Search results for "software engineering"
showing 10 items of 1151 documents
The structural plasticity of the C terminus of p21Cip1 is a determinant for target protein recognition.
2003
The cyclin-dependent kinase inhibitory protein p21(Cip1) might play multiple roles in cell-cycle regulation through interaction of its C-terminal domain with a defined set of cellular proteins such as proliferating cell nuclear antigen (PCNA), calmodulin (CaM), and the oncoprotein SET. p21(Cip1) could be described as an intrinsically unstructured protein in solution although the C-terminal domain adopts a well-defined extended conformation when bound to PCNA. However, the molecular mechanism of the interaction with CaM and the oncoprotein SET is not well understood, partly because of the lack of structural information. In this work, a peptide derived from the C-terminal domain of p21(Cip1) …
Verwendung des DICOM- Standards in heterogener Umgebung
1999
Purpose The DICOM standard, introduced in 1993, is now established in many of today's image modalities. Experiences with DICOM implementations and requirements for future developments are described. Methods First a brief summary of the development of the DICOM standard is given. Based on general observations, different problems with installation, programming and maintenance are outlined. Results The standard consists of mandatory and optional information models and functionalities to enable the use and development of a broad spectrum of applications. But the available options lead to specific applications not compatible with the basic idea of the standard. Discussion For functional communic…
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
FRIPON: a worldwide network to track incoming meteoroids
2020
Context. Until recently, camera networks designed for monitoring fireballs worldwide were not fully automated, implying that in case of a meteorite fall, the recovery campaign was rarely immediate. This was an important limiting factor as the most fragile - hence precious - meteorites must be recovered rapidly to avoid their alteration. Aims. The Fireball Recovery and InterPlanetary Observation Network (FRIPON) scientific project was designed to overcome this limitation. This network comprises a fully automated camera and radio network deployed over a significant fraction of western Europe and a small fraction of Canada. As of today, it consists of 150 cameras and 25 European radio receiver…
Analyzing big datasets of genomic sequences: fast and scalable collection of k-mer statistics
2019
Abstract Background Distributed approaches based on the MapReduce programming paradigm have started to be proposed in the Bioinformatics domain, due to the large amount of data produced by the next-generation sequencing techniques. However, the use of MapReduce and related Big Data technologies and frameworks (e.g., Apache Hadoop and Spark) does not necessarily produce satisfactory results, in terms of both efficiency and effectiveness. We discuss how the development of distributed and Big Data management technologies has affected the analysis of large datasets of biological sequences. Moreover, we show how the choice of different parameter configurations and the careful engineering of the …
Applying a Data Quality Model to Experiments in Software Engineering
2014
Data collection and analysis are key artifacts in any software engineering experiment. However, these data might contain errors. We propose a Data Quality model specific to data obtained from software engineering experiments, which provides a framework for analyzing and improving these data. We apply the model to two controlled experiments, which results in the discovery of data quality problems that need to be addressed. We conclude that data quality issues have to be considered before obtaining the experimental results.
ISIS: a semantic mediation model and an agent based architecture for GIS interoperability
2003
The diversity of spatial information systems promotes the need to integrate heterogeneous spatial or geographic information systems (GIS) in a cooperative environment. The paper describes the research project ISIS (Interoperable Spatial Information System) which is a semantic mediation approach to support GIS interoperability. Its key characteristic is a dynamic resolution of semantic conflicts which is adequate for achieving autonomy, flexibility and extensibility. We propose a spatial OO data model and a mediation architecture based on multi-agent paradigm to support GIS interoperability.
MATLAB-based educational software for exploratory data analysis (EDA toolkit)
2009
This article presents an educational software developed in order to enable engineering students to gain insight into data sets via the exploratory data analysis (EDA). This software has been developed using the MATLAB GUIDE tool. This article shows the program suitability for learning EDA in different engineering courses related to data analysis such as data mining or data processing courses. © 2009 Wiley Periodicals, Inc. Comput Appl Eng Educ 20: 313–320, 2012
Toward fast and accurate emergency cases detection in BSNs
2020
International audience; In body sensor networks (BSNs), medical sensors capture physiological data from the human body and send them to the coordinator who act as a gateway to health care. The main aim of BSNs is to save peoples' lives. Therefore, fast and correct detection of emergencies while maintaining low-energy consumption of sensors is essential requirement of BSNs. In this study, the authors propose a new adaptive data sampling approach, where the sampling ratio is adapted based on the sensed data variation. The idea is to use the modified version of the cumulative sum (CUSUM) algorithm (modified CUSUM) that they previously proposed for wireless sensor networks to monitor the data v…
Comprehensive System for Systematic Case-Driven Software Reuse
2010
Reuse of software artifacts (blueprints and code) is normally associated with organising a systematic reuse framework most often constructed for a specific problem domain. In this paper we present a system (language, tool, reuse process) where software reuse is based on building and retrieving of so-called software cases (large compound artifacts) that can be reused between domains. The system is opportunistic in that software cases result from usual (non-reuse oriented) activities where also semantic information is added. This information is used to support regular development but may serve later to retrieve software cases. Having this common semantic basis, we can organise a systematic cr…