Search results for "computer.software_genre"
showing 10 items of 3858 documents
The Modern Strategies in the Cyber Warfare
2018
As there is no generally accepted definition for cyber warfare, it is a term that is quite liberally used in describing events and actions in the digital cyber world. The concept of cyber warfare became extremely popular from 2008 to 2010, partly superseding the previously used concept of information warfare which was launched in the 1990s. For some, cyber warfare is war that is conducted in the virtual domain. For others, it is a counterpart to conventional “kinetic” warfare. According to the OECD’s 2001 report, cyberwar military doctrines resemble those of so-called conventional war: retaliation and deterrence. Researchers agree with the notion that the definition of cyberwar should addre…
Cyclotron radiation emission spectroscopy signal classification with machine learning in project 8
2019
The Cyclotron Radiation Emission Spectroscopy (CRES) technique pioneered by Project 8 measures electromagnetic radiation from individual electrons gyrating in a background magnetic field to construct a highly precise energy spectrum for beta decay studies and other applications. The detector, magnetic trap geometry, and electron dynamics give rise to a multitude of complex electron signal structures which carry information about distinguishing physical traits. With machine learning models, we develop a scheme based on these traits to analyze and classify CRES signals. Understanding and proper use of these traits will be instrumental to improve cyclotron frequency reconstruction and help Pro…
Sequencing orphan species initiative (SOS): Filling the gaps in the 16S rRNA gene sequence database for all species with validly published names
2013
Yarza, Pablo et al.
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
Machine learning at the interface of structural health monitoring and non-destructive evaluation
2020
While both non-destructive evaluation (NDE) and structural health monitoring (SHM) share the objective of damage detection and identification in structures, they are distinct in many respects. This paper will discuss the differences and commonalities and consider ultrasonic/guided-wave inspection as a technology at the interface of the two methodologies. It will discuss how data-based/machine learning analysis provides a powerful approach to ultrasonic NDE/SHM in terms of the available algorithms, and more generally, how different techniques can accommodate the very substantial quantities of data that are provided by modern monitoring campaigns. Several machine learning methods will be illu…
Dynamic Perception of Plastic Movements: Biomechanics and Digital Artifacts
2017
The article offers some reflections on the body-space relationship through images, graphic translations and visual studies that converge into a contemporary digital illuminated avant-garde of the fourth virtual dimension. Starting from the study of the Soviet coreutics of the 1920s and the biomechanics of multimedia performances, it moves on the cinesthetic suggestions and to the dance theorization integrated with the musical score. Finally, some contemporary forms of digital image production are taken into account by addressing a number of issues regarding the exploration of the object-image and its experiential re-elaboration through the production of new graphic knowledge.
Modeling crowd dynamics through coarse-grained data analysis
2018
International audience; Understanding and predicting the collective behaviour of crowds is essential to improve the efficiency of pedestrian flows in urban areas and minimize the risks of accidents at mass events. We advocate for the development of crowd traffic management systems, whereby observations of crowds can be coupled to fast and reliable models to produce rapid predictions of the crowd movement and eventually help crowd managers choose between tailored optimization strategies. Here, we propose a Bi-directional Macroscopic (BM) model as the core of such a system. Its key input is the fundamental diagram for bi-directional flows, i.e. the relation between the pedestrian fluxes and d…
IMI – Oral biopharmaceutics tools project – Evaluation of bottom-up PBPK prediction success part 4: Prediction accuracy and software comparisons with…
2020
Oral drug absorption is a complex process depending on many factors, including the physicochemical properties of the drug, formulation characteristics and their interplay with gastrointestinal physiology and biology. Physiological-based pharmacokinetic (PBPK) models integrate all available information on gastro-intestinal system with drug and formulation data to predict oral drug absorption. The latter together with in vitro-in vivo extrapolation and other preclinical data on drug disposition can be used to predict plasma concentration-time profiles in silico. Despite recent successes of PBPK in many areas of drug development, an improvement in their utility for evaluating oral absorption i…
BioTIME: A database of biodiversity time series for the Anthropocene
2018
Abstract Motivation The BioTIME database contains raw data on species identities and abundances in ecological assemblages through time. These data enable users to calculate temporal trends in biodiversity within and amongst assemblages using a broad range of metrics. BioTIME is being developed as a community-led open-source database of biodiversity time series. Our goal is to accelerate and facilitate quantitative analysis of temporal patterns of biodiversity in the Anthropocene. Main types of variables included The database contains 8,777,413 species abundance records, from assemblages consistently sampled for a minimum of 2 years, which need not necessarily be consecutive. In addition, th…
Acquisition, filtering and toll data processing system for obtaining origin-destination matrix and travel times on highways
2012
This paper presents an acquisition, filtering and real-time toll data processing system that provides a base for resolution and generation of studies and models of behavior on highways. Crossing points estimation, speed calculation, study traffic flow, travel time estimation and stopping points can also be provided. The complexity of processing with supplied data volume makes indispensable a less relevant information filtering. This filtering can be done through indicators such as speed or nullity of fields and a performance improvement job in database level using views, materializations, partitioning and parallelism. A web application called MODA has been developed. This application make e…