike Response Model (SRM). For SNN design and implementation, a software application has been developed to provide easy creation, simulation and automatic generation of the hardware model. VHDL was used for the hardware model. This paper describes the functionality of SNN and the design procedure followed to obtain a working neural system in both software and hardware. Designed VHD…

Spiking neural networkComputer sciencebusiness.industrymedicine.anatomical_structureSoftwareEmbedded systemPattern recognition (psychology)VHDLCode (cryptography)medicineSoftware designSpike (software development)NeuronbusinessField-programmable gate arraycomputercomputer.programming_languageIFAC Proceedings Volumes
researchProduct