Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Performing Distributed Quantum Calculations In A Multi-Cloud Architecture Secured By The Quantum Key Distribution Protocol, Jose Luis Lo Huang, Vincent C. Emeakaroha Apr 2024

Performing Distributed Quantum Calculations In A Multi-Cloud Architecture Secured By The Quantum Key Distribution Protocol, Jose Luis Lo Huang, Vincent C. Emeakaroha

Department of Computer Science Publications

Quantum computing (QC) is an emerging area that yearly improves and develops more advances in the number of qubits and the available infrastructure for public users. Nowadays, the main cloud service providers (CSP) are implementing different mechanisms to support access to their quantum computers, which can be used to perform small experiments, test hybrid algorithms and prove quantum theories. Recent research work have discussed the low capacity of using quantum computers in a single CSP to perform quantum computation that are needed to solve different experiments for real world problems. Thus, there are needs for computing powers in the form …


A Survey On Training Challenges In Generative Adversarial Networks For Biomedical Image Analysis, Muhammad Muneeb Saad, Ruairi O'Reilly, Mubashir Husain Rehmani Jan 2024

A Survey On Training Challenges In Generative Adversarial Networks For Biomedical Image Analysis, Muhammad Muneeb Saad, Ruairi O'Reilly, Mubashir Husain Rehmani

Department of Computer Science Publications

In biomedical image analysis, the applicability of deep learning methods is directly impacted by the quantity of image data available. This is due to deep learning models requiring large image datasets to provide high-level performance. Generative Adversarial Networks (GANs) have been widely utilized to address data limitations through the generation of synthetic biomedical images. GANs consist of two models. The generator, a model that learns how to produce synthetic images based on the feedback it receives. The discriminator, a model that classifies an image as synthetic or real and provides feedback to the generator. Throughout the training process, a GAN …


Costs And Benefits Of Authentication Advice, Hazel Murray, David Malone May 2023

Costs And Benefits Of Authentication Advice, Hazel Murray, David Malone

Department of Computer Science Publications

Authentication security advice is given with the goal of guiding users and organisations towards secure actions and practices. In this article, a taxonomy of 270 pieces of authentication advice is created, and a survey is conducted to gather information on the costs associated with following or enforcing the advice. Our findings indicate that security advice can be ambiguous and contradictory, with 41% of the advice collected being contradicted by another source. Additionally, users reported high levels of frustration with the advice and identified high usability costs. The study also found that end-users disagreed with each other 71% of the time …


Analyzing Syntactic Constructs Of Java Programs With Machine Learning, Francisco Ortin, Guillermo Facundo, Miguel Garcia Apr 2023

Analyzing Syntactic Constructs Of Java Programs With Machine Learning, Francisco Ortin, Guillermo Facundo, Miguel Garcia

Department of Computer Science Publications

The massive number of open-source projects in public repositories has notably increased in the last years. Such repositories represent valuable information to be mined for different purposes, such as documenting recurrent syntactic constructs, analyzing the particular constructs used by experts and beginners, using them to teach programming and to detect bad programming practices, and building programming tools such as decompilers, Integrated Development Environments or Intelligent Tutoring Systems. An inherent problem of source code is that its syntactic information is represented with tree structures, while traditional machine learning algorithms use -dimensional datasets. Therefore, we present a feature engineering process to translate …


Secap Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes, Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Sean Mcsweeney, Donna O'Shea Jan 2023

Secap Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes, Dylan Smyth, Sandra Scott-Hayward, Victor Cionca, Sean Mcsweeney, Donna O'Shea

Department of Computer Science Publications

Programmable networking is evolving from programmable control plane solutions such as OpenFlow-based software-defined networking (SDN) to programmable data planes such as P4-based SDN. To support the functionality of the SDN, the correct view of the network topology is required. However, multiple attacks aimed at topology poisoning have been demonstrated in SDNs. While several controller-centralised security solutions have been proposed to defeat topology poisoning attacks, some attacks e.g., the Data Plane ARP Cache Poisoning Attack and the relay-type Link Fabrication Attack are difficult to detect using a fully centralised security solution. In this paper, we present the Security-Aware Programmable (SECAP) Switch—a …


Qosa-Icn: An Information-Centric Approach To Qos In Vehicular Environments, Jessica Mccarthy, Saqib Rasool Chaudhry, Perumal Kuppuudaiyar, Radhika Loomba, Siobhan Clarke Mar 2021

Qosa-Icn: An Information-Centric Approach To Qos In Vehicular Environments, Jessica Mccarthy, Saqib Rasool Chaudhry, Perumal Kuppuudaiyar, Radhika Loomba, Siobhan Clarke

Department of Computer Science Publications

Heterogeneous content-based traffic distribution motivates Information-Centric Networking (ICN), where content delivery is of primary interest as a prominent solution. However, current work does not address Quality of Service (QoS) provisioning for prioritized traffic, which is required for different applications and content types. This paper extends ICN with data delivery deadline awareness and shapes the forwarding decisions to ensure prioritized packet treatment. The proposed QoS Aware-ICN (QoSA-ICN) classifies requests' priority with their QoS requirements by codifying a QoSInfo object in interest/data packets. QoSA-ICN also extends the existing NDN transmission mode to a converged best route with multi-hop multi-route forwarding, to avoid …


Japanese Quail (Coturnix Japonica) As A Novel Model To Study The Relationship Between The Avian Microbiome And Microbial Endocrinology-Based Host-Microbe Interactions, Joshua M. Lyte, James Keane, Julia Eckenberger, Nicholas Anthony, Sandip Shrestha, Daya Marasini, Karrie M. Daniels, Valentina Caputi, Annie M. Donoghue, Mark Lyte Feb 2021

Japanese Quail (Coturnix Japonica) As A Novel Model To Study The Relationship Between The Avian Microbiome And Microbial Endocrinology-Based Host-Microbe Interactions, Joshua M. Lyte, James Keane, Julia Eckenberger, Nicholas Anthony, Sandip Shrestha, Daya Marasini, Karrie M. Daniels, Valentina Caputi, Annie M. Donoghue, Mark Lyte

Department of Computer Science Publications

Microbial endocrinology, which is the study of neuroendocrine-based interkingdom signaling, provides a causal mechanistic framework for understanding the bi-directional crosstalk between the host and microbiome, especially as regards the effect of stress on health and disease. The importance of the cecal microbiome in avian health is well-recognized, yet little is understood regarding the mechanisms underpinning the avian host-microbiome relationship. Neuroendocrine plasticity of avian tissues that are focal points of host-microbiome interaction, such as the gut and lung, has likewise received limited attention. Avian in vivo models that enable the study of the neuroendocrine dynamic between host and microbiome are needed. …


Multi‑View Clustering For Multi‑Omics Data Using Unifed Embedding, Mohammed Hasanuzzaman, Sayantan Mitra, Sriparna Saha Aug 2020

Multi‑View Clustering For Multi‑Omics Data Using Unifed Embedding, Mohammed Hasanuzzaman, Sayantan Mitra, Sriparna Saha

Department of Computer Science Publications

In real world applications, data sets are often comprised of multiple views, which provide consensus and complementary information to each other. Embedding learning is an effective strategy for nearest neighbour search and dimensionality reduction in large data sets. This paper attempts to learn a unified probability distribution of the points across different views and generates a unified embedding in a low-dimensional space to optimally preserve neighbourhood identity. Probability distributions generated for each point for each view are combined by conflation method to create a single unified distribution. The goal is to approximate this unified distribution as much as possible when …


Simplicity Diffexpress: A Bespoke Cloud-Based Interface For Rna-Seq Differential Expression Modeling And Analysis, Cintia C. Palu, Marcelo Ribeiro-Alves, Yanxin Wu, Brendan Lawlor, Pavel V. Baranov, Brian Kelly, Paul Walsh May 2019

Simplicity Diffexpress: A Bespoke Cloud-Based Interface For Rna-Seq Differential Expression Modeling And Analysis, Cintia C. Palu, Marcelo Ribeiro-Alves, Yanxin Wu, Brendan Lawlor, Pavel V. Baranov, Brian Kelly, Paul Walsh

Department of Computer Science Publications

One of the key challenges for transcriptomics-based research is not only the processing of large data but also modeling the complexity of features that are sources of variation across samples, which is required for an accurate statistical analysis. Therefore, our goal is to foster access for wet lab researchers to bioinformatics tools, in order to enhance their ability to explore biological aspects and validate hypotheses with robust analysis. In this context, user-friendly interfaces can enable researchers to apply computational biology methods without requiring bioinformatics expertise. Such bespoke platforms can improve the quality of the findings by allowing the researcher to …


Building Consumer Trust In The Cloud: An Experimental Analysis Of The Cloud Trust Label Approach, Lisa Van Der Werff, Grace Fox, Ieva Masevic, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn Apr 2019

Building Consumer Trust In The Cloud: An Experimental Analysis Of The Cloud Trust Label Approach, Lisa Van Der Werff, Grace Fox, Ieva Masevic, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn

Department of Computer Science Publications

The lack of transparency surrounding cloud service provision makes it difficult for consumers to make knowledge based purchasing decisions. As a result, consumer trust has become a major impediment to cloud computing adoption. Cloud Trust Labels represent a means of communicating relevant service and security information to potential customers on the cloud service provided, thereby facilitating informed decision making. This research investigates the potential of a Cloud Trust Label system to overcome the trust barrier. Specifically, it examines the impact of a Cloud Trust Label on consumer perceptions of a service and cloud service provider trustworthiness and trust in the …


Reactions To Imagery Generated Using Computational Aesthetic Measures, Prasad Gade, Mary Galvin, James O'Sullivan, Paul Walsh, Órla Murphy Oct 2017

Reactions To Imagery Generated Using Computational Aesthetic Measures, Prasad Gade, Mary Galvin, James O'Sullivan, Paul Walsh, Órla Murphy

Department of Computer Science Publications

This article examines whether textural generation system imagery evolved with computational aesthetic support can be judged as having aesthetic attributes, both when knowing and not knowing its true origin. Such a generation, depicting a digital landscape, is offered to two groups of participants to appraise. It is hypothesized that there will be no statistically significant difference between the groups on their appraisal of the image. Results from statistical analysis prove to be consistent with this hypothesis. A minority of participants, however, do exhibit significant differences in their perception of the image based on its means of production. This article explores …