Статті в журналах з теми "Online Inference Attacks"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Online Inference Attacks.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-41 статей у журналах для дослідження на тему "Online Inference Attacks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Gong, Neil Zhenqiang, and Bin Liu. "Attribute Inference Attacks in Online Social Networks." ACM Transactions on Privacy and Security 21, no. 1 (January 6, 2018): 1–30. http://dx.doi.org/10.1145/3154793.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lachat, Paul, Nadia Bennani, Veronika Rehn-Sonigo, Lionel Brunie, and Harald Kosch. "Detecting Inference Attacks Involving Raw Sensor Data: A Case Study." Sensors 22, no. 21 (October 24, 2022): 8140. http://dx.doi.org/10.3390/s22218140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 , for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user’s information can be processed online in an acceptable time.
3

Nithish Ranjan Gowda, Et al. "Preserve data-while-sharing: An Efficient Technique for Privacy Preserving in OSNs." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 3341–53. http://dx.doi.org/10.17762/ijritcc.v11i9.9540.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationships, sharing personal experiences, and providing other services. Rapid growth in Social Network has attracted various groups like the scientific community and business enterprise to use these huge social network data to serve their various purposes. The process of disseminating extensive datasets from online social networks for the purpose of conducting diverse trend analyses gives rise to apprehensions regarding privacy, owing to the disclosure of personal information disclosed on these platforms. Privacy control features have been implemented in widely used online social networks (OSNs) to empower users in regulating access to their personal information. Even if Online Social Network owners allow their users to set customizable privacy, attackers can still find out users’ private information by finding the relationships between public and private information with some background knowledge and this is termed as inference attack. In order to defend against these inference attacks this research work could completely anonymize the user identity. This research work designs an optimization algorithm that aims to strike a balance between self-disclosure utility and their privacy. This research work proposes two privacy preserving algorithms to defend against an inference attack. The research work design an Privacy-Preserving Algorithm (PPA) algorithm which helps to achieve high utility by allowing users to share their data with utmost privacy. Another algorithm-Multi-dimensional Knapsack based Relation Disclosure Algorithm (mdKP-RDA) that deals with social relation disclosure problems with low computational complexity. The proposed work is evaluated to test the effectiveness on datasets taken from actual social networks. According on the experimental results, the proposed methods outperform the current methods.
4

Srivastava, Agrima, and G. Geethakumari. "Privacy preserving solution to prevent classification inference attacks in online social networks." International Journal of Data Science 4, no. 1 (2019): 31. http://dx.doi.org/10.1504/ijds.2019.098357.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Srivastava, Agrima, and G. Geethakumari. "Privacy preserving solution to prevent classification inference attacks in online social networks." International Journal of Data Science 4, no. 1 (2019): 31. http://dx.doi.org/10.1504/ijds.2019.10019813.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lakshmanan, Nitya, Abdelhak Bentaleb, Byoungjun Choi, Roger Zimmermann, Jun Han, and Min Suk Kang. "On Privacy Risks of Watching YouTube over Cellular Networks with Carrier Aggregation." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 1 (March 29, 2022): 1–22. http://dx.doi.org/10.1145/3517261.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
One's core values, personality, and social status may be reflected in the watch history of online video streaming services such as YouTube. Unfortunately, several prior research work demonstrates that man-in-the-middle or malware-assisted attackers can accurately infer the titles of encrypted streaming videos by exploiting the inherent correlation between the encoded video contents and the traffic rate changes. In this paper, we present a novel video-inference attack called Moba that further exacerbates the problem by only requiring the adversary to simply eavesdrop the broadcast messages of a primary cell of a targeted user's cellular phone. Our attack utilizes a side channel in modern cellular networks that leaks the number of actively transmitting cells for each user. We show that this seemingly harmless system information leakage can be used to achieve practical video-inference attacks. To design effective video-inference attacks, we augment the coarse-grained side-channel measurements with precise timing information and estimate the traffic bursts of encrypted video contents. The Moba attack considers an adversary-chosen set of suspect YouTube videos, from which a targeted user may watch some videos during the attack. We confirm the feasibility of Moba in identifying the exact YouTube video title (if it is from the suspect set) via our over-the-air experiments conducted in LTE-Advanced networks in two countries. Moba can be effective in verifying whether a targeted user watches any of the suspect videos or not; e.g., precision of 0.98 is achieved after observing six-minutes of a single video play. When further allowed to observe multiple video plays, Moba adversary is able to identify whether the targeted user frequently watches the suspect videos with a probability close to one and a near-zero false positive rate. Finally, we present a simple padding-based countermeasure that significantly reduces the attack effectiveness without sacrificing any cellular radio resources.
7

He, Xiaoyun, and Haibing Lu. "Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework." Journal of Information Privacy and Security 13, no. 3 (July 3, 2017): 104–19. http://dx.doi.org/10.1080/15536548.2017.1357383.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Ruan, Yefeng, and Arjan Durresi. "A survey of trust management systems for online social communities – Trust modeling, trust inference and attacks." Knowledge-Based Systems 106 (August 2016): 150–63. http://dx.doi.org/10.1016/j.knosys.2016.05.042.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

R, Balamurugan, Dhivakar M, Muruganantham G, and Ramprakash S. "Securing Heterogeneous Privacy Protection in Social Network Records based Encryption Scheme." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (March 20, 2019): 10–13. http://dx.doi.org/10.17762/ijritcc.v7i3.5249.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.
10

Basati, Amir, Josep M. Guerrero, Juan C. Vasquez, Najmeh Bazmohammadi, and Saeed Golestan. "A Data-Driven Framework for FDI Attack Detection and Mitigation in DC Microgrids." Energies 15, no. 22 (November 15, 2022): 8539. http://dx.doi.org/10.3390/en15228539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper proposes a Data-Driven (DD) framework for the real-time monitoring, detection, and mitigation of False Data Injection (FDI) attacks in DC Microgrids (DCMGs). A supervised algorithm is adopted in this framework to continuously estimate the output voltage and current for all Distributed Generators (DGs) with acceptable accuracy. Accordingly, among the various evaluated supervised DD algorithms, Adaptive Neuro-Fuzzy Inference Systems (ANFISs) are utilized because of their low computational burden, efficiency in operation, and simplicity in design and implementation in a distributed control system. The proposed framework is based on the residual analysis of the generated error signal between the estimated and actual sensed signals. The proposed framework detects and mitigates the cyber-attack depending on trends in generated error signals. Moreover, by applying Online Change Point Detection (OCPD), the need for a static user-defined threshold for the residual analysis of the generated error signal is dispelled. Finally, the proposed method is validated in a MATLAB/Simulink testbed, considering the resilience, effectiveness, accuracy, and robustness of multiple case study scenarios.
11

Brau, Fabio, Giulio Rossolini, Alessandro Biondi, and Giorgio Buttazzo. "Robust-by-Design Classification via Unitary-Gradient Neural Networks." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (June 26, 2023): 14729–37. http://dx.doi.org/10.1609/aaai.v37i12.26721.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The use of neural networks in safety-critical systems requires safe and robust models, due to the existence of adversarial attacks. Knowing the minimal adversarial perturbation of any input x, or, equivalently, knowing the distance of x from the classification boundary, allows evaluating the classification robustness, providing certifiable predictions. Unfortunately, state-of-the-art techniques for computing such a distance are computationally expensive and hence not suited for online applications. This work proposes a novel family of classifiers, namely Signed Distance Classifiers (SDCs), that, from a theoretical perspective, directly output the exact distance of x from the classification boundary, rather than a probability score (e.g., SoftMax). SDCs represent a family of robust-by-design classifiers. To practically address the theoretical requirements of an SDC, a novel network architecture named Unitary-Gradient Neural Network is presented. Experimental results show that the proposed architecture approximates a signed distance classifier, hence allowing an online certifiable classification of x at the cost of a single inference.
12

Geetha, Dr V., Dr C. K. Gomathy*, Mr Maddu Pavan Manikanta Kiran, and Mr Gandikota Rajesh. "A Secure Based Preserving Social Media Data Management System." International Journal of Engineering and Advanced Technology 10, no. 4 (April 30, 2021): 210–14. http://dx.doi.org/10.35940/ijeat.d2455.0410421.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Personalized suggestions are important to help users find relevant information. It often depends on huge collection of user data, especially users’ online activity (e.g., liking/commenting/sharing) on social media, thereto user interests. Publishing such user activity makes inference attacks easy on the users, as private data (e.g., contact details) are often easily gathered from the users’ activity data. during this module, we proposed PrivacyRank, an adjustable and always protecting privacy on social media data publishing framework , which protects users against frequent attacks while giving personal ranking based recommendations. Its main idea is to continuously blur user activity data like user-specified private data is minimized under a given data budget, which matches round the ranking loss suffer from the knowledge blurring process so on preserve the usage of the info for enabling suggestions. a true world evaluation on both synthetic and real-world datasets displays that our model can provide effective and continuous protection against to the info given by the user, while still conserving the usage of the blurred data for private ranking based suggestion. Compared to other approaches, Privacy Rank achieves both better privacy protection and a far better usage altogether the rank based suggestions use cases we tested.
13

Suwanto, Suwanto, M. Hasan Bisri, Dian Candra Rini Novitasari, and Ahmad Hanif Asyhar. "Classification of EEG Signals using Fast Fourier Transform (FFT) and Adaptive Neuro Fuzzy Inference System (ANFIS)." Jurnal Matematika "MANTIK" 5, no. 1 (May 31, 2019): 35–44. http://dx.doi.org/10.15642/mantik.2019.5.1.35-44.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Epilepsy is a disease that attacks the brain and results in seizures due to neurological disorders. The electrical activity of the brain recorded by the EEG signal test, because EEG test can be used to diagnose brain and mental diseases such as epilepsy. This study aims to identify whether a person has epilepsy or not along with the result of accurate, sensitivity, and precision rate using Fast Fourier Transform (FFT) and Adaptive Neuro-Fuzzy Inference System (ANFIS) method. The FFT is used to transform EEG signals from time-based into frequency-based and continued with feature extraction to take characteristics from each filtering signal using the median, mean, and standard deviations of each EEG signal. The results of the feature extraction used for input on the category process based on characteristics data (classification) using ANFIS. EEG signal data is obtained from epilepsy center online database of Bonn University, German. The results of the EEG signal classification system using ANFIS with two classes (Normal-Epilepsy) states accuracy, sensitivity, and precision of 100%. The classification systems with three class division (Normal-Not Seizure Epilepsy-Epilepsy) resulted in an accuracy of 89.33% sensitivity of 89.37% and precision of 89.33%.
14

Aljebreen, Mohammed, Fatma S. Alrayes, Sumayh S. Aljameel, and Muhammad Kashif Saeed. "Political Optimization Algorithm with a Hybrid Deep Learning Assisted Malicious URL Detection Model." Sustainability 15, no. 24 (December 13, 2023): 16811. http://dx.doi.org/10.3390/su152416811.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the enhancement of the Internet of Things (IoT), smart cities have developed the idea of conventional urbanization. IoT networks permit distributed smart devices to collect and process data in smart city structures utilizing an open channel, the Internet. Accordingly, challenges like security, centralization, privacy (i.e., execution data poisoning and inference attacks), scalability, transparency, and verifiability restrict faster variations of smart cities. Detecting malicious URLs in an IoT environment is crucial to protect devices and the network from potential security threats. Malicious URL detection is an essential element of cybersecurity. It is established that malicious URL attacks mean large risks in smart cities, comprising financial damages, losses of personal identifications, online banking, losing data, and loss of user confidentiality in online businesses, namely e-commerce and employment of social media. Therefore, this paper concentrates on the proposal of a Political Optimization Algorithm by a Hybrid Deep Learning Assisted Malicious URL Detection and Classification for Cybersecurity (POAHDL-MDC) technique. The presented POAHDL-MDC technique identifies whether malicious URLs occur. To accomplish this, the POAHDL-MDC technique performs pre-processing to transform the data to a compatible format, and a Fast Text word embedding process is involved. For malicious URL recognition, a Hybrid Deep Learning (HDL) model integrates the features of stacked autoencoder (SAE) and bi-directional long short-term memory (Bi-LSTM). Finally, POA is exploited for optimum hyperparameter tuning of the HDL technique. The simulation values of the POAHDL-MDC approach are tested on a Malicious URL database, and the outcome exhibits an improvement of the POAHDL-MDC technique with a maximal accuracy of 99.31%.
15

Humbert, Mathias, Kévin Huguenin, Joachim Hugonot, Erman Ayday, and Jean-Pierre Hubaux. "De-anonymizing Genomic Databases Using Phenotypic Traits." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (June 1, 2015): 99–114. http://dx.doi.org/10.1515/popets-2015-0020.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractPeople increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.
16

Fei, Geli, Arjun Mukherjee, Bing Liu, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. "Exploiting Burstiness in Reviews for Review Spammer Detection." Proceedings of the International AAAI Conference on Web and Social Media 7, no. 1 (August 3, 2021): 175–84. http://dx.doi.org/10.1609/icwsm.v7i1.14400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Online product reviews have become an important source of user opinions. Due to profit or fame, imposters have been writing deceptive or fake reviews to promote and/or to demote some target products or services. Such imposters are called review spammers. In the past few years, several approaches have been proposed to deal with the problem. In this work, we take a different approach, which exploits the burstiness nature of reviews to identify review spammers. Bursts of reviews can be either due to sudden popularity of products or spam attacks. Reviewers and reviews appearing in a burst are often related in the sense that spammers tend to work with other spammers and genuine reviewers tend to appear together with other genuine reviewers. This paves the way for us to build a network of reviewers appearing in different bursts. We then model reviewers and their co-occurrence in bursts as a Markov Random Field (MRF), and employ the Loopy Belief Propagation (LBP) method to infer whether a reviewer is a spammer or not in the graph. We also propose several features and employ feature induced message passing in the LBP framework for network inference. We further propose a novel evaluation method to evaluate the detected spammers automatically using supervised classification of their reviews. Additionally, we employ domain experts to perform a human evaluation of the identified spammers and non-spammers. Both the classification result and human evaluation result show that the proposed method outperforms strong baselines, which demonstrate the effectiveness of the method.
17

Piao, Yangheran, Kai Ye, and Xiaohui Cui. "Privacy Inference Attack Against Users in Online Social Networks: A Literature Review." IEEE Access 9 (2021): 40417–31. http://dx.doi.org/10.1109/access.2021.3064208.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Lima Filho, Francisco Sales de, Frederico A. F. Silveira, Agostinho de Medeiros Brito Junior, Genoveva Vargas-Solar, and Luiz F. Silveira. "Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning." Security and Communication Networks 2019 (October 13, 2019): 1–15. http://dx.doi.org/10.1155/2019/1574749.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Users and Internet service providers (ISPs) are constantly affected by denial-of-service (DoS) attacks. This cyber threat continues to grow even with the development of new protection technologies. Developing mechanisms to detect this threat is a current challenge in network security. This article presents a machine learning- (ML-) based DoS detection system. The proposed approach makes inferences based on signatures previously extracted from samples of network traffic. The experiments were performed using four modern benchmark datasets. The results show an online detection rate (DR) of attacks above 96%, with high precision (PREC) and low false alarm rate (FAR) using a sampling rate (SR) of 20% of network traffic.
19

Xu, Jingjing, Changhong Dong, and Lin Cheng. "Deep Neural Network-Based Footprint Prediction and Attack Intention Inference of Hypersonic Glide Vehicles." Mathematics 11, no. 1 (December 29, 2022): 185. http://dx.doi.org/10.3390/math11010185.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In response to the increasing threat of hypersonic weapons, it is of great importance for the defensive side to achieve fast prediction of their feasible attack domain and online inference of their most probable targets. In this study, an online footprint prediction and attack intention inference algorithm for hypersonic glide vehicles (HGVs) is proposed by leveraging the utilization of deep neural networks (DNNs). Specifically, this study focuses on the following three contributions. First, a baseline multi-constrained entry guidance algorithm is developed based on a compound bank angle corridor, and then a dataset containing enough trajectories for the following DNN learning is generated offline by traversing different initial states and control commands. Second, DNNs are developed to learn the functional relationship between the flight state/command and the corresponding ranges; on this basis, an online footprint prediction algorithm is developed by traversing the maximum/minimum ranges and different heading angles. Due to the substitution of DNNs for multiple times of trajectory integration, the computational efficiency for footprint prediction is significantly improved to the millisecond level. Third, combined with the predicted footprint and the hidden information in historical flight data, the attack intention and most probable targets can be further inferred. Simulations are conducted through comparing with the state-of-the-art algorithms, and results demonstrate that the proposed algorithm can achieve accurate prediction for flight footprint and attack intention while possessing significant real-time advantage.
20

Yang, Wan, Marc Lipsitch, and Jeffrey Shaman. "Inference of seasonal and pandemic influenza transmission dynamics." Proceedings of the National Academy of Sciences 112, no. 9 (February 17, 2015): 2723–28. http://dx.doi.org/10.1073/pnas.1415012112.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The inference of key infectious disease epidemiological parameters is critical for characterizing disease spread and devising prevention and containment measures. The recent emergence of surveillance records mined from big data such as health-related online queries and social media, as well as model inference methods, permits the development of new methodologies for more comprehensive estimation of these parameters. We use such data in conjunction with Bayesian inference methods to study the transmission dynamics of influenza. We simultaneously estimate key epidemiological parameters, including population susceptibility, the basic reproductive number, attack rate, and infectious period, for 115 cities during the 2003–2004 through 2012–2013 seasons, including the 2009 pandemic. These estimates discriminate key differences in the epidemiological characteristics of these outbreaks across 10 y, as well as spatial variations of influenza transmission dynamics among subpopulations in the United States. In addition, the inference methods appear to compensate for observational biases and underreporting inherent in the surveillance data.
21

A. Galushkin, Alexander. "The Use of Information and Communications Technology to Foster the Competitiveness of the Entrepreneurial Organizations within the Education and Science Sector." International Journal of Engineering & Technology 7, no. 3.14 (July 25, 2018): 323. http://dx.doi.org/10.14419/ijet.v7i3.14.16913.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In recent years, a new market trading in cryptocurrencies and instruments based on them has been formed. The market of this paper addresses the use of information and communications technology to optimize the operation of institutions of higher learning and scientific organizations, boost their competitiveness through the systematization of their business processes, and enhance their qualitative characteristics. The author looks into employing information and communications technology to organize the institution’s distance learning systems, electronic educational environment, and electronic (online) learning system. The paper emphasizes that the use of information systems is of particular convenience with regard to setting up electronic research and scholarly libraries, which could be accessed over the Internet from just about anywhere in the world regardless of their actual physical location. Along with practical aspects, the author also examines some of the issue’s regulatory foundations and some of the compliance practices related to it. The paper stresses that, in a climate when virtually any object is vulnerable to attack by intruders, of particular relevance is the issue of ensuring information security both domestically and globally. The author concludes by drawing a set of inferences that are both of a practical nature and of a theoretical one.
22

Colman, A., D. M. Macedo, and R. W. Barreto. "First Report of Downy Mildew (Hyaloperonospora lunariae) on White Mustard (Sinapis alba) in Brazil." Plant Disease 98, no. 7 (July 2014): 1007. http://dx.doi.org/10.1094/pdis-12-13-1266-pdn.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Sinapis alba (Brassicaceae), white mustard, is broadly cultivated for its seed used as component of table mustard (4). In June 2013, a group of diseased S. alba were observed in a vegetable garden on the campus of the Universidade Federal de Viçosa (municipality of Viçosa, state of Minas Gerais, Brazil). Foliage of diseased plants showed numerous chlorotic areas that developed into severe leaf blight with abundant downy mildew growth abaxially. A dried representative specimen has been deposited in the herbarium at the Universidade Federal de Viçosa (accession no. VIC 39743). The fungus had the following morphology: Sporangiophores arborescent, dichotomously branched, 540 to 840 × 8 to 10 μm hyaline, smooth, branches 105 to 210 μm long; esterigmata subacutate and curved, in pairs, 15 to 42 μm long; sporangia globose, 18 to 24 × 15 to 18 μm, hyaline, smooth. DNA was extracted using a Wizard Promega purification kit. The cytochrome oxidase subunit II (COX2) region was amplified with COX2f and COX2r primers (3). The sequence has been deposited in GenBank (Accession No. KJ396953). DNA sequences representing morphologically similar taxa were downloaded from GenBank nucleotide database, aligned in MEGA 5, and analyzed using Bayesian inference and Markov chain Monte Carlo simulation implemented in MrBayes 3.0 with five repetitions. A sequence of Albugo candida was used as outgroup in the analysis. The morphological characteristics places the fungus on S. alba in the complex of species of Pernosporaceae that attack the Brassicaceae. These are notoriously difficult to discriminate by morphology but our COX2-based phylogenetic analysis places it in Hyaloperonospora lunariae (1). This species was previously only known to cause downy mildew on other species of Brassicaceae (Lunaria annua and Erucastrum nasturtiifolium) in Europe (2). To our knowledge, this is the first report of this pathogen-host association in the world. References: (1) O. Constantinescu and J. Fatehi. Nova Hediwigia 74:291, 2002 (2) D. F. Farr and A. Y. Rossman. Fungal Databases, Systematic Mycology and Microbiology Laboratory. Online publication. ARS, USDA, 2013. (3) D. S. S. Hudspeth et al. Mycologia 92:674, 2000. (4) B. B. Simpson and M. C. Ogorzaly. Econonic Botany. McGraw Hill, San Diego, CA, 2001.
23

Yarovenko, Hanna, Agnieszka Lopatka, Tetyana Vasilyeva, and Imre Vida. "Socio-economic profiles of countries - cybercrime victims." Economics & Sociology 16, no. 2 (June 2023): 167–94. http://dx.doi.org/10.14254/2071-789x.2023/16-2/11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Adeyemo, K. A., Isiavwe, D., Adetula, D., Olamide, O., & Folashade, O. (2020). Mandatory adoption of the Central Bank of Nigeria’s cashless and e-payment policy: implications for bank customers. Banks and Bank Systems, 15(2), 243-253. https://doi.org/10.21511/bbs.15(2).2020.21 Barabashev, A., Makarov, I., & Zarochintcev, S. (2022). How to shape government policies on high-technology development using the indicative evaluation of risks? Administratie si Management Public, 38, 70-89. https://doi.org/10.24818/amp/2022.38-04 Bayram, M., & Akat, M. (2019). Market-Neutral Trading with Fuzzy Inference, a New Method for the Pairs Trading Strategy. Engineering Economics, 30(4), 411-421. https://doi.org/10.5755/j01.ee.30.4.14350 Bing, C., & Schectman, J. (2019). Inside the UAE’s secret hacking team of American mercenaries. Retrieved from: https://www.reuters.com/investigates/special-report/usa-spying-raven/ (31.01.2023). Bozhenko, V. (2022). Tackling corruption in the health sector. Health Economics and Management Review, 3(3), 32-39. https://doi.org/10.21272/hem.2022.3-03 Bozhenko, V. V., Lyeonov, S. V., Polishchuk, E. A., Boyko, A. O., & Artyukhova, N. O. (2022). Identification of determinants of corruption in government: a mar-spline approach. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, 6, 176-180. https://doi.org/10.33271/nvngu/2022-6/176 Bozhenko, V., Mynenko, S., & Shtefan, A. (2022b). Financial Fraud Detection on Social Networks Based on a Data Mining Approach. Financial Markets, Institutions and Risks, 6(4), 119-124. https://doi.org/10.21272/fmir.6(4).119-124.2022 Caballero-Morales, S.-O., Cordero Guridi, J. de J., Alvarez-Tamayo, R. I., & Cuautle-Gutiérrez, L. (2020). EDUCATION 4.0 to support entrepreneurship, social development and education in emerging economies. International Journal of Entrepreneurial Knowledge, 8(2), 89-100. https://doi.org/10.37335/ijek.v8i2.119 Chen, Y., Xu, S., Lyulyov, O., & Pimonenko, T. (2023). China’s digital economy development: incentives and challenges. Technological and Economic Development of Economy, 29(2), 518-538. https://doi.org/10.3846/tede.2022.18018 Ćwiklicki, M., & Wojnarowska, M. (2020). Circular Economy and Industry 4.0: One-Way or Two-way Relationships? Engineering Economics, 31(4), 387-397. https://doi.org/10.5755/j01.ee.31.4.24565 DavidPur, N. (2022). Which Countries are Most Dangerous? Cyber Attack Origin – by Country. Retrieved from: https://blog.cyberproof.com/blog/which-countries-are-most-dangerous (31.01.2023). Dečman, M., Stare, J., & Klun, M. (2022). The impact of the COVID-19 crisis on the development of the information society in Slovenia. Administratie si Management Public, 39, 77-96. https://doi.org/10.24818/amp/2022.39-05 Deutsche Welle (2022). Ukrainian websites hacked in 'global attack'. Retrieved from: https://www.dw.com/en/ukraine-government-websites-hacked-in-global-attack/a-60421475 (31.01.2023). Dluhopolskyi, O., Pakhnenko, O., Lyeonov, S., Semenog, A., Artyukhova, N., Cholewa-Wiktor, M., & Jastrzębski, W. (2023). Digital financial inclusion: COVID-19 impacts and opportunities. Sustainability (Switzerland), 15(3), 2383. https://doi.org/10.3390/su15032383 Economist Intelligence (2023). Democracy Index. Retrieved from: https://www.eiu.com/n/campaigns/democracy-index-2022/?utm_source=google&utm_medium=paid-search&utm_campaign=democracy-index-2022&gclid=CjwKCAjwgqejBhBAEiwAuWHioAEruOQA25JyHg-61MBEiYNJp9hvu3Pf91E_tWO2W0nauZ6on003ORoC6UsQAvD_BwE (31.01.2023). E-Governance Academy (2023). National Cyber Security Index. Retrieved from: https://ncsi.ega.ee/ncsi-index/ (31.01.2023). Fobel, P., & Kuzior, A. (2019). The future (Industry 4.0) is closer than we think. Will it also be ethical? Paper presented at the AIP Conference Proceedings, 2186. https://doi.org/10.1063/1.5137987 Glova, J., Bernatik, W., & Tulai, O. (2020). Determinant Effects of Political and Economic Factors on Country Risk: An Evidence from the EU Countries. Montenegrin Journal of Economics, 16(1), 37-53. https://doi.org/10.14254/1800-5845/2020.16-1.3 Gontareva, I., Babenko, V., Kuchmacz, B., & Arefiev, S. (2020). Valuation of information resources in the analysis of cybersecurity entrepreneurship. Estudios De Economia Aplicada, 38(4), https://doi.org/10.25115/EEA.V38I4.3984 Gupta, A., & Mishra, M. (2022). Ethical Concerns While Using Artificial Intelligence in Recruitment of Employees. Business Ethics and Leadership, 6(2), 6-11. https://doi.org/10.21272/bel.6(2).6-11.2022 Gurbanov, N., Yagublu, N., Akbarli, N., & Niftiyev, I. (2022). Digitalization and the Covid-19-led public crisis management: an evaluation of financial sustainability in the Azerbaijan business sector. SocioEconomic Challenges, 6(3), 23-38. https://doi.org/10.21272/sec.6(3).23-38.2022 Institute for Economics and Peace (2022). Global Terrorism Index 2022. Retrieved from: https://reliefweb.int/report/world/global-terrorism-index-2022 (31.01.2023). Kaspersky (2023). Cyberthreat real-time map. Retrieved from: https://cybermap.kaspersky.com/ (31.01.2023). Krebs, B. (2021). At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software. Retrieved from: https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/ (31.01.2023). Kumar, N., & Kumar, J. (2019). Efficiency 4.0 for Industry 4.0. Human Technology, 15(1), 55-78. https://doi.org/10.17011/ht/urn.201902201608 Kurniawati, E., Kohar, U.H.A., & Pirzada, K. (2022). Change or destroy: the digital transformation of Indonesian MSMES to achieve sustainable economy. Polish Journal of Management Studies, 26(2), 248-264. https://doi.org/10.17512/pjms.2022.26.2.15 Kuzior, A., & Kwilinski, A. (2022). Cognitive technologies and artificial intelligence in social perception. Management Systems in Production Engineering, 30(2), 109-115. https://doi.org/10.2478/mspe-2022-0014 Kuzmenko, O., Šuleř, P., Lyeonov, S., Judrupa, I., & Boiko, A. (2020). Data mining and bifurcation analysis of the risk of money laundering with the involvement of financial institutions. Journal of International Studies, 13(3), 332-339. https://doi.org/10.14254/2071-8330.2020/13-3/22 Lăzăroiu, G., Androniceanu, A., Grecu, I., Grecu, G., & Neguriță, O. (2022). Artificial intelligence-based decision-making algorithms, Internet of Things sensing networks, and sustain-able cyber-physical management systems in big data-driven cognitive manufacturing. Oeconomia Copernicana, 13(4), 1047-1080. https://doi.org/10.24136/oc.2022.030 Lucas, G. (2016). Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford University Press. Lyulyov, O., Lyeonov, S., Tiutiunyk, I., & Podgórska, J. (2021). The impact of tax gap on macroeconomic stability: Assessment using panel VEC approach. Journal of International Studies, 14(1), 139-152. https://doi.org/10.14254/2071-8330.2021/14-1/10 Mačiulytė-Šniukienė, A., Butkus, M., & Davidavičienė, V. (2022). Development of the model to examine the impact of infrastructure on economic growth and convergence. Journal of Business Economics and Management, 23(3), 731-753. https://doi.org/10.3846/jbem.2022.17140 Melnyk, L., Derykolenko, O., Kubatko, O., & Matsenko, O. (2019). Business models of reproduction cycles for digital economy. Paper presented at the CEUR Workshop Proceedings, 2393, 269-276. Retrieved from https://www.scopus.com/record/display.uri?eid=2-s2.0-85069504652&origin=resultslist Melnyk, L., Kubatko, O., Piven, V., Klymenko, K., & Rybina, L. (2021). Digital and economic transformations for sustainable development promotion: A case of OECD countries. Environmental Economics, 12(1), 140-148. https://doi.org/10.21511/EE.12(1).2021.12 Millia, H., Adam, P, Muhatlib, A. A., & Tajuddin and Pasrun, Y. P. (2022). The Effect of Inward Foreign Direct Investment and Information and Communication Technology on Economic Growth in Indonesia. AGRIS on-line Papers in Economics and Informatics, 14(1), 69-79. https://doi.org/10.7160/aol.2022.140106 Mnohoghitnei, I., Horobeț, A., & Belașcu, L. (2022). Bitcoin is so Last Decade-How Decentralized Finance (DeFi) could Shape the Digital Economy. European Journal of Interdisciplinary Studies, 14(1), 87-99. https://doi.org/10.24818/ejis.2022.01 Numbeo (2023). Crime Index by Country 2022. Retrieved from: https://www.numbeo.com/crime/rankings_by_country.jsp?title=2022 (31.01.2023). Orlov, V., Bukhtiarova, A., Marczuk, M., & Heyenko, M. (2021). International economic and social determinants of the state economic security: A causal analysis. Problems and Perspectives in Management, 19(4), 301-310. https://doi.org/10.21511/ppm.19(4).2021.24 Pakhnenko, O., & Kuan, Z. (2023). Ethics of Digital Innovation in Public Administration. Business Ethics and Leadership, 7(1), 113-121. https://doi.org/10.21272/bel.7(1).113-121.2023 Pakhnenko, O., Rubanov, P., Girzheva, O., Ivashko, L., Britchenko, I., & Kozachenko, L. (2022). Cryptocurrency: Value formation factors and investment risks. Journal of Information Technology Management, 14, 179-200. https://doi.org/10.22059/JITM.2022.88896 Perlroth, N., Scott, M, & Frenkel, S. (2017). Cyberattack Hits Ukraine Then Spreads Internationally. Retrieved from: https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html (31.01.2023). Remeikienė, R., Ligita, G., Fedajev, A., Raistenskis, E., & Krivins, A. (2022). Links between crime and economic development: EU classification. Equilibrium. Quarterly Journal of Economics and Economic Policy, 17(4), 909-938. https://doi.org/10.24136/eq.2022.031 Rousseeuw, P.J. (1987). Silhouettes: a Graphical Aid to the Interpretation and Validation of Cluster Analysis. Computational and Applied Mathematics, 20, 53-65. https://doi.org/10.1016/0377-0427(87)90125-7 Safarov, G., Sadiqova, S., Urazayeva, M., & Abbasova, N (2022). Theoretical and Methodological Aspects of Innovative-Industrial Cluster Development in the Era of Digitalization. Marketing and Management of Innovations, 4, 184-197. https://doi.org/10.21272/mmi.2022.4-17 Șavga, L. (2019). Implementing the Smart Specialization Concept in the Republic of Moldova: Challenges and Initiatives. Journal of Research on Trade, Management and Economic Development, 6(2), 6-17. Şavga, L., & Baran, T. (2022). Boosting the process of smart specialization in the Republic of Moldova. Paper presented in Contemporary Issues in Economy and Technology (pp. 187-196). Shao, X., Wang, D., Li, X., & Shao, H. (2022). Impact of Internet technology on spatial technology heterogeneity: openness or convergence - evidence from provincial data in China. Transformations in Business & Economics, 21(2), 193-213. Shkolnyk, I., Frolov, S., Orlov, V., Datsenko, V., & Kozmenko, Y. (2022). The impact of financial digitalization on ensuring the economic security of a country at war: New measurement vectors. Investment Management and Financial Innovations, 19(3), 119-138. https://doi.org/10.21511/imfi.19(3).2022.11 Smith, E.T. (2013). Cyber warfare: a misrepresentation of the true cyber threat. American Intelligence Journal, 31(1), 82-85. Sobczak, A. (2022). Analysis of the Conditions Influencing the Assimilation of the Robotic Process Automation by Enterprises. Human Technology, 18(2), 143-190. doi: 10.14254/1795-6889.2022.18-2.4 Statista (2023). Most commonly reported cyber crime categories worldwide in 2022, by number of individuals affected. Retrieved from: https://www.statista.com/statistics/184083/commonly-reported-types-of-cyber-crime-global/ (31.01.2023). Stehel, V., Vochozka, M., Kliestik, T., & Bakes, V. (2019). Economic analysis of implementing VMI model using game theory. Oeconomia Copernicana, 10(2), 253-272. https://doi.org/10.24136/oc.2019.013 Straková, J., Talíř, M., & Váchal, J. (2022). Opportunities and threats of digital transformation of business models in SMEs. Economics and Sociology, 15(3), 159-171. https://doi.org/10.14254/2071-789X.2022/15-3/9 The Heritage Foundation (2023). 2023 Index of Economic Freedom. Retrieved from: https://www.heritage.org/index/download (31.01.2023). The World Bank (2023). Life expectancy at birth, total (years). Retrieved from: https://data.worldbank.org/indicator/SP.DYN.LE00.IN (31.01.2023). Tiutiunyk, I. V., Zolkover, A. O., Lyeonov, S. V., & Ryabushka, L. B. (2022a). The impact of economic shadowing on social development: challenges for macroeconomic stability. Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, 1, 183-191. https://doi.org/10.33271/nvngu/2022-1/183 Tiutiunyk, I., Cieśliński, W., Zolkover, A., & Vasa, L. (2022b). Foreign direct investment and shadow economy: One-way effect or multiple-way causality? Journal of International Studies, 15(4), 196-212. https://doi.org/10.14254/2071-8330.2022/15-4/12 Tran, L. Q. T., Phan, D. T., Herdon, M., & Kovacs, L. (2022). Assessing the Digital Transformation in Two Banks: Case Study in Hungary. AGRIS on-line Papers in Economics and Informatics, 14(2), 121-134. https://doi.org/10.7160/aol.2022.140210 Transparency International (2023). Corruption_Perceptions_Index. Retrieved from: https://www.transparency.org/en/cpi/2021?gclid=CjwKCAjw67ajBhAVEiwA2g_jEPyd355cvDdhD7SdWVteYeer5WvV3BZFHMo-Ox6p3vXSGk9wKi4p4BoCRJgQAvD_BwE (31.01.2023). Tribune (2020). Major cyber attack by Indian intelligence identified: ISPR. Retrieved from: https://tribune.com.pk/story/2259193/major-cyber-attack-by-indian-intelligence-identified-ispr (31.01.2023). Tvaronaviciene, M., & Burinskas, A. (2020). Industry 4.0 significance to competition and the eu competition policy. Economics & Sociology, 13(3), 244-258. https://doi.org/10.14254/2071-789X.2020/13-3/15 U.S. Department of Homeland Security (2016). Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security. Retrieved from: https://www.dhs.gov/news/2016/10/07/joint-statement-department-homeland-security-and-office-director-national (31.01.2023). Vasudevan, H. (2022). Management and Leadership in the Klang Valley IT Sector: Conceptual Approach. Marketing and Management of Innovations, 3, 56-65. https://doi.org/10.21272/mmi.2022.3-05 Vitvitskiy, S. S., Kurakin, O. N., Pokataev, P. S., Skriabin, O. M., & Sanakoiev, D. B. (2021). Peculiarities of cybercrime investigation in the banking sector of Ukraine: review and analysis. Banks and Bank Systems, 16(1), 69-80. https://doi.org/10.21511/bbs.16(1).2021.07 Voo, J., Hemani, I., & Cassidy, D. (2022). National Cyber Power Index 2022. Retrieved from: https://www.belfercenter.org/sites/default/files/files/publication/CyberProject_National%20Cyber%20Power%20Index%202022_v3_220922.pdf (31.01.2023). Voronenko, I., Nehrey, M., Laptieva, A., Babenko, V., & Rohoza, K. (2022). National cybersecurity: Assessment, risks and trends. International Journal of Embedded Systems, 15(3), 226-238. https://doi.org/10.1504/IJES.2022.124854 Wang, Q., Chen, Y., Guan, H., Lyulyov, O., & Pimonenko, T. (2022). Technological innovation efficiency in China: Dynamic evaluation and driving factors. Sustainability (Switzerland), 14(14). https://doi.org/10.3390/su14148321 Wisevoter (2023). Most Powerful Countries in the World. Retrieved from: https://wisevoter.com/country-rankings/most-powerful-countries-in-the-world/ (31.01.2023). World Happiness Report (2023). World Happiness Report 2022. Retrieved from: https://worldhappiness.report/ed/2022/ (31.01.2023). Yarovenko, H. (2020). Evaluating the threat to national information security. Problems and Perspectives in Management, 18(3), 195-210. https://doi.org/10.21511/ppm.18(3).2020.17 Yarovenko, H., & Rogkova, M. (2022). Dynamic and bibliometric analysis of terms identifying the combating financial and cyber fraud system. Financial Markets, Institutions and Risks, 6(3), 93-104. https://doi.org/10.21272/fmir.6(3).93-104.2022 Yoshimori, H., & Yoshimori, M. (2022). An Education Gift – Integrated Cognitive and Non-Cognitive Skills – for Future Generations to Grow the Economy in the Digital Phase. SocioEconomic Challenges, 6(2), 5-18. https://doi.org/10.21272/sec.6(2).5-18.2022 Yu, Y., Xinxin, W., Ruoxi, L., & Tingting, Y. (2023). The Mediating Role of Human Capital in the Relationship between Education Expenditure and Science and Technology Innovation: Evidence from China. SocioEconomic Challenges, 7(1), 129-138. https://doi.org/10.21272/sec.7(1).129-138.2023 Zimaitis, I., Urbonavičius, S., Degutis, M., & Kaduškevičiūtė, V. (2022). Influence of trust and conspiracy beliefs on the disclosure of personal data online. Journal of Business Economics and Management, 23(3), 551-568. https://doi.org/10.3846/jbem.2022.16119
24

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Yi, Yuzi, Jingsha He, Nafei Zhu, and Xiangjun Ma. "Social influence‐based privacy inference attacks in online social networks." SECURITY AND PRIVACY 5, no. 2 (November 21, 2021). http://dx.doi.org/10.1002/spy2.194.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Javaheripi, Mojan, Jung-Woo Chang, and Farinaz Koushanfar. "A cc H ashtag : Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks." ACM Journal on Emerging Technologies in Computing Systems, August 10, 2022. http://dx.doi.org/10.1145/3555808.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We propose A cc H ashtag , the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severe DNN accuracy degradation caused by bit flips. In this scenario, the attacker changes a few DNN weight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, A cc H ashtag extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model’s integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding the weights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. A cc H ashtag incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for A cc H ashtag on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of A cc H ashtag in terms of both attack detection and execution overhead.
28

Hu, Hongsheng, Zoran Salcic, Lichao Sun, Gillian Dobbie, Philip S. Yu, and Xuyun Zhang. "Membership Inference Attacks on Machine Learning: A Survey." ACM Computing Surveys, March 23, 2022. http://dx.doi.org/10.1145/3523273.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Machine learning (ML) models have been widely applied to various applications, including image classification, text generation, audio recognition, and graph data analysis. However, recent studies have shown that ML models are vulnerable to membership inference attacks (MIAs), which aim to infer whether a data record was used to train a target model or not. MIAs on ML models can directly lead to a privacy breach. For example, via identifying the fact that a clinical record that has been used to train a model associated with a certain disease, an attacker can infer that the owner of the clinical record has the disease with a high chance. In recent years, MIAs have been shown to be effective on various ML models, e.g., classification models and generative models. Meanwhile, many defense methods have been proposed to mitigate MIAs. Although MIAs on ML models form a newly emerging and rapidly growing research area, there has been no systematic survey on this topic yet. In this paper, we conduct the first comprehensive survey on membership inference attacks and defenses. We provide the taxonomies for both attacks and defenses, based on their characterizations, and discuss their pros and cons. Based on the limitations and gaps identified in this survey, we point out several promising future research directions to inspire the researchers who wish to follow this area. This survey not only serves as a reference for the research community but also provides a clear description for researchers outside this research domain. To further help the researchers, we have created an online resource repository, which we will keep updated with future relevant work. Interested readers can find the repository at https://github.com/HongshengHu/membership-inference-machine-learning-literature.
29

Venkatesaramani, Rajagopal, Zhiyu Wan, Bradley A. Malin, and Yevgeniy Vorobeychik. "Defending Against Membership Inference Attacks on Beacon Services." ACM Transactions on Privacy and Security, June 7, 2023. http://dx.doi.org/10.1145/3603627.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Large genomic datasets are created through numerous activities, including recreational genealogical investigations, biomedical research, and clinical care. At the same time, genomic data has become valuable for reuse beyond their initial point of collection, but privacy concerns often hinder access. Beacon services have emerged to broaden accessibility to such data. These services enable users to query for the presence of a particular minor allele in a dataset, information helps care providers determine if genomic variation is spurious or has some known clinical indication. However, various studies have shown that this process can leak information regarding if individuals are members of the underlying dataset. There are various approaches to mitigate this vulnerability, but they are limited in that they 1) typically rely on heuristics to add noise to the beacon responses, 2) offer probabilistic privacy guarantees only, neglecting data utility and 3) assume a batch setting where all queries arrive at once. In this paper, we present a novel algorithmic framework to ensure privacy in a Beacon service setting with a minimal number of query response flips. We represent this problem as one of combinatorial optimization in both the batch setting, as well as the online setting (where queries arrive sequentially). We introduce principled algorithms with both privacy and, in some cases, worst-case utility guarantees. Moreover, through extensive experiments, we show the proposed approaches significantly outperform the state of the art in terms of privacy and utility, using a dataset consisting of 800 individuals and 1.3 million SNVs.
30

Poudel, Shashank, Joshua P. Twining, Richard C. Stedman, Shravan Kumar Ghimire, and Angela K. Fuller. "Ecological and anthropogenic drivers of leopard (Panthera pardus fusca) attack occurrence on humans in Nepal." People and Nature, September 10, 2023. http://dx.doi.org/10.1002/pan3.10536.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract The negative impact of large carnivore presence in human‐dominated landscapes manifests as livestock depredation and in extreme cases as attacks on humans. In the case of conflict with leopards in Nepal, attacks resulting in human fatality have become more frequent over time, thus creating an urgent socio‐ecological and management issue. We estimated the occurrence of leopard attacks in Nepal from human‐leopard conflict cases reported in the media. We used occupancy models to analyse data collected from online news reports on incidents of leopard attacks on humans to explore drivers of leopard attacks on a landscape scale. Our results suggest that the probability of occurrence of leopard attack is associated with human population density, terrain ruggedness and livestock density. The human population density effect may be indicative of a density‐dependent relationship, where attacks are more likely in areas where an increased abundance of humans increases encounter rates with leopards. The positive effect of livestock density suggests that livestock may be drawing leopards into human settlements, and consequently increasing the likelihood of attacks on humans. Terrain ruggedness might be offering ideal conditions to facilitate attacks on humans, for example remoteness and high amounts of cover to launch ambush attacks. We provide inference and insights into key determinants of leopard attacks on humans on a landscape scale. These insights can be used to guide future research, inform mitigation measures to reduce leopard attacks and foster a better understanding of the interaction between people and leopards. This study demonstrates the applicability and novelty of using a hierarchical modelling framework applied to freely and publicly available media reports to inform the applied management of human‐wildlife conflict at a national scale. Read the free Plain Language Summary for this article on the Journal blog.
31

Reza, Khondker Jahid, Md Zahidul Islam, and Vladimir Estivill-Castro. "Privacy protection of online social network users, against attribute inference attacks, through the use of a set of exhaustive rules." Neural Computing and Applications, April 8, 2021. http://dx.doi.org/10.1007/s00521-021-05860-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Zhang, Honglei, Fangyuan Luo, Jun Wu, Xiangnan He, and Yidong Li. "LightFR: Lightweight Federated Recommendation with Privacy-preserving Matrix Factorization." ACM Transactions on Information Systems, December 22, 2022. http://dx.doi.org/10.1145/3578361.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Federated recommender system (FRS), which enables many local devices to train a shared model jointly without transmitting local raw data, has become a prevalent recommendation paradigm with privacy-preserving advantages. However, previous work on FRS performs similarity search via inner product in continuous embedding space, which causes an efficiency bottleneck when the scale of items is extremely large. We argue that such a scheme in federated settings ignores the limited capacities in resource-constrained user devices ( i.e. , storage space, computational overhead, and communication bandwidth), and makes it harder to be deployed in large-scale recommender systems. Besides, it has been shown that transmitting local gradients in real-valued form between server and clients may leak users’ private information. To this end, we propose a lightweight federated recommendation framework with privacy-preserving matrix factorization, LightFR , that is able to generate high-quality binary codes by exploiting learning to hash technique under federated settings, and thus enjoys both fast online inference and economic memory consumption. Moreover, we devise an efficient federated discrete optimization algorithm to collaboratively train model parameters between the server and clients, which can effectively prevent real-valued gradient attacks from malicious parties. Through extensive experiments on four real-world datasets, we show that our LightFR model outperforms several state-of-the-art FRS methods in terms of recommendation accuracy, inference efficiency and data privacy.
33

Chen, Haifeng. "Design and implementation of a vulnerability mining system for power internet of things terminal based on fuzzy mathematical model simulation platform." Intelligent Decision Technologies, November 23, 2023, 1–11. http://dx.doi.org/10.3233/idt-230241.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the rapid development of the economy, the power supply has also shown an increasing trend year by year, and many loopholes and hidden dangers have emerged during the operation of the power grid. The power grid may be subject to malicious attacks, such as hacker attacks, power theft, etc. This may lead to security risks such as power grid system paralysis and information leakage. In order to ensure the quality of power supply, it is necessary to optimize the distribution of electricity and improve power supply efficiency. This article pointed out the security performance issues of power Internet of Things (IoT) terminals and analyzed the design and implementation of a vulnerability mining system for power IoT terminals based on a fuzzy mathematical model simulation platform. This article used a fuzzy mathematical model to quantitatively evaluate the security performance of power IoT terminals, providing an effective theoretical basis for vulnerability mining. Based on the analysis of vulnerability mining technology classification and vulnerability attack process, this article characterizes vulnerability parameters through fuzzy mapping. Based on the collected vulnerability data and the online and device status of power IoT terminals, fuzzy logic inference is used to determine and mine potential vulnerability issues in power IoT terminals. This article aimed to improve the security performance of power IoT terminals and ensure the safe and stable operation of the power system. By testing the number of system vulnerabilities, vulnerability risk level, and vulnerability mining time of the power IoT terminal vulnerability mining system based on fuzzy mathematical models, it was found that the power IoT simulation platform based on fuzzy mathematical models has fewer terminal vulnerabilities. The fuzzy mathematical model can reduce the vulnerability risk level of the power IoT simulation platform system, and the time required for vulnerability mining was reduced; the time was reduced by 0.48 seconds, and the speed of vulnerability mining was improved. Fuzzy mathematical models can promote the development of the power industry, which provides strong support for the security protection of power IoT terminals.
34

"Role of Artificial Intelligence in Cyber Security." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 4628–30. http://dx.doi.org/10.35940/ijitee.a6115.119119.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.
35

"Reduction of Cyber Crimes by Effective Use of Artificial Intelligence Techniques." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 8643–45. http://dx.doi.org/10.35940/ijrte.d8566.118419.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Artificial Intelligence (AI) is a buzz word in the cyber world. It is still a developing science in multiple facets according to the challenges thrown by 21st century. Use of AI has become inseparable from human life. In this day and age one cannot imagine a world without AI as it has much significant impact on human life. The main objective of AI is to develop the technology based activities which represents the human knowledge in order to solve problems. Simply AI is study of how an individual think, work, learn and decide in any scenario of life, whether it may be related to problem solving or learning new things or thinking rationally or to arrive at a solution etc. AI is in every area of human life, naming a few it is into gaming, language processing, speech recognition, expert system, vision system, hand writing recognition, intelligence robots, financial transactions and what not, every activity of human life has become a subset of AI. In spite of numerous uses, AI can also used for destroying the human life, that is the reason human inference is required to monitor the AI activities. Cyber crimes has become quite common and become a daily news item. It is not just a problem faced in one country, it is across the world. Without strong security measures, AI is meaningless as it can be easily accessible by others. It has become a big threat for governments, banks, multinational companies through online attacks by hackers. Lot of individual and organizational data is exploited by hackers and it becomes a big threat to the cyber world. In this connection research in the area of AI and cyber security has gained more importance in the recent times and it is ever lasting also as it is a dynamic and sensitive issue linked to human life.
36

Yi, Yuzi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, and Yehong Luo. "A privacy‐sensitive data identification model in online social networks." Transactions on Emerging Telecommunications Technologies, October 9, 2023. http://dx.doi.org/10.1002/ett.4876.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractPrivacy protection in online social networks (OSNs) has received a great deal of attention in recent years. One way of circumventing conventional privacy protection is privacy inference based on data that can be easily obtained in OSNs. Previous work on privacy inference has studied the issue mostly from the viewpoint of the attackers and methods thus designed were mostly aimed at pursuing the accuracy of the inference results with little regard on the causes of privacy breaches. To develop more effective privacy protection mechanisms that takes privacy inference into consideration, it is necessary to identify the information that plays a more important role in privacy breaches. In this paper, we propose a privacy‐sensitive data identification model in OSNs, which can identify key pieces of data that are most sensitive as far the privacy of the user is concerned. Firstly, a privacy inference method is proposed based on conditional random fields to infer the privacy of the target users. Then, a privacy‐sensitive data identification method is proposed by using the intermediate data of the proposed privacy inference method based on the targeted influence maximization algorithm. Thus, the key pieces of data in the form of user attributes and relationships on which the privacy of the target user depends can be determined to facilitate the implementation of privacy protection mechanisms. The effectiveness as well as the advantages of the proposed model is verified and demonstrated through experiment using real datasets. The impact of the key factors on privacy inference is also analyzed to guide the design of effective privacy protection strategies.
37

Yang, Zhihai, Qindong Sun, and Yaling Zhang. "Probabilistic Inference and Trustworthiness Evaluation of Associative Links toward Malicious Attack Detection for Online Recommendations." IEEE Transactions on Dependable and Secure Computing, 2020, 1. http://dx.doi.org/10.1109/tdsc.2020.3023114.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Almadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Differential Privacy under Dependent Tuples - The Case of Genomic Privacy." Bioinformatics, November 8, 2019. http://dx.doi.org/10.1093/bioinformatics/btz837.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Motivation The rapid progress in genome sequencing has led to high availability of genomic data. However, due to growing privacy concerns about the participant’s sensitive information, accessing results and data of genomic studies is restricted to only trusted individuals. On the other hand, paving the way to biomedical discoveries requires granting open access to genomic databases. Privacy-preserving mechanisms can be a solution for granting wider access to such data while protecting their owners. In particular, there has been growing interest in applying the concept of differential privacy (DP) while sharing summary statistics about genomic data. DP provides a mathematically rigorous approach but it does not consider the dependence between tuples in a database, which may degrade the privacy guarantees offered by the DP. Results In this work, focusing on genomic databases, we show this drawback of DP and we propose techniques to mitigate it. First, using a real-world genomic dataset, we demonstrate the feasibility of an inference attack on differentially private query results by utilizing the correlations between the tuples in the dataset. The results show that the adversary can infer sensitive genomic data about a user from the differentially private query results by exploiting correlations between genomes of family members. Second, we propose a mechanism for privacy-preserving sharing of statistics from genomic datasets to attain privacy guarantees while taking into consideration the dependence between tuples. By evaluating our mechanism on different genomic datasets, we empirically demonstrate that our proposed mechanism can achieve up to 50% better privacy than traditional DP-based solutions. Availability https://github.com/nourmadhoun/Differential-privacy-genomic-inference-attack. Supplementary information Supplementary data are available at Bioinformatics online.
39

Honarvar, Saam, and Samaah Sullivan. "Abstract P232: Toxic Stress is Associated With Greater Odds of Cardiovascular Disease Among Younger but Not Older Women in the Go Red for Research Dataset." Circulation 149, Suppl_1 (March 19, 2024). http://dx.doi.org/10.1161/circ.149.suppl_1.p232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Introduction: The incidence of certain cardiovascular diseases (CVD) such as heart attack and stroke have been increasing among younger women (ages 35-54 years). Psychosocial stress may be an important risk factor for CVD among this group of women. We examined whether toxic stress was associated with an increased odds CVD and whether this association was greater among younger women (< 55 years of age) compared to older women (≥ 55 years of age). Hypothesis: Toxic stress would only be associated with CVD among younger women. Methods: We utilized data from participants enrolled in the American Heart Association Research Goes Red Registry, an online research platform powered by Verily. Women were asked if they had been diagnosed with any of the following heart related conditions (heart attack, hemorrhagic stroke, prior revascularization, or blocked arteries). Women were also asked whether they had experienced toxic stress defined as a significant life-defining stressful activity over a prolonged period unaccompanied by sufficient social resources or support such as loss of a child, racial discrimination, or job loss. Logistic regression models were used to estimate odds ratios between toxic stress and CVD as well as differences by age (< 55 versus ≥ 55 years of age) using an interaction term. Results: The analytic dataset included 1,354 women who completed both the RGR Survey and the Healthcare and Experience Survey. The mean age of participants was 47.8 (SD: 12.6), 70% were less than 55 years of age, 83% were Non-Hispanic White, 59% indicated that they had experienced toxic stress, and 12% had CVD. In final multivariable models, there were significant differences in the association between toxic stress and CVD by age group (toxic stress-by-age interaction = 0.05) such that toxic stress was only significantly associated with an increased odds of CVD among women < 55 years of age (OR: 2.00; 95% CI: 1.17, 3.44; p-value: 0.0119). In contrast, toxic stress was not significantly associated with an increased odds of CVD among older women ≥ 55 years of age (OR: 0.97; 95% CI: 0.59, 1.61; p-value: 0.9052). Conclusions: Toxic stress was associated with an increased odds of cardiovascular disease among younger, but not older women in this cross-sectional study. Stress may be an underrecognized risk factor for CVD, especially among younger women who may benefit from interventions to mitigate and prevent stress. These findings should be corroborated in future longitudinal or other study designs that can establish temporality and stronger inferences of causality.
40

Brabazon, Tara. "Welcome to the Robbiedome." M/C Journal 4, no. 3 (June 1, 2001). http://dx.doi.org/10.5204/mcj.1907.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
One of the greatest joys in watching Foxtel is to see all the crazy people who run talk shows. Judgement, ridicule and generalisations slip from their tongues like overcooked lamb off a bone. From Oprah to Rikki, from Jerry to Mother Love, the posterior of pop culture claims a world-wide audience. Recently, a new talk diva was added to the pay television stable. Dr Laura Schlessinger, the Mother of Morals, prowls the soundstage. attacking 'selfish acts' such as divorce, de facto relationships and voting Democrat. On April 11, 2001, a show aired in Australia that added a new demon to the decadence of the age. Dr Laura had been told that a disgusting video clip, called 'Rock DJ', had been televised at 2:30pm on MTV. Children could have been watching. The footage that so troubled our doyenne of daytime featured the British performer Robbie Williams not only stripping in front of disinterested women, but then removing skin, muscle and tissue in a desperate attempt to claim their gaze. This was too much for Dr Laura. She was horrified: her strident tone became piercing. She screeched, "this is si-ee-ck." . My paper is drawn to this sick masculinity, not to judge - but to laugh and theorise. Robbie Williams, the deity of levity, holds a pivotal role in theorising the contemporary 'crisis' of manhood. To paraphrase Austin Powers, Williams returned the ger to singer. But Williams also triumphed in a captivatingly original way. He is one of the few members of a boy band who created a successful solo career without regurgitating the middle of the road mantras of boys, girls, love, loss and whining about it. Williams' journey through post-war popular music, encompassing influences from both Sinatra and Sonique, forms a functional collage, rather than patchwork, of masculinity. He has been prepared to not only age in public, but to discuss the crevices and cracks in the facade. He strips, smokes, plays football, wears interesting underwear and drinks too much. My short paper trails behind this combustible masculinity, focussing on his sorties with both masculine modalities and the rock discourse. My words attack the gap between text and readership, beat and ear, music and men. The aim is to reveal how this 'sick masculinity' problematises the conservative rendering of men's crisis. Come follow me I'm an honorary Sean Connery, born '74 There's only one of me … Press be asking do I care for sodomy I don't know, yeah, probably I've been looking for serial monogamy Not some bird that looks like Billy Connolly But for now I'm down for ornithology Grab your binoculars, come follow me. 'Kids,' Robbie Williams Robbie Williams is a man for our age. Between dating supermodels and Geri 'Lost Spice' Halliwell [1], he has time to "love … his mum and a pint," (Ansen 85) but also subvert the Oasis cock(rock)tail by frocking up for a television appearance. Williams is important to theories of masculine representation. As a masculinity to think with, he creates popular culture with a history. In an era where Madonna practices yoga and wears cowboy boots, it is no surprise that by June 2000, Robbie Williams was voted the world's sexist man [2]. A few months later, in the October edition of Vogue, he posed in a British flag bikini. It is reassuring in an era where a 12 year old boy states that "You aren't a man until you shoot at something," (Issac in Mendel 19) that positive male role models exist who are prepared to both wear a frock and strip on national television. Reading Robbie Williams is like dipping into the most convincing but draining of intellectual texts. He is masculinity in motion, conveying foreignness, transgression and corruption, bartering in the polymorphous economies of sex, colonialism, race, gender and nation. His career has spanned the boy bands, try-hard rock, video star and hybrid pop performer. There are obvious resonances between the changes to Williams and alterations in masculinity. In 1988, Suzanne Moore described (the artist still known as) Prince as "the pimp of postmodernism." (165-166) Over a decade later, the simulacra has a new tour guide. Williams revels in the potency of representation. He rarely sings about love or romance, as was his sonic fodder in Take That. Instead, his performance is fixated on becoming a better man, glancing an analytical eye over other modes of masculinity. Notions of masculine crisis and sickness have punctuated this era. Men's studies is a boom area of cultural studies, dislodging the assumed structures of popular culture [3]. William Pollack's Real Boys has created a culture of changing expectations for men. The greater question arising from his concerns is why these problems, traumas and difficulties are emerging in our present. Pollack's argument is that boys and young men invest energy and time "disguising their deepest and most vulnerable feelings." (15) This masking is difficult to discern within dance and popular music. Through lyrics and dancing, videos and choreography, masculinity is revealed as convoluted, complex and fragmented. While rock music is legitimised by dominant ideologies, marginalised groups frequently use disempowered genres - like country, dance and rap genres - to present oppositional messages. These competing representations expose seamless interpretations of competent masculinity. Particular skills are necessary to rip the metaphoric pacifier out of the masculine mouth of popular culture. Patriarchal pop revels in the paradoxes of everyday life. Frequently these are nostalgic visions, which Kimmel described as a "retreat to a bygone era." (87) It is the recognition of a shared, simpler past that provides reinforcement to heteronormativity. Williams, as a gaffer tape masculinity, pulls apart the gaps and crevices in representation. Theorists must open the interpretative space encircling popular culture, disrupting normalising criteria. Multiple nodes of assessment allow a ranking of competent masculinity. From sport to business, drinking to sex, masculinity is transformed into a wired site of ranking, judgement and determination. Popular music swims in the spectacle of maleness. From David Lee Roth's skied splits to Eminem's beanie, young men are interpellated as subjects in patriarchy. Robbie Williams is a history lesson in post war masculinity. This nostalgia is conservative in nature. The ironic pastiche within his music videos features motor racing, heavy metal and Bond films. 'Rock DJ', the 'sick text' that vexed Doctor Laura, is Williams' most elaborate video. Set in a rollerdrome with female skaters encircling a central podium, the object of fascination and fetish is a male stripper. This strip is different though, as it disrupts the power held by men in phallocentralism. After being confronted by Williams' naked body, the observing women are both bored and disappointed at the lack-lustre deployment of masculine genitalia. After this display, Williams appears embarrassed, confused and humiliated. As Buchbinder realised, "No actual penis could every really measure up to the imagined sexual potency and social or magical power of the phallus." (49) To render this banal experience of male nudity ridiculous, Williams then proceeds to remove skin and muscle. He finally becomes an object of attraction for the female DJ only in skeletal form. By 'going all the way,' the strip confirms the predictability of masculinity and the ordinariness of the male body. For literate listeners though, a higher level of connotation is revealed. The song itself is based on Barry White's melody for 'It's ecstasy (when you lay down next to me).' Such intertextuality accesses the meta-racist excesses of a licentious black male sexuality. A white boy dancer must deliver an impotent, but ironic, rendering of White's (love unlimited) orchestration of potent sexuality. Williams' iconography and soundtrack is refreshing, emerging from an era of "men who cling … tightly to their illusions." (Faludi 14) When the ideological drapery is cut away, the male body is a major disappointment. Masculinity is an anxious performance. Fascinatingly, this deconstructive video has been demeaned through its labelling as pornography [4]. Oddly, a man who is prepared to - literally - shave the skin of masculinity is rendered offensive. Men's studies, like feminism, has been defrocking masculinity for some time. Robinson for example, expressed little sympathy for "whiny men jumping on the victimisation bandwagon or playing cowboys and Indians at warrior weekends and beating drums in sweat lodges." (6) By grating men's identity back to the body, the link between surface and depth - or identity and self - is forged. 'Rock DJ' attacks the new subjectivities of the male body by not only generating self-surveillance, but humour through the removal of clothes, skin and muscle. He continues this play with the symbols of masculine performance throughout the album Sing when you're winning. Featuring soccer photographs of players, coaches and fans, closer inspection of the images reveal that Robbie Williams is actually every character, in every role. His live show also enfolds diverse performances. Singing a version of 'My Way,' with cigarette in tow, he remixes Frank Sinatra into a replaying and recutting of masculine fabric. He follows one dominating masculinity with another: the Bond-inspired 'Millennium.' Some say that we are players Some say that we are pawns But we've been making money Since the day we were born Robbie Williams is comfortably located in a long history of post-Sinatra popular music. He mocks the rock ethos by combining guitars and drums with a gleaming brass section, hailing the lounge act of Dean Martin, while also using rap and dance samples. Although carrying fifty year's of crooner baggage, the spicy scent of homosexuality has also danced around Robbie Williams' career. Much of this ideology can be traced back to the Take That years. As Gary Barlow and Jason Orange commented at the time, Jason: So the rumour is we're all gay now are we? Gary: Am I gay? I am? Why? Oh good. Just as long as we know. Howard: Does anyone think I'm gay? Jason: No, you're the only one people think is straight. Howard: Why aren't I gay? What's wrong with me? Jason: It's because you're such a fine figure of macho manhood.(Kadis 17) For those not literate in the Take That discourse, it should come as no surprise that Howard was the TT equivalent of The Beatle's Ringo Starr or Duran Duran's Andy Taylor. Every boy band requires the ugly, shy member to make the others appear taller and more attractive. The inference of this dialogue is that the other members of the group are simply too handsome to be heterosexual. This ambiguous sexuality has followed Williams into his solo career, becoming fodder for those lads too unappealing to be homosexual: Oasis. Born to be mild I seem to spend my life Just waiting for the chorus 'Cause the verse is never nearly Good enough Robbie Williams "Singing for the lonely." Robbie Williams accesses a bigger, brighter and bolder future than Britpop. While the Gallagher brothers emulate and worship the icons of 1960s British music - from the Beatles' haircuts to the Stones' psychedelia - Williams' songs, videos and persona are chattering in a broader cultural field. From Noel Cowardesque allusions to the ordinariness of pub culture, Williams is much more than a pretty-boy singer. He has become an icon of English masculinity, enclosing all the complexity that these two terms convey. Williams' solo success from 1999-2001 occurred at the time of much parochial concern that British acts were not performing well in the American charts. It is bemusing to read Billboard over this period. The obvious quality of Britney Spears is seen to dwarf the mediocrity of British performers. The calibre of Fatboy Slim, carrying a smiley backpack stuffed with reflexive dance culture, is neither admitted nor discussed. It is becoming increasing strange to monitor the excessive fame of Williams in Britain, Europe, Asia and the Pacific when compared to his patchy career in the United States. Even some American magazines are trying to grasp the disparity. The swaggering king of Britpop sold a relatively measly 600,000 copies of his U.S. debut album, The ego has landed … Maybe Americans didn't appreciate his songs about being famous. (Ask Dr. Hip 72) In the first few years of the 2000s, it has been difficult to discuss a unified Anglo-American musical formation. Divergent discursive frameworks have emerged through this British evasion. There is no longer an agreed centre to the musical model. Throughout 1990s Britain, blackness jutted out of dance floor mixes, from reggae to dub, jazz and jungle. Plied with the coldness of techno was an almost too hot hip hop. Yet both were alternate trajectories to Cool Britannia. London once more became swinging, or as Vanity Fair declared, "the nerve centre of pop's most cohesive scene since the Pacific Northwest grunge explosion of 1991." (Kamp 102) Through Britpop, the clock turned back to the 1960s, a simpler time before race became 'a problem' for the nation. An affiliation was made between a New Labour, formed by the 1997 British election, and the rebirth of a Swinging London [5]. This style-driven empire supposedly - again - made London the centre of the world. Britpop was itself a misnaming. It was a strong sense of Englishness that permeated the lyrics, iconography and accent. Englishness requires a Britishness to invoke a sense of bigness and greatness. The contradictions and excesses of Blur, Oasis and Pulp resonate in the gap between centre and periphery, imperial core and colonised other. Slicing through the arrogance and anger of the Gallaghers is a yearning for colonial simplicity, when the pink portions of the map were the stable subjects of geography lessons, rather than the volatile embodiment of postcolonial theory. Simon Gikandi argues that "the central moments of English cultural identity were driven by doubts and disputes about the perimeters of the values that defined Englishness." (x) The reason that Britpop could not 'make it big' in the United States is because it was recycling an exhausted colonial dreaming. Two old Englands were duelling for ascendancy: the Oasis-inflected Manchester working class fought Blur-inspired London art school chic. This insular understanding of difference had serious social and cultural consequences. The only possible representation of white, British youth was a tabloidisation of Oasis's behaviour through swearing, drug excess and violence. Simon Reynolds realised that by returning to the three minute pop tune that the milkman can whistle, reinvoking parochial England with no black people, Britpop has turned its back defiantly on the future. (members.aol.com/blissout/Britpop.html) Fortunately, another future had already happened. The beats per minute were pulsating with an urgent affirmation of change, hybridity and difference. Hip hop and techno mapped a careful cartography of race. While rock was colonialisation by other means, hip hop enacted a decolonial imperative. Electronic dance music provided a unique rendering of identity throughout the 1990s. It was a mode of musical communication that moved across national and linguistic boundaries, far beyond Britpop or Stateside rock music. While the Anglo American military alliance was matched and shadowed by postwar popular culture, Brit-pop signalled the end of this hegemonic formation. From this point, English pop and American rock would not sail as smoothly over the Atlantic. While 1995 was the year of Wonderwall, by 1996 the Britpop bubble corroded the faces of the Gallagher brothers. Oasis was unable to complete the American tour. Yet other cultural forces were already active. 1996 was also the year of Trainspotting, with "Born Slippy" being the soundtrack for a blissful journey under the radar. This was a cultural force that no longer required America as a reference point [6]. Robbie Williams was able to integrate the histories of Britpop and dance culture, instigating a complex dialogue between the two. Still, concern peppered music and entertainment journals that British performers were not accessing 'America.' As Sharon Swart stated Britpop acts, on the other hand, are finding it less easy to crack the U.S. market. The Spice Girls may have made some early headway, but fellow purveyors of pop, such as Robbie Williams, can't seem to get satisfaction from American fans. (35 British performers had numerous cultural forces working against them. Flat global sales, the strength of the sterling and the slow response to the new technological opportunities of DVD, all caused problems. While Britpop "cleaned house," (Boehm 89) it was uncertain which cultural formation would replace this colonising force. Because of the complex dialogues between the rock discourse and dance culture, time and space were unable to align into a unified market. American critics simply could not grasp Robbie Williams' history, motives or iconography. It's Robbie's world, we just buy tickets for it. Unless, of course you're American and you don't know jack about soccer. That's the first mistake Williams makes - if indeed one of his goals is to break big in the U.S. (and I can't believe someone so ambitious would settle for less.) … Americans, it seems, are most fascinated by British pop when it presents a mirror image of American pop. (Woods 98 There is little sense that an entirely different musical economy now circulates, where making it big in the United States is not the singular marker of credibility. Williams' demonstrates commitment to the international market, focussing on MTV Asia, MTV online, New Zealand and Australian audiences [7]. The Gallagher brothers spent much of the 1990s trying to be John Lennon. While Noel, at times, knocked at the door of rock legends through "Wonderwall," he snubbed Williams' penchant for pop glory, describing him as a "fat dancer." (Gallagher in Orecklin 101) Dancing should not be decried so summarily. It conveys subtle nodes of bodily knowledge about men, women, sex and desire. While men are validated for bodily movement through sport, women's dancing remains a performance of voyeuristic attention. Such a divide is highly repressive of men who dance, with gayness infiltrating the metaphoric masculine dancefloor [8]. Too often the binary of male and female is enmeshed into the divide of rock and dance. Actually, these categories slide elegantly over each other. The male pop singers are located in a significant semiotic space. Robbie Williams carries these contradictions and controversy. NO! Robbie didn't go on NME's cover in a 'desperate' attempt to seduce nine-year old knickerwetters … YES! He used to be teenybopper fodder. SO WHAT?! So did the Beatles the Stones, the Who, the Kinks, etc blah blah pseudohistoricalrockbollocks. NO! Making music that gurlz like is NOT a crime! (Wells 62) There remains an uncertainty in his performance of masculinity and at times, a deliberate ambivalence. He grafts subversiveness into a specific lineage of English pop music. The aim for critics of popular music is to find a way to create a rhythm of resistance, rather than melody of credible meanings. In summoning an archaeology of the archive, we begin to write a popular music history. Suzanne Moore asked why men should "be interested in a sexual politics based on the frightfully old-fashioned ideas of truth, identity and history?" (175) The reason is now obvious. Femininity is no longer alone on the simulacra. It is impossible to separate real men from the representations of masculinity that dress the corporeal form. Popular music is pivotal, not for collapsing the representation into the real, but for making the space between these states livable, and pleasurable. Like all semiotic sicknesses, the damaged, beaten and bandaged masculinity of contemporary music swaddles a healing pedagogic formation. Robbie Williams enables the writing of a critical history of post Anglo-American music [9]. Popular music captures such stories of place and identity. Significantly though, it also opens out spaces of knowing. There is an investment in rhythm that transgresses national histories of music. While Williams has produced albums, singles, video and endless newspaper copy, his most important revelations are volatile and ephemeral in their impact. He increases the popular cultural vocabulary of masculinity. [1] The fame of both Williams and Halliwell was at such a level that it was reported in the generally conservative, pages of Marketing. The piece was titled "Will Geri's fling lose its fizz?" Marketing, August 2000: 17. [2] For poll results, please refer to "Winners and Losers," Time International, Vol. 155, Issue 23, June 12, 2000, 9 [3] For a discussion of this growth in academic discourse on masculinity, please refer to Paul Smith's "Introduction," in P. Smith (ed.), Boys: Masculinity in contemporary culture. Colorado: Westview Press, 1996. [4] Steve Futterman described Rock DJ as the "least alluring porn video on MTV," in "The best and worst: honour roll," Entertainment Weekly 574-575 (December 22-December 29 2000): 146. [5] Michael Bracewell stated that "pop provides an unofficial cartography of its host culture, charting the national mood, marking the crossroads between the major social trends and the tunnels of the zeitgeist," in "Britpop's coming home, it's coming home." New Statesman .(February 21 1997): 36. [6] It is important to make my point clear. The 'America' that I am summoning here is a popular cultural formation, which possesses little connection with the territory, institution or defence initiatives of the United States. Simon Frith made this distinction clear, when he stated that "the question becomes whether 'America' can continue to be the mythical locale of popular culture as it has been through most of this century. As I've suggested, there are reasons now to suppose that 'America' itself, as a pop cultural myth, no longer bears much resemblance to the USA as a real place even in the myth." This statement was made in "Anglo-America and its discontents," Cultural Studies 5 1991: 268. [7] To observe the scale of attention paid to the Asian and Pacific markets, please refer to http://robbiewilliams.com/july13scroll.html, http://robbiewilliams.com/july19scroll.html and http://robbiewilliams.com/july24scroll.html, accessed on March 3, 2001 [8] At its most naïve, J. Michael Bailey and Michael Oberschneider asked, "Why are gay men so motivated to dance? One hypothesis is that gay men dance in order to be feminine. In other words, gay men dance because women do. An alternative hypothesis is that gay men and women share a common factor in their emotional make-up that makes dancing especially enjoyable," from "Sexual orientation in professional dance," Archives of Sexual Behaviour. 26.4 (August 1997). Such an interpretation is particularly ludicrous when considering the pre-rock and roll masculine dancing rituals in the jive, Charleston and jitterbug. Once more, the history of rock music is obscuring the history of dance both before the mid 1950s and after acid house. [9] Women, gay men and black communities through much of the twentieth century have used these popular spaces. For example, Lynne Segal, in Slow Motion. London: Virago, 1990, stated that "through dancing, athletic and erotic performance, but most powerfully through music, Black men could express something about the body and its physicality, about emotions and their cosmic reach, rarely found in white culture - least of all in white male culture,": 191 References Ansen, D., Giles, J., Kroll, J., Gates, D. and Schoemer, K. "What's a handsome lad to do?" Newsweek 133.19 (May 10, 1999): 85. "Ask Dr. Hip." U.S. News and World Report 129.16 (October 23, 2000): 72. Bailey, J. Michael., and Oberschneider, Michael. "Sexual orientation in professional dance." Archives of Sexual Behaviour. 26.4 (August 1997):expanded academic database [fulltext]. Boehm, E. "Pop will beat itself up." Variety 373.5 (December 14, 1998): 89. Bracewell, Michael. "Britpop's coming home, it's coming home." New Statesman.(February 21 1997): 36. Buchbinder, David. Performance Anxieties .Sydney: Allen and Unwin, 1998. Faludi, Susan. Stiffed. London: Chatto and Windus, 1999. Frith, Simon. "Anglo-America and its discontents." Cultural Studies. 5 1991. Futterman, Steve. "The best and worst: honour roll." Entertainment Weekly, 574-575 (December 22-December 29 2000): 146. Gikandi, Simon. Maps of Englishness. New York: Columbia University Press, 1996. Kadis, Alex. Take That: In private. London: Virgin Books, 1994. Kamp, D. "London Swings! Again!" Vanity Fair ( March 1997): 102. Kimmel, Michael. Manhood in America. New York: The Free Press, 1996. Mendell, Adrienne. How men think. New York: Fawcett, 1996. Moore, Susan. "Getting a bit of the other - the pimps of postmodernism." In Rowena Chapman and Jonathan Rutherford (ed.) Male Order .London: Lawrence and Wishart, 1988. 165-175. Orecklin, Michele. "People." Time. 155.10 (March 13, 2000): 101. Pollack, William. Real boys. Melbourne: Scribe Publications, 1999. Reynolds, Simon. members.aol.com/blissout/britpop.html. Accessed on April 15, 2001. Robinson, David. No less a man. Bowling Green: Bowling Green State University, 1994. Segal, Lynne. Slow Motion. London: Virago, 1990. Smith, Paul. "Introduction" in P. Smith (ed.), Boys: Masculinity in contemporary culture. Colorado: Westview Press, 1996. Swart, S. "U.K. Showbiz" Variety.(December 11-17, 2000): 35. Sexton, Paul and Masson, Gordon. "Tips for Brits who want U.S. success" Billboard .(September 9 2000): 1. Wells, Steven. "Angst." NME.(November 21 1998): 62. "Will Geri's fling lose its fizz?" Marketing.(August 2000): 17. Woods, S. "Robbie Williams Sing when you're winning" The Village Voice. 45.52. (January 2, 2001): 98.
41

Cantrell, Kate Elizabeth. "Ladies on the Loose: Contemporary Female Travel as a "Promiscuous" Excursion." M/C Journal 14, no. 3 (June 27, 2011). http://dx.doi.org/10.5204/mcj.375.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In Victorian times, when female travel narratives were read as excursions rather than expeditions, it was common for women authors to preface their travels with an apology. “What this book wants,” begins Mary Kingsley’s Travels in West Africa, “is not a simple preface but an apology, and a very brilliant and convincing one at that” (4). This tendency of the woman writer to depreciate her travel with an acknowledgment of its presumptuousness crafted her apology essentially as an admission of guilt. “Where I have offered my opinions,” Isabella Bird writes in The Englishwoman in America, “I have done so with extreme diffidence, giving impressions rather than conclusions” (2). While Elizabeth Howells has since argued the apologetic preface was in fact an opposing strategy that allowed women writers to assert their authority by averting it, it is certainly telling of the time and genre that a female writer could only defend her work by first excusing it. The personal apology may have emerged as the natural response to social restrictions but it has not been without consequence for female travel. The female position, often constructed as communal, is still problematised in contemporary travel texts. While there has been a traceable shift from apology to affirmation since the first women travellers abandoned their embroidery, it seems some sense of lingering culpability still remains. In many ways, the modern female traveller, like the early lady traveller, is still a displaced woman. She still sets out cautiously, guide book in hand. Often she writes, like the female confessant, in an attempt to recover what Virginia Woolf calls “the lives of the obscure”: those found locked in old diaries, stuffed away in old drawers or simply unrecorded (44). Often she speaks insistently of the abstract things which Kingsley, ironically, wrote so easily and extensively about. She is, however, even when writing from within the confines of her own home, still writing from abroad. Women’s solitary or “unescorted” travel, even in contemporary times, is considered less common in the Western world, with recurrent travel warnings constantly targeted at female travellers. Travelling women are always made aware of the limits of their body and its vulnerabilities. Mary Morris comments on “the fear of rape, for example, whether crossing the Sahara or just crossing a city street at night” (xvii). While a certain degree of danger always exists in travel for men and women alike and while it is inevitable that some of those risks are gender-specific, travel is frequently viewed as far more hazardous for women. Guide books, travel magazines and online advice columns targeted especially at female readers are cramped with words of concern and caution for women travellers. Often, the implicit message that women are too weak and vulnerable to travel is packaged neatly into “a cache of valuable advice” with shocking anecdotes and officious chapters such as “Dealing with Officials”, “Choosing Companions” or “If You Become a Victim” (Swan and Laufer vii). As these warnings are usually levelled at white, middle to upper class women who have the freedom and financing to travel, the question arises as to what is really at risk when women take to the road. It seems the usual dialogue between issues of mobility and issues of safety can be read more complexly as confusions between questions of mobility and morality. As Kristi Siegel explains, “among the various subtexts embedded in these travel warnings is the long-held fear of ‘women on the loose’” (4). According to Karen Lawrence, travel has always entailed a “risky and rewardingly excessive” terrain for women because of the historical link between wandering and promiscuity (240). Paul Hyland has even suggested that the nature of travel itself is “gloriously” promiscuous: “the shifting destination, arrival again and again, the unknown possessed, the quest for an illusory home” (211). This construction of female travel as a desire to wander connotes straying behaviours that are often cast in sexual terms. The identification of these traits in early criminological research, such as 19th century studies of cacogenic families, is often linked to travel in a broad sense. According to Nicolas Hahn’s study, Too Dumb to Know Better, contributors to the image of the “bad” woman frequently cite three traits as characteristic. “First, they have pictured her as irresolute and all too easily lead. Second, they have usually shown her to be promiscuous and a good deal more lascivious than her virtuous sister. Third, they have often emphasised the bad woman’s responsibility for not only her own sins, but those of her mate and descendents as well” (3). Like Eve, who wanders around the edge of the garden, the promiscuous woman has long been said to have a wandering disposition. Interestingly, however, both male and female travel writers have at different times and for dissimilar reasons assumed hermaphroditic identities while travelling. The female traveller, for example, may assume the figure of “the observer” or “the reporter with historical and political awareness”, while the male traveller may feminise his behaviours to confront inevitabilities of confinement and mortality (Fortunati, Monticelli and Ascari 11). Female travellers such as Alexandra David-Neel and Isabelle Eberhardt who ventured out of the home and cross-dressed for safety or success, deliberately and fully appropriated traditional roles of the male sex. Often, this attempt by female wanderers to fulfil their own intentions in cognito evaded their dismissal as wild and unruly women and asserted their power over those duped by their disguise. Those women who did travel openly into the world were often accused of flaunting the gendered norms of female decorum with their “so-called unnatural and inappropriate behaviour” (Siegel 3). The continued harnessing of this cultural taboo by popular media continues to shape contemporary patterns of female travel. In fact, as a result of perceived connections between wandering and danger, the narrative of the woman traveller often emerges as a self-conscious fiction where “the persona who emerges on the page is as much a character as a woman in a novel” (Bassnett 234). This process of self-fictionalising converts the travel writing into a graph of subliminal fears and desires. In Tracks, for example, which is Robyn Davidson’s account of her solitary journey by camel across the Australian desert, Davidson shares with her readers the single, unvarying warning she received from the locals while preparing for her expedition. That was, if she ventured into the desert alone without a guide or male accompaniment, she would be attacked and raped by an Aboriginal man. In her opening pages, Davidson recounts a conversation in the local pub when one of the “kinder regulars” warns her: “You ought to be more careful, girl, you know you’ve been nominated by some of these blokes as the next town rape case” (19). “I felt really frightened for the first time,” Davidson confesses (20). Perhaps no tale better depicts this gendered troubling than the fairytale of Little Red Riding Hood. In the earliest versions of the story, Little Red outwits the Wolf with her own cunning and escapes without harm. By the time the first printed version emerges, however, the story has dramatically changed. Little Red now falls for the guise of the Wolf, and tricked by her captor, is eaten without rescue or escape. Charles Perrault, who is credited with the original publication, explains the moral at the end of the tale, leaving no doubt to its intended meaning. “From this story one learns that children, especially young lasses, pretty, courteous and well-bred, do very wrong to listen to strangers, and it is not an unheard thing if the Wolf is thereby provided with his dinner” (77). Interestingly, in the Grimm Brothers’ version which emerges two centuries later an explicit warning now appears in the tale, in the shape of the mother’s instruction to “walk nicely and quietly, and not run off the path” (144). This new inclusion sanitises the tale and highlights the slippages between issues of mobility and morality. Where Little Red once set out with no instruction not to wander, she is now told plainly to stay on the path; not for her own safety but for implied matters of virtue. If Little Red strays while travelling alone she risks losing her virginity and, of course, her virtue (Siegel 55). Essentially, this is what is at stake when Little Red wanders; not that she will get lost in the woods and be unable to find her way, but that in straying from the path and purposefully disobeying her mother, she will no longer be “a dear little girl” (Grimm 144). In the Grimms’ version, Red Riding Hood herself critically reflects on her trespassing from the safe space of the village to the dangerous world of the forest and makes a concluding statement that demonstrates she has learnt her lesson. “As long as I live, I will never by myself leave the path, to run into the wood, when my mother has forbidden me to do so” (149). Red’s message to her female readers is representative of the social world’s message to its women travellers. “We are easily distracted and disobedient, we are not safe alone in the woods (travelling off the beaten path); we are fairly stupid; we get ourselves into trouble; and we need to be rescued by a man” (Siegel 56). As Siegel explains, even Angela Carter’s Red Riding Hood, who bursts out laughing when the Wolf says “all the better to eat you with” for “she knew she was nobody’s meat” (219), still shocks readers when she uses her virginity to take power over the voracious Wolf. In Carter’s world “children do not stay young for long,” and Little Red, who has her knife and is “afraid of nothing”, is certainly no exception (215). Yet in the end, when Red seduces the Wolf and falls asleep between his paws, there is still a sense this is a twist ending. As Siegel explains, “even given the background Carter provides in the story’s beginning, the scene startles. We knew the girl was strong, independent, and armed. However, the pattern of woman-alone-travelling-alone-helpless-alone-victim is so embedded in our consciousness we are caught off guard” (57). In Roald Dahl’s revolting rhyme, Little Red is also awarded agency, not through sexual prerogative, but through the enactment of traits often considered synonymous with male bravado: quick thinking, wit and cunning. After the wolf devours Grandmamma, Red pulls a pistol from her underpants and shoots him dead. “The small girl smiles. One eyelid flickers. She whips a pistol from her knickers. She aims it at the creature’s head and bang bang bang, she shoots him dead” (lines 48—51). In the weeks that follow Red’s triumph she even takes a trophy, substituting her red cloak for a “furry wolfskin coat” (line 57). While Dahl subverts female stereotypes through Red’s decisive action and immediacy, there is still a sense, perhaps heightened by the rhyming couplets, that we are not to take the shooting seriously. Instead, Red’s girrrl-power is an imagined celebration; it is something comical to be mused over, but its shock value lies in its impossibility; it is not at all believable. While the sexual overtones of the tale have become more explicit in contemporary film adaptations such as David Slade’s Hard Candy and Catherine Hardwicke’s Red Riding Hood, the question that arises is what is really at threat, or more specifically who is threatened, when women travel off the well-ordered path of duty. As this problematic continues to surface in discussions of the genre, other more nuanced readings have also distorted the purpose and practice of women’s travel. Some psychoanalytical theorists, for example, have adopted Freud’s notion of travel as an escape from the family, particularly the father figure. In his essay A Disturbance of Memory on the Acropolis, Freud explains how his own longing to travel was “a wish to escape from that pressure, like the force which drives so many adolescent children to run away from home” (237). “When one first catches sight of the sea,” Freud writes, “one feels oneself like a hero who has performed deeds of improbable greatness” (237). The inherent gender trouble with such a reading is the suggestion women only move in search of a quixotic male figure, “fleeing from their real or imaginary powerful fathers and searching for an idealised and imaginary ‘loving father’ instead” (Berger 55). This kind of thinking reduces the identities of modern women to fragile, unfinished selves, whose investment in travel is always linked to recovering or resisting a male self. Such readings neglect the unique history of women’s travel writing as they dismiss differences in the male and female practice and forget that “travel itself is a thoroughly gendered category” (Holland and Huggan 111). Freud’s experience of travel, for example, his description of feeling like a “hero” who has achieved “improbable greatness” is problematised by the female context, since the possibility arises that women may travel with different e/motions and, indeed, motives to their male counterparts. For example, often when a female character does leave home it is to escape an unhappy marriage, recover from a broken heart or search for new love. Elizabeth Gilbert’s best selling travelogue, Eat, Pray, Love (which spent 57 weeks at the number one spot of the New York Times), found its success on the premise of a once happily married woman who, reeling from a contentious divorce, takes off around the world “in search of everything” (1). Since its debut, the novel has been accused of being self-absorbed and sexist, and even branded by the New York Post as “narcissistic New Age reading, curated by Winfrey” (Callahan par 13). Perhaps most interesting for discussions of travel morality, however, is Bitch magazine’s recent article Eat, Pray, Spend, which suggests that the positioning of the memoir as “an Everywoman’s guide to whole, empowered living” typifies a new literature of privilege that excludes “all but the most fortunate among us from participating” (Sanders and Barnes-Brown par 7). Without seeking to limit the novel with separatist generalisations, the freedoms of Elizabeth Gilbert (a wealthy, white American novelist) to leave home and to write about her travels afterwards have not always been the freedoms of all women. As a result of this problematic, many contemporary women mark out alternative patterns of movement when travelling, often moving deliberately in a variety of directions and at varying paces, in an attempt to resist their placelessness in the travel genre and in the mappable world. As Heidi Slettedahl Macpherson, speaking of Housekeeping’s Ruthie and Sylvie, explains, “they do not travel ever westward in search of some frontier space, nor do they travel across great spaces. Rather, they circle, they drift, they wander” (199). As a result of this double displacement, women have to work twice as hard to be considered credible travellers, particularly since travel is traditionally a male discursive practice. In this tradition, the male is often constructed as the heroic explorer while the female is mapped as a place on his itinerary. She is a point of conquest, a land to be penetrated, a site to be mapped and plotted, but rarely a travelling equal. Annette Kolodny considers this metaphor of “land-as-woman” (67) in her seminal work, The Lay of the Land, in which she discusses “men’s impulse to alter, penetrate and conquer” unfamiliar space (87). Finally, it often emerges that even when female travel focuses specifically on an individual or collective female experience, it is still read in opposition to the long tradition of travelling men. In their introduction to Amazonian, Dea Birkett and Sara Wheeler maintain the primary difference between male and female travel writers is that “the male species” has not become extinct (vii). The pair, who have theorised widely on New Travel Writing, identify some of the myths and misconceptions of the female genre, often citing their own encounters with androcentrism in the industry. “We have found that even when people are confronted by a real, live woman travel writer, they still get us wrong. In the time allowed for questions after a lecture, we are regularly asked, ‘Was that before you sailed around the world or after?’ even though neither of us has ever done any such thing” (xvii). The obvious bias in such a comment is an archaic view of what qualifies as “good” travel and a preservation of the stereotypes surrounding women’s intentions in leaving home. As Birkett and Wheeler explain, “the inference here is that to qualify as travel writers women must achieve astonishing and record-breaking feats. Either that, or we’re trying to get our hands down some man’s trousers. One of us was once asked by the president of a distinguished geographical institution, ‘What made you go to Chile? Was it a guy?’” (xviii). In light of such comments, there remain traceable difficulties for contemporary female travel. As travel itself is inherently gendered, its practice has often been “defined by men according to the dictates of their experience” (Holland and Huggan 11). As a result, its discourse has traditionally reinforced male prerogatives to wander and female obligations to wait. Even the travel trade itself, an industry that often makes its profits out of preying on fear, continues to shape the way women move through the world. While the female traveller then may no longer preface her work with an explicit apology, there are still signs she is carrying some historical baggage. It is from this site of trouble that new patterns of female travel will continue to emerge, distinguishably and defiantly, towards a much more colourful vista of general misrule. References Bassnett, Susan. “Travel Writing and Gender.” The Cambridge Companion to Travel Writing, eds. Peter Hulme and Tim Youngs, Cambridge: Cambridge UP, 2002. 225-40. Berger, Arthur Asa. Deconstructing Travel: Cultural Perspectives on Tourism. Walnut Creek: AltaMira Press, 2004. Bird, Isabella. The Englishwoman in America. London: John Murray, 1856. Birkett, Dea, and Sara Wheeler, eds. Amazonian: The Penguin Book of New Women’s Travel Writing. London: Penguin, 1998. Callahan, Maureen. “Eat, Pray, Loathe: Latest Self-Help Bestseller Proves Faith is Blind.” New York Post 23 Dec. 2007. Carter, Angela. “The Company of Wolves.” Burning Your Boats: The Collected Short Stories. London: Vintage, 1995. 212-20. Dahl, Roald. Revolting Rhymes. London: Puffin Books, 1982. Davidson, Robyn. Tracks. London: Jonathan Cape, 1980. Fortunati, Vita, Rita Monticelli, and Maurizio Ascari, eds. Travel Writing and the Female Imaginary. Bologna: Patron Editore, 2001. Freud, Sigmund. “A Disturbance of Memory on the Acropolis.” The Standard Edition of the Complete Psychological Works of Sigmund Freud, vol. XXII. New Introductory Lectures on Psycho-Analysis and Other Works, 1936. 237-48. Gilbert, Elizabeth. Eat, Pray, Love: One Woman’s Search for Everything Across Italy, India and Indonesia. New Jersey: Penguin, 2007. Grimm, Jacob, and Wilhelm Grimm. “Little Red Riding Hood.” Grimms’ Fairy Tales, London: Jonathan Cape, 1962. 144-9. Hahn, Nicolas. “Too Dumb to Know Better: Cacogenic Family Studies and the Criminology of Women.” Criminology 18.1 (1980): 3-25. Hard Candy. Dir. David Slade. Lionsgate. 2005. Holland, Patrick, and Graham Huggan. Tourists with Typewriters: Critical Reflections on Contemporary Travel Writing. Ann Arbor: U of Michigan P, 2003. Howells, Elizabeth. “Apologizing for Authority: The Rhetoric of the Prefaces of Eliza Cook, Isabelle Bird, and Hannah More.” Professing Rhetoric: Selected Papers from the 2000 Rhetoric Society of America Conference, eds. F.J. Antczak, C. Coggins, and G.D. Klinger. London: Lawrence Erlbaum Associates, 2002. 131-7. Hyland, Paul. The Black Heart: A Voyage into Central Africa. New York: Paragon House, 1988. Kingsley, Mary. Travels in West Africa. Middlesex: The Echo Library, 2008. Kolodny, Annette. The Lay of the Land: Metaphor as Experience and History in American Life and Letters. USA: U of North Carolina P, 1975. Lawrence, Karen. Penelope Voyages: Women and Travel in the British Literary Tradition. Ithaca: Cornell UP, 1994. Morris, Mary. Maiden Voyages: Writings of Women Travellers. New York: Vintage Books, 1993. Perrault, Charles. Perrault’s Complete Fairytales. Trans. A.E. Johnson and others. London: Constable & Company, 1961. Red Riding Hood. Dir. Catherine Hardwicke. Warner Bros. 2011. Sanders, Joshunda, and Diana Barnes-Brown. “Eat, Pray, Spend: Priv-Lit and the New, Enlightened American Dream” Bitch Magazine 47 (2010). 10 May, 2011 < http://bitchmagazine.org/article/eat-pray-spend >. Siegel, Kristi. Ed. Gender, Genre, and Identity in Women’s Travel Writing. New York: Peter Lang, 2004. Slettedahl Macpherson, Heidi. “Women’s Travel Writing and the Politics of Location: Somewhere In-Between.” Gender, Genre, and Identity in Women’s Travel Writing, ed. Kristi Siegel. New York: Peter Lang, 2004. 194-207. Swan, Sheila, and Peter Laufer. Safety and Security for Women who Travel. 2nd ed. San Francisco: Travelers’ Tales, 2004. Woolf, Virginia. Women and Writing. London: The Women’s Press, 1979.

До бібліографії