791 resultados para cluster algorithms
Resumo:
Biomol NMR Assign (2007) 1:81–83 DOI 10.1007/s12104-007-9022-3
Resumo:
J Biol Inorg Chem (2006) 11: 307–315 DOI 10.1007/s00775-005-0077-2
Resumo:
Inorg. Chem., 2003, 42 (4), pp 938–940 DOI: 10.1021/ic0262886
Resumo:
J Biol Inorg Chem (2004) 9: 145–151 DOI 10.1007/s00775-003-0506-z
Resumo:
J. Am. Chem. Soc., 2003, 125 (51), pp 15708–15709 DOI: 10.1021/ja038344n
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Finance from the NOVA – School of Business and Economics
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Resumo:
Tese apresentada para cumprimento dos requisitos necessários à obtenção do grau de Doutor em e-Planeamento
Resumo:
Mannans (linear mannan, glucomannan, galactomannan and galactoglucomannan) are the major constituents of the hemicellulose fraction in softwoods and show great importance as a renewable resource for fuel or feedstock applications. As complex polysaccharides, mannans can only be degraded through a synergistic action of different mannan-degrading enzymes, mannanases. Microbial mannanases are mainly extracellular enzymes that can act in wide range of pH and temperature, contributing to pulp and paper, pharmaceutical, food and feed, oil and textile successful industrial applications. Knowing and controlling these microbial mannan-degrading enzymes are essential to take advantage of their great biotechnological potential. The genome of the laboratory 168 strain of Bacillus subtilis carries genes gmuA-G dedicated to the degradation and utilization of glucomannan, including an extracellular -mannanase. Recently, the genome sequence of an undomesticated strain of B. subtilis, BSP1, was determined. In BSP1, the gmuA-G operon is maintained, interestingly, however, a second cluster of genes was found (gam cluster), which comprise a second putative extracellular β-mannanase, and most likely specify a system for the degradation and utilization of a different mannan polymer, galactoglucomannan. The genetic organization and function of the gam cluster, and whether its presence in BSP1 strain results in new hemicellulolytic capabilities, compared to those of the laboratory strain, was address in this work. In silico and in vivo mRNA analyses performed in this study revealed that the gam cluster, comprising nine genes, is organized and expressed in at least six different transcriptional units. Furthermore, cloning, expression, and production of Bbsp2923 in Escherichia coli was achieved and preliminary characterization shows that the enzyme is indeed a β-mannanase. Finally, the high hemicellulolytic capacity of the undomesticated B. subtilis BSP1, demonstrated in this work by qualitative analyses, suggests potential to be used in the food and feed industries.
Resumo:
Botnets are a group of computers infected with a specific sub-set of a malware family and controlled by one individual, called botmaster. This kind of networks are used not only, but also for virtual extorsion, spam campaigns and identity theft. They implement different types of evasion techniques that make it harder for one to group and detect botnet traffic. This thesis introduces one methodology, called CONDENSER, that outputs clusters through a self-organizing map and that identify domain names generated by an unknown pseudo-random seed that is known by the botnet herder(s). Aditionally DNS Crawler is proposed, this system saves historic DNS data for fast-flux and double fastflux detection, and is used to identify live C&Cs IPs used by real botnets. A program, called CHEWER, was developed to automate the calculation of the SVM parameters and features that better perform against the available domain names associated with DGAs. CONDENSER and DNS Crawler were developed with scalability in mind so the detection of fast-flux and double fast-flux networks become faster. We used a SVM for the DGA classififer, selecting a total of 11 attributes and achieving a Precision of 77,9% and a F-Measure of 83,2%. The feature selection method identified the 3 most significant attributes of the total set of attributes. For clustering, a Self-Organizing Map was used on a total of 81 attributes. The conclusions of this thesis were accepted in Botconf through a submited article. Botconf is known conferênce for research, mitigation and discovery of botnets tailled for the industry, where is presented current work and research. This conference is known for having security and anti-virus companies, law enforcement agencies and researchers.
Resumo:
Remote sensing - the acquisition of information about an object or phenomenon without making physical contact with the object - is applied in a multitude of different areas, ranging from agriculture, forestry, cartography, hydrology, geology, meteorology, aerial traffic control, among many others. Regarding agriculture, an example of application of this information is regarding crop detection, to monitor existing crops easily and help in the region’s strategic planning. In any of these areas, there is always an ongoing search for better methods that allow us to obtain better results. For over forty years, the Landsat program has utilized satellites to collect spectral information from Earth’s surface, creating a historical archive unmatched in quality, detail, coverage, and length. The most recent one was launched on February 11, 2013, having a number of improvements regarding its predecessors. This project aims to compare classification methods in Portugal’s Ribatejo region, specifically regarding crop detection. The state of the art algorithms will be used in this region and their performance will be analyzed.
Resumo:
The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the paper. The authors would like to thank Dr. Elaine DeBock for reviewing the manuscript.
Resumo:
The present paper reports the precipitation process of Al3Sc structures in an aluminum scandium alloy, which has been simulated with a synchronous parallel kinetic Monte Carlo (spkMC) algorithm. The spkMC implementation is based on the vacancy diffusion mechanism. To filter the raw data generated by the spkMC simulations, the density-based clustering with noise (DBSCAN) method has been employed. spkMC and DBSCAN algorithms were implemented in the C language and using MPI library. The simulations were conducted in the SeARCH cluster located at the University of Minho. The Al3Sc precipitation was successfully simulated at the atomistic scale with the spkMC. DBSCAN proved to be a valuable aid to identify the precipitates by performing a cluster analysis of the simulation results. The achieved simulations results are in good agreement with those reported in the literature under sequential kinetic Monte Carlo simulations (kMC). The parallel implementation of kMC has provided a 4x speedup over the sequential version.
Resumo:
Traffic Engineering (TE) approaches are increasingly impor- tant in network management to allow an optimized configuration and resource allocation. In link-state routing, the task of setting appropriate weights to the links is both an important and a challenging optimization task. A number of different approaches has been put forward towards this aim, including the successful use of Evolutionary Algorithms (EAs). In this context, this work addresses the evaluation of three distinct EAs, a single and two multi-objective EAs, in two tasks related to weight setting optimization towards optimal intra-domain routing, knowing the network topology and aggregated traffic demands and seeking to mini- mize network congestion. In both tasks, the optimization considers sce- narios where there is a dynamic alteration in the state of the system, in the first considering changes in the traffic demand matrices and in the latter considering the possibility of link failures. The methods will, thus, need to simultaneously optimize for both conditions, the normal and the altered one, following a preventive TE approach towards robust configurations. Since this can be formulated as a bi-objective function, the use of multi-objective EAs, such as SPEA2 and NSGA-II, came nat- urally, being those compared to a single-objective EA. The results show a remarkable behavior of NSGA-II in all proposed tasks scaling well for harder instances, and thus presenting itself as the most promising option for TE in these scenarios.
Resumo:
Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.