In digital world, data and information is very valuable and much targeted by unauthorized parties. One way to secure messages is cryptography. Cryptography itself is a branch of science in concealing messages. In furt...
In digital world, data and information is very valuable and much targeted by unauthorized parties. One way to secure messages is cryptography. Cryptography itself is a branch of science in concealing messages. In further development a hybrid cryptosystem was formed which combines symmetrical and asymmetric cryptography, which in this paper uses VMPC and Multi-Power.. The RSA Multi-Power algorithm is an asymmetric algorithm that is excellent at message encryption but requires a long process time because it uses very complicated calculations. While VMPC has advantages in the process with fast time and relatively small size of ciphertext. Here we have analyzed the performance of various variants of RSA that have been hybridized with VMPC and given the results.
In the digital era, communication through computer networks plays an important role. Through electronic communication, a person can make transactions or communication very quickly and practically. Sending data / messa...
In the digital era, communication through computer networks plays an important role. Through electronic communication, a person can make transactions or communication very quickly and practically. Sending data / messages from one place to another is much constrained by the issue of confidentiality. There are many ways you can hide data / messages that will be sent. First, using cryptographic techniques, namely by encoding data / messages using certain algorithms. Another technique is to insert a message that will be sent to other media, so that the message will be hidden and what will appear is other media used to insert *** will be performed a Performance Analysis of the Combination of 3DES and DCT Algorithms in Securing Message Files into the Image.
Rare diseases are collectively common, affecting approximately one in twenty individuals worldwide. In recent years, rapid progress has been made in rare disease diagnostics due to advances in DNA sequencing, developm...
详细信息
This study presents the outcomes of the shared task competition BioCreative VII (Task 3) focusing on the extraction of medication names from a Twitter user's publicly available tweets (the user's 'timeline...
This study presents the outcomes of the shared task competition BioCreative VII (Task 3) focusing on the extraction of medication names from a Twitter user's publicly available tweets (the user's 'timeline'). In general, detecting health-related tweets is notoriously challenging for natural language processing tools. The main challenge, aside from the informality of the language used, is that people tweet about any and all topics, and most of their tweets are not related to health. Thus, finding those tweets in a user's timeline that mention specific health-related concepts such as medications requires addressing extreme imbalance. Task 3 called for detecting tweets in a user's timeline that mentions a medication name and, for each detected mention, extracting its span. The organizers made available a corpus consisting of 182 049 tweets publicly posted by 212 Twitter users with all medication mentions manually annotated. The corpus exhibits the natural distribution of positive tweets, with only 442 tweets (0.2%) mentioning a medication. This task was an opportunity for participants to evaluate methods that are robust to class imbalance beyond the simple lexical match. A total of 65 teams registered, and 16 teams submitted a system run. This study summarizes the corpus created by the organizers and the approaches taken by the participating teams for this challenge. The corpus is freely available at https://***/tasks/biocreative-vii/track-3/. The methods and the results of the competing systems are analyzed with a focus on the approaches taken for learning from class-imbalanced data.
With its origin in sociology, Social Network Analysis (SNA), quickly emerged and spread to other areas of research, including anthropology, biology, information science, organizational studies, political science, and ...
详细信息
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, wh...
Traffic signs are important markers in two-wheeled and four-wheeled vehicles. However, there is a change in direction or arrangement on the road that cannot be opened on a map which can cause incorrect information, which can cause traffic jams. In this journal the author uses a camera mounted on a car that provides a solution for drivers who issue problems that occur on the road that show directions or arrangements that are not directly updated using the HOG and MMOD methods. HOGs and MMODs are methods that can refute objects well, and move images and will be recognized immediately. The information received can be sent directly to an electronic map so that it can be accessed automatically by the driver's information and assistance and other information finds the right path, so that it can help the driver and can avoid traffic jams.
computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that in...
computer security is a very important thing in an information system. The strength of the NTRU algorithm is the difficulty of finding a short vector of a lattice (a discrete subgroup of a collection of vectors that includes the entire vector environment) of a random polynomial that has a large degree. The strength of the RSA algorithm lies in the level of difficulty in factoring non-prime numbers into the primary factor. As long as no efficient algorithm has been found to find the prime factors of large integers, the RSA algorithm is highly recommended for message encryption. And finally this is the TRIPEL DES algorithm designed using a 56-bit key, and that size is enough to run a secure encryption technique. This algorithm provides a simple solution that is running the DES Algorithm 3 times for data blocks. The results of our study of measuring speed on encryption and decryption using the same file are superior to the RSA algorithm compared to the NTRU and TRIPLE DES algorithms.
The success of learning in a classroom that uses supporting media demands lecturer activity. The level of activity of lecturers in class and using learning media such as Smart lecturer can be measured using a fuzzy lo...
The success of learning in a classroom that uses supporting media demands lecturer activity. The level of activity of lecturers in class and using learning media such as Smart lecturer can be measured using a fuzzy logic approach. This study aims to measure the level of active lecturers using the approach, namely: Mamdani and Sugeno method. Stages of lecturer activity measurement by forming a fuzzy set, composition rules as many as 24 rules and the defuzzification process using the centroid method that produces the level of activity of each is low, medium and high. Based on 173 lecturer activity data, the results of the Mamdani method indicates low 66%, medium 31%, and high 3%. While the Sugeno method produces a level of activity low 75%, moderate 17%, and high 8%. Therefore, Mamdani method is more suitable for the calculation because the spread of results is relatively evenly distributed at each level.
This paper presents a neuro-inspired mapping approach that uses partial information shared by multiple robots to reduce the time to create a map of an entire environment. Robots using a neurobiologically inspired algo...
详细信息
MOTIVATION:The synthesis of proteins with novel desired properties is challenging but sought after by the industry and academia. The dominating approach is based on trial-and-error inducing point mutations, assisted b...
详细信息
MOTIVATION:The synthesis of proteins with novel desired properties is challenging but sought after by the industry and academia. The dominating approach is based on trial-and-error inducing point mutations, assisted by structural information or predictive models built with paired data that are difficult to collect. This study proposes a sequence-based unpaired-sample of novel protein inventor (SUNI) to build ThermalProGAN for generating thermally stable proteins based on sequence information.
RESULTS:The ThermalProGAN can strongly mutate the input sequence with a median number of 32 residues. A known normal protein, 1RG0, was used to generate a thermally stable form by mutating 51 residues. After superimposing the two structures, high similarity is shown, indicating that the basic function would be conserved. Eighty four molecular dynamics simulation results of 1RG0 and the COVID-19 vaccine candidates with a total simulation time of 840[Formula: see text]ns indicate that the thermal stability increased.
CONCLUSION:This proof of concept demonstrated that transfer of a desired protein property from one set of proteins is feasible. The source code of ThermalProGAN can be freely accessed at https://***/markliou/ThermalProGAN/ with an MIT license. The website is https://***:433. Supplementary data are available on Github.
暂无评论