Search results for "Cryptography"
showing 10 items of 657 documents
unitas: the universal tool for annotation of small RNAs
2017
AbstractBackgroundNext generation sequencing is a key technique in small RNA biology research that has led to the discovery of functionally different classes of small non-coding RNAs in the past years. However, reliable annotation of the extensive amounts of small non-coding RNA data produced by high-throughput sequencing is time-consuming and requires robust bioinformatics expertise. Moreover, existing tools have a number of shortcomings including a lack of sensitivity under certain conditions, limited number of supported species or detectable sub-classes of small RNAs.ResultsHere we introduce unitas, an out-of-the-box ready software for complete annotation of small RNA sequence datasets, …
First-Order Calculus on Metric Measure Spaces
2020
In this chapter we develop a first-order differential structure on general metric measure spaces. First of all, the key notion of cotangent module is obtained by combining the Sobolev calculus (discussed in Chap. 2) with the theory of normed modules (described in Chap. 3). The elements of the cotangent module L2(T∗X), which are defined and studied in Sect. 4.1, provide a convenient abstraction of the concept of ‘1-form on a Riemannian manifold’.
Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation
2021
Recently, Social Network Analysis studies have led to an improvement and to a generalization of existing tools to networks with multiple subsystems and layers of connectivity. These kind of networks are usually called multilayer networks. Multilayer networks in which each layer shares at least one node with some other layer in the network are called multiplex networks. Being a multiplex network does not require all nodes to exist on every layer. In this paper, we built a criminal multiplex network which concerns an anti-mafia operation called “Montagna” and it is based on the examination of a pre-trial detention order issued on March 14, 2007 by the judge for preliminary investigations of t…
Secrets to design an effective message on Facebook: an application to a touristic destination based on big data analysis
2018
The objective of this research is to identify which are the key variables for designing a message in a social network that can be used by an advertiser to generate Positive/Negative Engagement. The...
Does the platform matter? Social media and COVID-19 conspiracy theory beliefs in 17 countries
2021
While the role of social media in the spread of conspiracy theories has received much attention, a key deficit in previous research is the lack of distinction between different types of platforms. This study places the role of social media affordances in facilitating the spread of conspiracy beliefs at the center of its enquiry. We examine the relationship between platform use and conspiracy theory beliefs related to the COVID-19 pandemic. Relying on the concept of technological affordances, we theorize that variation across key features make some platforms more fertile places for conspiracy beliefs than others. Using data from a crossnational dataset based on a two-wave online survey cond…
Definition and Holders of Key Functions
2015
This chapter takes up the four key functions established in the Solvency II Directive. In this vein, the significance of the key functions is highlighted first. Then follows the analysis of the terms “key function” and “key function holders”, terms undefined in the Solvency II Directive. The next step points out the distinctions among key function holders and their subordinate staff members. A part of this breakdown is to examine in practice who exercises which function in an insurance undertaking. The chapter wraps up by looking at whether key functions are performed in a centralized or decentralized organization.
Development of the BCI Device Controlling C++ Software, Based on Existing Open Source Projects
2021
The possibility of using the BCI open source code for building BCI controlled device, based on small AVR or ARM microcontrollers was considered. Some techniques to extract code snippets from other BCI projects were presented in the case of OpenViBE as the code donor. Problem with obtaining driver source codes for factory BCI devices has been pointed out.
Single-channel polychromatic pattern recognition by the use of a joint-transform correlator.
2010
We present a single-channel system for color image recognition that is based on a joint-transform correlator setup. The color images are encoded as phase and amplitude functions, inspired from the Munsell color representation. A real-time implementation of the new codification method can be achieved by the use of a spatial light modulator operating in phase-only modulation mode. We determine the optimal codification for a linear color-phase code. Its performance is compared with a conventional multichannel correlator by means of computer simulations. Experimental results are also presented.
Finding near-perfect parameters for hardware and code optimizations with automatic multi-objective design space explorations
2012
Summary In the design process of computer systems or processor architectures, typically many different parameters are exposed to configure, tune, and optimize every component of a system. For evaluations and before production, it is desirable to know the best setting for all parameters. Processing speed is no longer the only objective that needs to be optimized; power consumption, area, and so on have become very important. Thus, the best configurations have to be found in respect to multiple objectives. In this article, we use a multi-objective design space exploration tool called Framework for Automatic Design Space Exploration (FADSE) to automatically find near-optimal configurations in …
FPGA implementation of Spiking Neural Networks supported by a Software Design Environment
2011
Abstract This paper is focused on the creation of Spiking Neural Networks (SNN) in hardware due to their advantages for certain problem solving and their similarity to biological neural system. One of the main uses of this neural structure is pattern classification. The chosen model for the spiking neuron is the Spike Response Model (SRM). For SNN design and implementation, a software application has been developed to provide easy creation, simulation and automatic generation of the hardware model. VHDL was used for the hardware model. This paper describes the functionality of SNN and the design procedure followed to obtain a working neural system in both software and hardware. Designed VHD…