1) The document discusses a password-based user authentication scheme for a Web-based Human Genome Database system.
2) The system integrates DNA sequence alignment and data compression modules to help physicians examine genetic deficiencies and allows secure user access.
3) The proposed password-based scheme aims to address security issues with existing schemes by making the system more resistant to offline password guessing attacks.
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
This document summarizes a research paper that proposes using a genetic algorithm to improve intrusion detection. The paper aims to reduce features from the KDD Cup 99 dataset and generate a rule set using genetic algorithms to detect intrusions. The genetic algorithm evolves rules over generations to maximize fitness. Experiments show this approach can improve detection rates and reduce false alarms compared to existing intrusion detection systems.
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
This document summarizes a research paper that proposes using a genetic algorithm to improve intrusion detection. The paper aims to reduce features from the KDD Cup 99 dataset and generate a rule set using genetic algorithms to detect intrusions with a condensed feature set. The genetic algorithm is used to evolve rules from the reduced training data, with a fitness function evaluating rule quality. Experiments and evaluations are conducted on the KDD Cup 99 dataset to test the proposed method.
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)IJCSEA Journal
Data mining is defined as the process of extracting or mining knowledge from vast and large database.Data mining is an interdisciplinary field that brings together techniques from machine learning, pattern recognition, statistics, databases, and visualization to address the issue of information extraction from large databases. Bioinformatics is defined as the science of organizing and analyzing the biological data. Microarray technology helps biologists for monitoring expression of thousands of genes in a single experiment on a small chip. Microarray is also called as DNA chip, gene chip, or biochip is used to analyze the gene expression profiles. Fuzzy Logic is defined as a multivalued logic that provides the intermediate values to be defined between conventional evaluations like true or false, yes or no, high or low, etc.In this paper, a type 2 fuzzy logic approach is used in microarray gene expression data to convert the numerical values into fuzzy terms. After fuzzification, the fuzzy association patterns are discovered. A framework is proposed to cluster microarray gene data based on fuzzy association patterns. Then the proposed type 2
fuzzy approach is compared with traditional clustering algorithms.
This document summarizes Kristina Hettne's PhD thesis defense on applying next-generation text mining to toxicogenomics data analysis. The thesis investigated improving information coverage in biomedical and chemical thesauri used for text mining by developing new chemical concept identification methods. A next-generation text mining approach was developed to statistically relate chemical information to gene expression data, allowing identification of toxicity effects at an earlier stage than manual curation alone. The approach was shown to complement and sometimes outperform existing databases, with potential to reduce animal testing through early prediction of drug toxicity.
EG-CompBio presentation about Artificial Intelligence in Bioinformatics covering:
-AI (Types, Development)
-Deep Learning (Architecture)
-Bioinformatics Fields
-Input formats for AI
-AI Challenges in Biology
-Example: (Proteomics, Transcriptomics)
-Metagenomics: @ NU
-Taxonomic Classification
-Phenotype Classification
-How to begin in AI in Bioinformatics
The NRNB has been funded as an NIGMS Biomedical Technology Research Resource since 2010. During the previous five-year period, NRNB investigators introduced a series of innovative methods for network biology including network-based biomarkers, network-based stratification of genomes, and automated inference of gene ontologies using network data. Over the next five years, we will seek to catalyze major phase transitions in how biological networks are represented and used, working across three broad themes: (1) From static to differential networks, (2) From descriptive to predictive networks, and (3) From flat to hierarchical networks bridging across scales. All of these efforts leverage and further support our growing stable of network technologies, including the popular Cytoscape network analysis infrastructure.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
This document summarizes a research paper that proposes using a genetic algorithm to improve intrusion detection. The paper aims to reduce features from the KDD Cup 99 dataset and generate a rule set using genetic algorithms to detect intrusions. The genetic algorithm evolves rules over generations to maximize fitness. Experiments show this approach can improve detection rates and reduce false alarms compared to existing intrusion detection systems.
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
This document summarizes a research paper that proposes using a genetic algorithm to improve intrusion detection. The paper aims to reduce features from the KDD Cup 99 dataset and generate a rule set using genetic algorithms to detect intrusions with a condensed feature set. The genetic algorithm is used to evolve rules from the reduced training data, with a fitness function evaluating rule quality. Experiments and evaluations are conducted on the KDD Cup 99 dataset to test the proposed method.
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)IJCSEA Journal
Data mining is defined as the process of extracting or mining knowledge from vast and large database.Data mining is an interdisciplinary field that brings together techniques from machine learning, pattern recognition, statistics, databases, and visualization to address the issue of information extraction from large databases. Bioinformatics is defined as the science of organizing and analyzing the biological data. Microarray technology helps biologists for monitoring expression of thousands of genes in a single experiment on a small chip. Microarray is also called as DNA chip, gene chip, or biochip is used to analyze the gene expression profiles. Fuzzy Logic is defined as a multivalued logic that provides the intermediate values to be defined between conventional evaluations like true or false, yes or no, high or low, etc.In this paper, a type 2 fuzzy logic approach is used in microarray gene expression data to convert the numerical values into fuzzy terms. After fuzzification, the fuzzy association patterns are discovered. A framework is proposed to cluster microarray gene data based on fuzzy association patterns. Then the proposed type 2
fuzzy approach is compared with traditional clustering algorithms.
This document summarizes Kristina Hettne's PhD thesis defense on applying next-generation text mining to toxicogenomics data analysis. The thesis investigated improving information coverage in biomedical and chemical thesauri used for text mining by developing new chemical concept identification methods. A next-generation text mining approach was developed to statistically relate chemical information to gene expression data, allowing identification of toxicity effects at an earlier stage than manual curation alone. The approach was shown to complement and sometimes outperform existing databases, with potential to reduce animal testing through early prediction of drug toxicity.
EG-CompBio presentation about Artificial Intelligence in Bioinformatics covering:
-AI (Types, Development)
-Deep Learning (Architecture)
-Bioinformatics Fields
-Input formats for AI
-AI Challenges in Biology
-Example: (Proteomics, Transcriptomics)
-Metagenomics: @ NU
-Taxonomic Classification
-Phenotype Classification
-How to begin in AI in Bioinformatics
The NRNB has been funded as an NIGMS Biomedical Technology Research Resource since 2010. During the previous five-year period, NRNB investigators introduced a series of innovative methods for network biology including network-based biomarkers, network-based stratification of genomes, and automated inference of gene ontologies using network data. Over the next five years, we will seek to catalyze major phase transitions in how biological networks are represented and used, working across three broad themes: (1) From static to differential networks, (2) From descriptive to predictive networks, and (3) From flat to hierarchical networks bridging across scales. All of these efforts leverage and further support our growing stable of network technologies, including the popular Cytoscape network analysis infrastructure.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Automated Analysis of Microscopy Images using Deep Convolutional Neural NetworkAdetayoOkunoye
This document summarizes research on using deep convolutional neural networks to automatically analyze microscopy images. The goals are to expedite the analysis of high-content microscopy data and automate tasks like cell counting and classification. The researchers trained and tested models using TensorFlow on microscopy images to classify cells, achieving over 75% accuracy. This level of automation could benefit biological research by reducing human errors and speeding up analysis of large image datasets.
"Development of a EEG-Based Biometric Authentication & Security System"
presebnted the poster in my university tech fiesta- 2016
I haven't developed it.. but still working on it.
If anyone interested please knock me at
Facebook:
https://www.facebook.com/mubin.hasan.33
This document provides an overview of using soft computing techniques for DNA sequence classification. It discusses DNA and DNA sequencing. It then introduces common soft computing techniques used for classification, including neural networks, fuzzy logic, and genetic algorithms. The document proposes using these soft computing methods for DNA sequence classification and describes related studies. It outlines a methodology using neural networks and genetic algorithms and analyzes the advantages of soft computing for this application. In conclusion, it states that soft computing techniques are well-suited for DNA sequence classification problems.
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
DNA Cryptography is a new born cryptographic field emerged with the research of DNA Computing in which DNA is used as an Information carrier. Cellular automata is dynamic in nature so it provide dynamic behavior in the system which may increase the security in the system. DNA cryptography is
provide a secure way to encrypt the text and automata changes the state of the system based on the present
state, it will occur in discrete time. These qualities are most impressive in these techonology which help us to provide a highly secured security system for the users. Most of the encryption techniques based on the cellular automata have limitations. To overcome this lacuna, we propose a novel DNA cryptography algorithm with cellular automata to achieve randomness, parallelism, uniformity, reversibility and stable.
An algorithm implemented and its results obtained are depicts here, and a result analysis is done with other algorithms.
This document provides an introduction to the field of bioinformatics. It defines bioinformatics as a branch of science that uses computer technology to analyze and integrate biological information that can be applied to gene-based drug discoveries. It discusses the emergence of bioinformatics due to the desire to understand how genetic structure affects traits. It also outlines some common applications of bioinformatics like drug design, gene therapy, and microbial genomic analysis. Finally, it provides examples of some bioinformatics tools, databases, and centers in India.
A Survey of Various Intrusion Detection Systemsijsrd.com
In this paper, we present an overview of existing intrusion detection techniques. All these algorithms are described more or less on their own. Intrusion detection system is a very popular and computationally expensive task. We also explain the fundamentals of intrusion detection system. We describe today's approaches for intrusion detection system. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
This document discusses optimal tiling algorithms for selecting genomic DNA fragments for applications such as microarray design and homology searching. It defines several tiling problems involving finding the maximum weighted set of tiles (sequence fragments) within certain size bounds from a given genomic sequence. Typical parameter values are provided for applications involving sequencing lengths up to 3.4GB, tile sizes from 200bp to 1.5kb, and allowing overlaps of up to 100bp for homology searching. Efficient algorithms are sought with linear or near-linear runtimes to solve these tiling problems.
This document provides an overview of bioinformatics and some of its key applications. It discusses how bioinformatics is an interdisciplinary field that uses computer science, statistics and other approaches to analyze large amounts of biological data. It notes that bioinformatics has become necessary due to the explosion of genomic data from projects like the Human Genome Project. Some of the goals and uses of bioinformatics mentioned include uncovering biological information from data, applications in molecular medicine, agriculture and environmental science. The document also provides brief descriptions of structural bioinformatics, common biological databases, MASCOT database searching, and scoring schemes used in bioinformatics.
AN APPROACH FOR IRIS PLANT CLASSIFICATION USING NEURAL NETWORKijsc
Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. This paper focuses on IRIS plant classification using Neural Network. The problem concerns the identification of IRIS plant species on
the basis of plant attribute measurements. Classification of IRIS data set would be discovering patterns from examining petal and sepal size of the IRIS plant and how the prediction was made from analyzing the pattern to form the class of IRIS plant. By using this pattern and classification, in future upcoming years
the unknown data can be predicted more precisely. Artificial neural networks have been successfully applied to problems in pattern classification, function approximations, optimization, and associative memories. In this work, Multilayer feed- forward networks are trained using back propagation learning
algorithm.
This document presents the development of an EEG-based biometric authentication and security system. It involves acquiring EEG signals from the scalp, preprocessing the raw signals by filtering and artifact removal, extracting features from the signals in the time, frequency and time-frequency domains, classifying the features using support vector machines or neural networks, and authenticating individuals based on their unique EEG patterns. The system aims to provide a more secure alternative to conventional authentication methods like passwords, RFID, and facial recognition.
Data mining with human genetics to enhance gene based algorithm andIAEME Publication
This document summarizes a research study on enhancing DNA database security through data mining techniques. The study aims to understand relationships between DNA sequences and disease risk, and develop improved parental identification algorithms. Data mining is used to analyze large DNA datasets and extract patterns. Security methods like encryption algorithms are also applied to DNA databases to protect the data. The study examines using data mining, visualization, parallel processing and high-performance computing for DNA sequence analysis while enhancing security. The goal is to discover knowledge from DNA databases and securely store citizen identity data to prevent fraud.
Masters Thesis Defense: Minimum Complexity Echo State Networks For Genome and...Christopher Neighbor
Successful Thesis Defense presentation for my Master's in Electrical Engineering: Signal Processing and Machine Learning from Portland State University in March 2020.
Abstract—Biometric systems are increasingly deployed in networked environment, and issues related to interoperability are bound to arise as single vendor, monolithic architectures become less desirable. Interoperability issues affect every subsystem of the biometric system, and a statistical framework to evaluate interoperability is proposed. The framework was applied to the acquisition subsystem for a fingerprint recognition system and the results were evaluated using the framework. Fingerprints were collected from 100 subjects on 6 fingerprint sensors. The results show that performance of interoperable fingerprint datasets is not easily predictable and the proposed framework can aid in removing unpredictability to some degree.
Biological models of security for virus propagation in computer networksUltraUploader
This document discusses how biological models of disease propagation and defense mechanisms in living organisms can inspire new approaches to computer network security and virus detection. Specifically, it describes how genetic regulatory networks that turn off harmful genes, protein interaction networks that model cellular processes, and epidemiological models of disease spread can provide models for automatically detecting and containing computer viruses without relying solely on pre-defined virus signatures. The authors propose several new security models drawing on these biological analogies, such as using surrogate code to maintain system functionality when parts are shut off, modeling network interactions to determine how viruses propagate, and evolving network services in real-time to reconstitute functionality after attacks.
National Resource for Networks Biology's TR&D Theme 3: Although networks have been very useful for representing molecular interactions and mechanisms, network diagrams do not visually resemble the contents of cells. Rather, the cell involves a multi-scale hierarchy of components – proteins are subunits of protein complexes which, in turn, are parts of pathways, biological processes, organelles, cells, tissues, and so on. In this technology research project, we will pursue methods that move Network Biology towards such hierarchical, multi-scale views of cell structure and function.
Building Regulatory Networks with CyTargetLinker summarizes CyTargetLinker, a Cytoscape app that integrates regulatory interactions into network analysis. CyTargetLinker extracts regulatory interactions from multiple data sources called Regulatory Interaction Networks (RINs) and links them to an initial network. This allows visualization of how transcription factors, microRNAs, drugs, and other regulators interact with existing networks like pathways. CyTargetLinker provides flexible filtering and a user-friendly workflow to help biologists generate and analyze hypotheses about regulatory mechanisms involved in processes like breast cancer and DNA damage response. Future work will focus on supporting additional data sources and statistical outputs to analyze overlapping regulatory interactions.
National Resource for Networks Biology's TR&D Theme 1: In this theme, we will develop a series of tools and methodologies for conducting differential analyses of biological networks perturbed under multiple conditions. The novel algorithmic methodologies enable us to make use of high-throughput proteomic level data to recover biological networks under specific biological perturbations. The software tools developed in this project enable researchers to further predict, analyze, and visualize the effects of these perturbations and alterations, while enabling researchers to aggregate additional information regarding the known roles of the involved interactions and their participants.
HPC-MAQ : A PARALLEL SHORT-READ REFERENCE ASSEMBLERcscpconf
HPC-MAQ is a parallel implementation of the MAQ reference assembler that leverages Hadoop and MapReduce to enable MAQ to run in a distributed, parallel manner on large datasets. It addresses the computational challenges of reference assembly by splitting the input reads into chunks that are processed simultaneously. The MAQ algorithm is used to align reads to a reference sequence and call consensus genotypes. HPC-MAQ allows MAQ to scale to larger genomes by distributing the work across multiple nodes in a Hadoop cluster.
Dynamic Access Control for RBAC-administered web-based DatabasesThitichai Sripan
This document proposes an extension to the Role-Based Access Control (RBAC) model called RBAC+ to provide dynamic access control for web-based databases. RBAC+ adds the concepts of application, application profile, and sub-application session to RBAC in order to track users throughout an entire session. This allows RBAC+ to detect and prevent malicious transactions by monitoring the SQL statements within a user's session based on the expected application profile. RBAC+ aims to enhance database security by cancelling malicious transactions before they can succeed.
This document summarizes a senior care coordination service called Dovetail Care. It collects comprehensive health, legal, financial, and personal records from seniors and their circle of care in a secure cloud storage. This allows real-time monitoring of a senior's ability to live independently and travel safely. The service aims to unite family members and professionals to support seniors' goals through accessible communication and care portals.
Each panel should contain a clear beginning, middle, and end to tell a story. Arrange the panels sequentially to show the progression of events over time from left to right or top to bottom. Consider including dialogue, actions, settings, or emotions to engage the reader.
Automated Analysis of Microscopy Images using Deep Convolutional Neural NetworkAdetayoOkunoye
This document summarizes research on using deep convolutional neural networks to automatically analyze microscopy images. The goals are to expedite the analysis of high-content microscopy data and automate tasks like cell counting and classification. The researchers trained and tested models using TensorFlow on microscopy images to classify cells, achieving over 75% accuracy. This level of automation could benefit biological research by reducing human errors and speeding up analysis of large image datasets.
"Development of a EEG-Based Biometric Authentication & Security System"
presebnted the poster in my university tech fiesta- 2016
I haven't developed it.. but still working on it.
If anyone interested please knock me at
Facebook:
https://www.facebook.com/mubin.hasan.33
This document provides an overview of using soft computing techniques for DNA sequence classification. It discusses DNA and DNA sequencing. It then introduces common soft computing techniques used for classification, including neural networks, fuzzy logic, and genetic algorithms. The document proposes using these soft computing methods for DNA sequence classification and describes related studies. It outlines a methodology using neural networks and genetic algorithms and analyzes the advantages of soft computing for this application. In conclusion, it states that soft computing techniques are well-suited for DNA sequence classification problems.
A NOVEL DNA ENCRYPTION SYSTEM USING CELLULAR AUTOMATAijsptm
DNA Cryptography is a new born cryptographic field emerged with the research of DNA Computing in which DNA is used as an Information carrier. Cellular automata is dynamic in nature so it provide dynamic behavior in the system which may increase the security in the system. DNA cryptography is
provide a secure way to encrypt the text and automata changes the state of the system based on the present
state, it will occur in discrete time. These qualities are most impressive in these techonology which help us to provide a highly secured security system for the users. Most of the encryption techniques based on the cellular automata have limitations. To overcome this lacuna, we propose a novel DNA cryptography algorithm with cellular automata to achieve randomness, parallelism, uniformity, reversibility and stable.
An algorithm implemented and its results obtained are depicts here, and a result analysis is done with other algorithms.
This document provides an introduction to the field of bioinformatics. It defines bioinformatics as a branch of science that uses computer technology to analyze and integrate biological information that can be applied to gene-based drug discoveries. It discusses the emergence of bioinformatics due to the desire to understand how genetic structure affects traits. It also outlines some common applications of bioinformatics like drug design, gene therapy, and microbial genomic analysis. Finally, it provides examples of some bioinformatics tools, databases, and centers in India.
A Survey of Various Intrusion Detection Systemsijsrd.com
In this paper, we present an overview of existing intrusion detection techniques. All these algorithms are described more or less on their own. Intrusion detection system is a very popular and computationally expensive task. We also explain the fundamentals of intrusion detection system. We describe today's approaches for intrusion detection system. From the broad variety of efficient techniques that have been developed we will compare the most important ones. We will systematize the techniques and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
This document discusses optimal tiling algorithms for selecting genomic DNA fragments for applications such as microarray design and homology searching. It defines several tiling problems involving finding the maximum weighted set of tiles (sequence fragments) within certain size bounds from a given genomic sequence. Typical parameter values are provided for applications involving sequencing lengths up to 3.4GB, tile sizes from 200bp to 1.5kb, and allowing overlaps of up to 100bp for homology searching. Efficient algorithms are sought with linear or near-linear runtimes to solve these tiling problems.
This document provides an overview of bioinformatics and some of its key applications. It discusses how bioinformatics is an interdisciplinary field that uses computer science, statistics and other approaches to analyze large amounts of biological data. It notes that bioinformatics has become necessary due to the explosion of genomic data from projects like the Human Genome Project. Some of the goals and uses of bioinformatics mentioned include uncovering biological information from data, applications in molecular medicine, agriculture and environmental science. The document also provides brief descriptions of structural bioinformatics, common biological databases, MASCOT database searching, and scoring schemes used in bioinformatics.
AN APPROACH FOR IRIS PLANT CLASSIFICATION USING NEURAL NETWORKijsc
Classification is a machine learning technique used to predict group membership for data instances. To simplify the problem of classification neural networks are being introduced. This paper focuses on IRIS plant classification using Neural Network. The problem concerns the identification of IRIS plant species on
the basis of plant attribute measurements. Classification of IRIS data set would be discovering patterns from examining petal and sepal size of the IRIS plant and how the prediction was made from analyzing the pattern to form the class of IRIS plant. By using this pattern and classification, in future upcoming years
the unknown data can be predicted more precisely. Artificial neural networks have been successfully applied to problems in pattern classification, function approximations, optimization, and associative memories. In this work, Multilayer feed- forward networks are trained using back propagation learning
algorithm.
This document presents the development of an EEG-based biometric authentication and security system. It involves acquiring EEG signals from the scalp, preprocessing the raw signals by filtering and artifact removal, extracting features from the signals in the time, frequency and time-frequency domains, classifying the features using support vector machines or neural networks, and authenticating individuals based on their unique EEG patterns. The system aims to provide a more secure alternative to conventional authentication methods like passwords, RFID, and facial recognition.
Data mining with human genetics to enhance gene based algorithm andIAEME Publication
This document summarizes a research study on enhancing DNA database security through data mining techniques. The study aims to understand relationships between DNA sequences and disease risk, and develop improved parental identification algorithms. Data mining is used to analyze large DNA datasets and extract patterns. Security methods like encryption algorithms are also applied to DNA databases to protect the data. The study examines using data mining, visualization, parallel processing and high-performance computing for DNA sequence analysis while enhancing security. The goal is to discover knowledge from DNA databases and securely store citizen identity data to prevent fraud.
Masters Thesis Defense: Minimum Complexity Echo State Networks For Genome and...Christopher Neighbor
Successful Thesis Defense presentation for my Master's in Electrical Engineering: Signal Processing and Machine Learning from Portland State University in March 2020.
Abstract—Biometric systems are increasingly deployed in networked environment, and issues related to interoperability are bound to arise as single vendor, monolithic architectures become less desirable. Interoperability issues affect every subsystem of the biometric system, and a statistical framework to evaluate interoperability is proposed. The framework was applied to the acquisition subsystem for a fingerprint recognition system and the results were evaluated using the framework. Fingerprints were collected from 100 subjects on 6 fingerprint sensors. The results show that performance of interoperable fingerprint datasets is not easily predictable and the proposed framework can aid in removing unpredictability to some degree.
Biological models of security for virus propagation in computer networksUltraUploader
This document discusses how biological models of disease propagation and defense mechanisms in living organisms can inspire new approaches to computer network security and virus detection. Specifically, it describes how genetic regulatory networks that turn off harmful genes, protein interaction networks that model cellular processes, and epidemiological models of disease spread can provide models for automatically detecting and containing computer viruses without relying solely on pre-defined virus signatures. The authors propose several new security models drawing on these biological analogies, such as using surrogate code to maintain system functionality when parts are shut off, modeling network interactions to determine how viruses propagate, and evolving network services in real-time to reconstitute functionality after attacks.
National Resource for Networks Biology's TR&D Theme 3: Although networks have been very useful for representing molecular interactions and mechanisms, network diagrams do not visually resemble the contents of cells. Rather, the cell involves a multi-scale hierarchy of components – proteins are subunits of protein complexes which, in turn, are parts of pathways, biological processes, organelles, cells, tissues, and so on. In this technology research project, we will pursue methods that move Network Biology towards such hierarchical, multi-scale views of cell structure and function.
Building Regulatory Networks with CyTargetLinker summarizes CyTargetLinker, a Cytoscape app that integrates regulatory interactions into network analysis. CyTargetLinker extracts regulatory interactions from multiple data sources called Regulatory Interaction Networks (RINs) and links them to an initial network. This allows visualization of how transcription factors, microRNAs, drugs, and other regulators interact with existing networks like pathways. CyTargetLinker provides flexible filtering and a user-friendly workflow to help biologists generate and analyze hypotheses about regulatory mechanisms involved in processes like breast cancer and DNA damage response. Future work will focus on supporting additional data sources and statistical outputs to analyze overlapping regulatory interactions.
National Resource for Networks Biology's TR&D Theme 1: In this theme, we will develop a series of tools and methodologies for conducting differential analyses of biological networks perturbed under multiple conditions. The novel algorithmic methodologies enable us to make use of high-throughput proteomic level data to recover biological networks under specific biological perturbations. The software tools developed in this project enable researchers to further predict, analyze, and visualize the effects of these perturbations and alterations, while enabling researchers to aggregate additional information regarding the known roles of the involved interactions and their participants.
HPC-MAQ : A PARALLEL SHORT-READ REFERENCE ASSEMBLERcscpconf
HPC-MAQ is a parallel implementation of the MAQ reference assembler that leverages Hadoop and MapReduce to enable MAQ to run in a distributed, parallel manner on large datasets. It addresses the computational challenges of reference assembly by splitting the input reads into chunks that are processed simultaneously. The MAQ algorithm is used to align reads to a reference sequence and call consensus genotypes. HPC-MAQ allows MAQ to scale to larger genomes by distributing the work across multiple nodes in a Hadoop cluster.
Dynamic Access Control for RBAC-administered web-based DatabasesThitichai Sripan
This document proposes an extension to the Role-Based Access Control (RBAC) model called RBAC+ to provide dynamic access control for web-based databases. RBAC+ adds the concepts of application, application profile, and sub-application session to RBAC in order to track users throughout an entire session. This allows RBAC+ to detect and prevent malicious transactions by monitoring the SQL statements within a user's session based on the expected application profile. RBAC+ aims to enhance database security by cancelling malicious transactions before they can succeed.
This document summarizes a senior care coordination service called Dovetail Care. It collects comprehensive health, legal, financial, and personal records from seniors and their circle of care in a secure cloud storage. This allows real-time monitoring of a senior's ability to live independently and travel safely. The service aims to unite family members and professionals to support seniors' goals through accessible communication and care portals.
Each panel should contain a clear beginning, middle, and end to tell a story. Arrange the panels sequentially to show the progression of events over time from left to right or top to bottom. Consider including dialogue, actions, settings, or emotions to engage the reader.
The Quilt Guild of Central Ohio is celebrating its 25th anniversary this year. For over two decades, the guild has brought together quilters of all skill levels to share their passion for quilting through monthly meetings, workshops, community service projects, and an annual quilt show. As it marks 25 years of quilting, sewing, and community, the guild looks forward to continuing its mission of promoting the art of quilting for many years to come.
This document provides information about the Mexican artist Betsabee Romero and examples of her artwork. It summarizes that she uses car parts like tires to create sculptures, having studied art in Mexico City and Paris. Examples shown include sculptures made from entire cars or just car tires. The document suggests her artwork may symbolize dreams of a better life and is influenced by her culture's Mayan and Mexican folk art traditions. Basic museum etiquette of not touching, running, or shouting is also outlined.
Dovetail Care is a software company dedicated to empowering seniors through a system that provides personalized care plans, communication tools for families/caregivers, and access to community resources. Their system aims to identify issues early and connect seniors to help before problems arise. It will launch in March 2013. Dovetail Care was created by Monica Stynchula and is advised by Dr. Osman Ahmed, who has studied how consumer involvement in care management can significantly reduce hospital readmissions. The company plans to work with Medicare Advantage and Medicaid plans by providing their system as an added benefit to engage members and improve health outcomes.
Research and Development of Hydro-ecological Spatial Database and Management ...Thitichai Sripan
This document discusses the development of a hydro-ecological spatial database and management system. It describes building the database using spatial data from monitoring of a hydro-ecological system in an arid region of China. The database organizes this spatial data and allows for analysis of the temporal and spatial characteristics of the hydrological data. A management system was also developed to facilitate storage, querying, analysis and processing of the large amounts of hydro-ecological data.
The document outlines the history and key components of the 1987 Constitution of the Philippines. It discusses the previous constitutions from 1898 onwards and how they shaped the government and laws of the Philippines over time. It also lists the 18 parts that make up the 1987 Constitution, establishing the Philippines as a democratic republic and outlining the branches of government and protections for citizens.
Wolf Kahn makes landscape art using unusual and extraordinary colors that became famous. His artwork focuses on the area where water, land, and sky meet at the horizon line.
healthfinders mobile app Engaging in Senior Care with Dovetail Care and Healt...Monica Stynchula
Engaging in Senior Care mobile app targets the largest and fastest growing population in our country. Baby Boomers are retiring at the rate of 8,000 a day for the next fifteen years! DovetailCare.us and Healthfinders.gov join in the mission of informing, engaging and empowering senior health.
Aging is a journey best travelled with a map and emergency kit for the road ahead. Your retirement health journey requires the same careful planning. Engaging in Senior Care mobile app empowers you to use your Medicare, Medicaid and health resources for your journey. BON VOYAGE!
Cartooning and comics involve both static cartoon characters in comic strips and animated cartoon characters. Cartoonists draw comic strips while animators bring cartoons to life in motion. Famous early cartoon characters include Mickey Mouse. Comic strips like Peanuts were later adapted into animated cartoons and movies. Cartoon characters typically have exaggerated features and animals are often given human traits, like Tom and Jerry or Bugs Bunny. Many superheroes that originated in comics have also been featured in animated cartoons and live-action movies, such as Batman, Spiderman, and The Hulk. Manga, the Japanese word for print comics, has also become popular worldwide with examples like Pokemon and Sonic the
Oaxacan wood carvings are hand-carved and painted figures from the state of Oaxaca, Mexico. Artists carve the figures from copal wood using machetes and knives, then meticulously paint them with vibrant colors and detail. The whimsical figures depict animals and creatures from Zapotec mythology in poses that appear animated. Carvers draw from their own imagination and folk traditions to create the magical wood sculptures.
Vincent Van Gogh was a Dutch post-Impressionist painter and draughtsman whose work had a far-reaching influence on 20th-century art. Born in 1853, Van Gogh struggled with mental illness and poverty for most of his adult life. He is now widely regarded as one of the greatest and most influential figures in the history of Western art.
Watercolor wonder- watercolor art techniques carolinehduggan
This document lists various watercolor techniques and artists including wash wet on wet, tape, dry brush, scratch, and salt techniques and the artists Edward Hopper, Georgia O'Keeffe, J.M. Turner, John Singer Sargent, Andrew Wyeth, and Winslow Homer.
Bioinformatics is the application of computational tools and techniques to analyze and interpret biological data. It involves the development of these tools and databases, as well as their application to better understand biological systems and functions at the molecular level through analysis of genetic sequences, protein structures, and more. The goal is to gain a global understanding of cellular functions by analyzing genetic data as dictated by the central dogma of biology, and relating sequence information to protein functions and cellular processes.
SEMI SUPERVISED BASED SPATIAL EM FRAMEWORK FOR MICROARRAY ANALYSISIRJET Journal
This document presents a semi-supervised spatial EM framework for microarray analysis to efficiently classify and predict diseases based on gene expression data. It uses a spatial EM algorithm to cluster gene expression data, followed by an SVM classifier to predict diseases and their severity levels. The proposed approach is evaluated based on classification accuracy, computation time, and ability to identify biologically significant genes. Experimental results on disease datasets show improved accuracy compared to other supervised and unsupervised methods. The authors conclude that using the same classifier for gene selection and classification enhances predictive performance, and future work will focus on partitioning genes into clusters correlated with sample categories to further improve accuracy.
OPTIMIZED PREDICTION IN MEDICAL DIAGNOSIS USING DNA SEQUENCES AND STRUCTURE I...IAEME Publication
The prediction in medical diagnosis is an important role in the field of bio informatics which acts as a vital tool for handling and maintaining human health care in an efficient way. The technologies involves in the process prediction are al complex ones to integrate and implements in an effective way. The optimized prediction in the medical diagnosis reduces the medical treatment complexities along with the time and cost saving benefits. The DNA (Deoxyribonucleic Acid) sequences and structure information will make the disease diagnosis prediction with more accuracy and optimizations for comparisons and conclusions. For the impact of inheritance based diseases the earlier predictions will definitely act as a pivotal process for improving the cure strategies for any human being. The existence case disease diagnosis based prediction will also help and supports the medical treatment in an advanced way both in technical and process wise. This paper proposed Optimized Prediction in Medical Diagnosis Using DNA Sequences and Structure Information with pattern matching and comparison analysis using DNA sequence and structure information for individual patient condition. In future this paper will be extended with artificial intelligence based implementation through genetic algorithm to attain a DNA based Medical Diagnosis Disease Prediction System.
The document proposes a two-phase framework for detecting and attributing cyber attacks in IoT-enabled cyber-physical systems. The first phase uses deep representation learning to detect attacks in imbalanced data. The second phase uses an ensemble of one-vs-all classifiers to attribute different attack types. The proposed framework achieves better recall and F-measure than previous works in detecting known and unknown attacks. Future work includes building a normal system profile to identify anomalies not detected in the first phase.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
IMPORTANT: If you want to get a clear review of the Differences & Complementarities Between « Heuristic » and « Mathematical » approaches, we invite you to download our presentation given during the EPA (European Psychiatric Association) conference in 2011 that is now utilized in training programs.
introduction,history scope and applications of
relation to other fields , bioinformatics,biological databases,computers internet,sequence development, and
introduction to sequence development and alignment
The National Resource for Network Biology aims to provide freely available, open-source software tools to enable researchers to assemble biological data into networks and pathways and use these networks to better understand biological systems and disease; it pursues this mission through technology research and development projects, driving biological projects, collaboration and service projects, training, and dissemination; key components include the Cytoscape software platform, supercomputing infrastructure, and partnerships with over 30 external research groups.
The document discusses microarray classification using computational intelligent techniques. It describes how microarrays can be used to analyze gene expression levels and classify samples, such as diagnosing tumors. Intelligent techniques like neural networks, genetic algorithms, and fuzzy logic are well-suited for microarray classification due to their ability to handle large and noisy biological data. The objective is to implement these techniques to maximize the accuracy of microarray classifiers for important medical applications.
GASCAN: A Novel Database for Gastric Cancer Genes and Primersijdmtaiir
GasCan is a specialized and unique database of
gastric cancer protein encoding genes expressed in human and
mouse. The features that make GasCan unique are availability
of gene information, availability of primers for each gene, with
their features and conditions given that are useful in PCR
amplification, especially in cloning experiments and to make it
more unique built in programmed sequence analysis facility is
provided that analyze gene sequences in database itself,
resulting sequence analysis information can be valuable for
researchers in different experiments. Furthermore, DNA
sequence analysis tool is provided that can be access freely.
GasCan will expand in future to other species, genes and cover
more useful information of other species. Flexible database
design, expandability and easy access of information to all of
the users are the main features of the database. The Database is
publicly available at http://www.gastric-cancer.site40.net.
This document summarizes computational analysis methods for determining expectation values commonly used in bioinformatics databases. It discusses tools like BLAST, FASTA, and databases like NCBI that allow querying and analyzing sequences. The expectation value provides the probability that a match could occur by chance, with lower values indicating higher quality matches. These tools and databases facilitate customizable extraction of data from sequences to enable further analysis and knowledge discovery in bioinformatics.
Abstract-GasCan is a specialized and unique database of gastric cancer protein encoding genes expressed in human and mouse. The features that make GasCan unique are availability of gene information, availability of primers for each gene, with their features and conditions given that are useful in PCR amplification, especially in cloning experiments and to make it more unique built in programmed sequence analysis facility is provided that analyze gene sequences in database itself, resulting sequence analysis information can be valuable for researchers in different experiments. Furthermore, DNA sequence analysis tool is provided that can be access freely. GasCan will expand in future to other species, genes and cover more useful information of other species. Flexible database design, expandability and easy access of information to all of the users are the main features of the database. The Database is publicly available at http://www.gastric-cancer.site40.net.
Chapter 5 applications of neural networksPunit Saini
Neural networks are being used experimentally in several medical applications, including modeling the cardiovascular system and diagnosing medical conditions. They can be used to detect diseases by learning from examples without needing a specific algorithm. Neural networks are also being explored for applications like implementing electronic noses for telemedicine. Researchers are working to build artificial brains more cheaply using field programmable gate arrays (FPGAs) on commercial boards, which could enable evolving millions of neural network modules at electronic speeds. Genetic algorithms are also being combined with neural networks to help optimize their structure and performance for tasks like object recognition.
This document provides an overview of bioinformatics and genomics. It begins with an acknowledgement and abstract section. The introduction defines bioinformatics and its role in analyzing genetic sequences and biological data through computational methods. Major research areas of bioinformatics discussed include sequence analysis, genome annotation, evolutionary biology, measuring biodiversity, gene expression analysis, protein analysis, cancer mutation analysis, and protein structure prediction. Comparative genomics and modeling biological systems are also summarized. The document concludes with a definition of genomics as the study of genomes through sequencing efforts and mapping genetic interactions.
BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKSIJNSA Journal
The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which allows supervising various essential biological signals (rate of heartbeat, pressure, etc). The sensitivity of medical information requires mechanisms of safety. This performance constitutes a challenge for WBSN because of their limitation in resources energy and data-processing. In this paper we propose a new approach to symmetric cryptographic key establishment, based on biometrics physiology. This approach takes into account WBSN constraints and its topology.
This document provides an overview of bioinformatics and bioinformatics databases. It defines bioinformatics as the application of information technology to molecular biology to analyze and interpret biological data. This includes tasks like mapping and analyzing DNA and protein sequences. The document discusses how bioinformatics databases are used to store and manage the large amounts of biological data generated. It describes the characteristics of biological databases and how they are used for querying and retrieving sequence information. Key areas of bioinformatics research and important sequence databases are also summarized.
Next generation sequencing (NGS) allows for the massively parallel sequencing of DNA sequences. NGS technologies can sequence entire genomes in a single run and provide information useful for pathogen identification, outbreak investigation, and molecular diagnostics. NGS workflows involve sample preparation, sequencing using platforms such as Illumina or Ion Torrent, and bioinformatics analysis to assemble and interpret the large amounts of sequencing data produced. NGS has many applications including mutation discovery, microbial genome mapping, and metagenomics.
This document discusses optimizing cancer genomics pipelines on parallel supercomputers. It describes using a custom-built pipeline of open-source genomics codes to analyze RNA-Seq data from Adenoid Cystic Carcinoma tumor samples. Preliminary results show parallelizing the pipeline on a supercomputer by splitting the input data and running parts in parallel reduced processing time compared to running on a single node. Further optimization of the pipeline and testing on more data is planned.
This document provides an overview of bioinformatics and discusses key concepts like:
- Bioinformatics combines biology, computer science, and information technology to analyze large amounts of biological data.
- High-throughput DNA sequencing has generated vast genomic data that requires bioinformatics tools and databases accessible via the internet to analyze and share.
- Popular sequence alignment tools like BLAST, FASTA, and ClustalW are used to search databases and compare sequences, helping researchers analyze genes and genomes.
Similar to A Reliable Password-based User Authentication Scheme for Web-based Human Genome Database System (20)
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Programming Foundation Models with DSPy - Meetup Slides
A Reliable Password-based User Authentication Scheme for Web-based Human Genome Database System
1. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
A Reliable Password-based User Authentication
Scheme for Web-based Human Genome Database
System
Wei-Hsin Chen Zhen-Yu Wu1, Feipei Lai1,2,3, Yin-Hsiu Chien4, Wu-
Graduate Institute of Biomedical Electronic and Liang Hwu4
1
Bioinfomatics Department of Computer Science and Information
National Taiwan University Engineering
2
Taipei, Taiwan Graduate Institute of Biomedical Electronic and
d97945014@ntu.edu.tw Bioinfomatics
3
Department of Electrical Engineering
4
Department of Medical Genetics
National Taiwan University and Hospital
Taipei, Taiwan
Abstract—With the initial completion of Human Genome Project, Taiwan University Hospital. Here physicians help to examine
the post-genomic era is coming. Although the genome map of the genetic deficiencies of patients. They use the sequence
human has been decoded, the roles that each segment of alignment tool- BLAST [3], to align the suspected DNA
sequences acts are not totally discovered. On the other hand, with sequences, investigate the causes and pathogenic mechanisms
the rapid expansion of sequence information, the issues of data of the genetic diseases.
compilation and data storage are increasingly important.
Recently, a “Web-based Human Genome Database System” is Recently, a “Web–based Human Genome Database
implemented in National Taiwan University Hospital. The System” (WHGDS) is implemented in National Taiwan
achievement of this system is that it integrates the modules of University Hospital (NTUH). The achievement of this system
sequence alignment and data compression on genome. For goals is that it integrates the modules of sequence alignment and data
of secure accessing this system over insecure networks, protocols compression. By embedding with the NCBI alignment program,
of user authentication become more important. They are able to blastall, it automatically aligns the uploaded sequences and
ensure the security of data transmission and users’ searches for the corresponding genomic positions. Besides, the
communication. In this paper, a password-based user system encodes the differences between sequences, effectively
authentication scheme, because of its convenience, efficiency, and compresses them and decreases the demand of storage spaces.
property of simplicity for human memory, is proposed for the At the same time, it offers a protected way to access the
system. personalized database. Also, users can quickly access the
interesting data by inputting the keywords of specimen number,
Keywords- Web-based Human Genome Database System; user
authentication; password; human memory.
GI and sequence position, etc.
This system provides the following two major features:
I. INTRODUCTION First, it integrates the components of NCBI BLAST tools
together with RepBase and RefSeq database, offers an auto-
The term “DNA sequencing” refers to a technique used to
aligning mechanism for those sequences uploaded by users.
determine the orders of nucleotides- adenine, guanine, cytosine,
Second, the system compresses those sequences by encoding
and thymine, in a DNA sequence. In many biological
the mismatches, which effectively decreases the demand of
applications, the composition of sequence need to be known
storage space.
because it tells what kind of genetic information that is carried.
For example, scientists investigate the sequence of DNA to As the sequence data accumulating day by day, the issues
determine whether there are functional segments such as genes, for data storage and data compilation become more and more
as well as to analyze those genes that carry genetic mutations. important. The goal of this study is to construct a secure web-
Knowledge of the DNA sequencing has become indispensable based human genome database system to help the users store
for basic biological process, as well as genetic diagnosis and and mange those sequence data.
forensic research [1]. Sanger biochemistry [2] is the primary
technique used for DNA sequencing since the early 1990s. The security issue for the WHGDS becomes a significant
concern. Speaking specifically, the most concerned security
DNA sequencing is applied for the purpose of genetic issue is how to ensure information privacy and security during
diagnosis in the Department of Medical Genetics of National transmission through the insecure networks. Relevant user
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 227
2. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
authentication schemes or secret-key distribution protocols are represent the exact sequences of individual’s genome. Other
generally used to solve this kind of problem because these works such as the exploitation of single nucleotide
protocols are regarded as the primary safeguards in network polymorphism (SNP) and the analysis of variation for repeat
electronic applications [4-9]. Among these protocols, the copy-number are still in process. Knowledge of HGP with
password-based mechanism is the most widely employed these works can help the genetic diagnosis, forensic
method because of its efficiency [10]. Under such mechanism, identification and other biological research.
each user is allowed to select his password and keep in mind
without any additional assistant device for the further B. Genome Database
authentication process. The term “genome database” refers a database to store the
Unfortunately, most of these schemes are proven to be genome-associated data. They are utilized in many applications
unable to resist off-line password guessing attacks [11-15]. such as the analysis of genetic diseases, genetic finger-printing
Adversary can correctly guess the password of a specific user for criminology, and genetic genealogy. There are many public
by brute force attacks through intercepted information or self- genome databases and genome search engines through the
generated parameters. Endless possible problems are then internet. For examples, Genbank [17] incorporates DNA
presented with the hacking of the password. For example, the sequences from all available public sources, primarily through
malicious attacker may masquerade as a server to communicate the direct submission of sequence data from individual
with other users or impersonate as the user to log into a server laboratories and from large-scale sequencing projects. The
to acquire services. Therefore, we would like to propose a Ensembl [18] provides a bioinformatics framework to organize
secure and efficient password-based scheme suitable for the biology around the sequences of large genomes. It is a
WHGDS. comprehensive source of stable automatic annotation of the
human genome sequences. DDBJ (DNA Data Bank of Japan)
The rest of this paper is organized as follows. Section 2 processes and publishes the massive amounts of data submitted
introduces the web-based human genome database system in mainly by Japanese genome projects and sequencing teams.
NTUH. Section 3 illustrates the proposed password-based user It’s emphasized that the cooperation between data producing
authentication scheme. Security analyses are done in Section 4. teams and the data bank is crucial in carrying out these
Comparisons are given in Section 5, and finally, conclusions processes smoothly [19]. In this paper, a genome associated
are drawn in Section 6. database- RefSeq [20], is used to help construct the customized
human genome database system.
II. INTRODUCTION OF WEB-BASED HUMAN GENOME
DATABASE SYSTEM C. System Architecutre
A. Human Genome Project
With the rapid development of sequencing attained with
DNA sequencing technology, the research of human genome
become possible. The Human Genome Project (HGP) was an
international cooperative project with the major goal to
determine the sequences which make up the human genome
from both a physical and functional perspective. This project
began in 1990 promoted by James D. Watson at the U.S.
National Institutes of Health. An initial draft of human genome
was released in 2000. Later, a more complete one is published
in 2003, with further research still being reported. A parallel
project was performed outside of government by the Celera
Corporation [16]. As parts of the HGP, parallel sequencing was
done for other organisms such as bacterium E. coli and mouse.
These help to improve the technology for sequencing and help
the explanation of human genes. The objective of this project
can be summarized as follows [3].
Figure 1. System architecture of WHGDS
1) Identify all the genes in human genome and exploit
their functions. This system is mainly composed by five parts:
2) Determine the sequences of the 3 billion base pairs that
1) The web server: it offers the accessment for sequencing
make up the human genome.
files uploading, file management, and genomic sequence
3) Properly store these related data in databases.
management.
4) Improve tools for data analysis.
2) Sequence converter: it invokes blastall program to
5) Address the “ethical, legal, and social issues (ELSI)”
perform the alignment works for uploaded sequences against
that arise from this project.
It should be noticed that all humans have their unique the reference sequences in RefSeq database.
genomic sequence. Those sequences depicted by HGP do not 3) RefSeq and RepBase: they provide the standard human
sequences and the repetitive element sequences, respectively.
Identify applicable sponsor/s here. If no sponsors, delete this text box.
(sponsors)
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 228
3. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
4) Alignment database and genome database: The Second, the mismatch information is saved for data
alignment database contains the alignment results output by compression. The distance with the next mismatch, the
Mega BLAST (in compressed format). The genome database is mismatch type, different nucleotides are recorded and then
the combination of the sequence data if there are some parts combined together as (differential length, mismatch type,
nucleotide). There are three kinds of mismatch type- insertion,
overlapped.
deletion, replacement. It should be noted that the mismatch
5) Sequence assembler: it is responsible for the data type- deletion, has no “nucleotide” pattern behind it. The
decompression and sequence assembly process. former example is recorded as:
D. Sequence Conversion (3, Replacement, T), (4, Deletion), (5, Insertion, C), (1,
In this section, the conversion process for uploaded Insertion, G)…
sequences is introduced. The discussion is split into several
To further transform these mismatches, Fibonacci codes are
parts including sequence pre-processing, sequence aligning and
applied to encode each “differential length”, and 2 bits are
sequence post-processing. The processing flow is described as
appended to encode each “mismatch type” and
the following:
each ”nucleotide”. Fibonacci codes [20] are utilized as an
1) Sequence Preprocessing alternative to Huffman codes when the probability distribution
The uploaded sequences are in raw format and need to be of the latter is not clear. It’s simple, fast and robust to be used
converted to FASTA format to be recognized by blastall. A to encode the series of positive integers. Each integer it
sequence in FASTA begins with a single-line description, encodes is ended with “11”, which can be recognized as the
followed by lines of sequence information. The description line separator when decoding. Hence, the mentioned mismatches
begins with a greater-than (“>“) symbol in the first word. By are illustrated in Fig. 2.
the way, it is suggested that “batch search” of BLAST is more (3,Replacement,T) (4,Deletion) (5,Insertion,C) (1,Insertion,G) (587,Replacement,A)
efficient because the entire collection of reference sequences
only need to be scanned by once. For this reason, we Differential length: Fibonacci coding
concatenate the multiple sequences into a single FASTA file, Mismatch type Replacement: 00 Insertion: 01 Deletion: 10
Nucleotide A: 00 T: 01 C: 10 G: 11
one after another with no blank lines in between sequences.
2) Sequence Aligning (0011,00,01) (1011,10) (00011,01,10) (11,01,11) (00101000101011,00,00)
After the conversion of sequences by FASTA, the sequence
converter automatically invokes a program– blastall, to execute
the alignment work. blastall has some parameters that can be
00110001101110000110110110111001010001010110000
arranged to fulfill the various purposes for alignment. The
alignment algorithm- Mega BLAST is chosen. Fig. 3 shows the Figure 2. The encoded example
sequence aligning process executed by blastall. First, the
repetitive element database- RepBase is applied to mask the Fibonacci coding is simpler and faster than other entropy
human repetitive segments occurred in the uploaded sequences. coding methods such as Huffman codes or Arithmetic encoding.
This masking effectively speeds up the search process. Second, For the same purpose to be simple and fast, we use 2 bits to
the RefSeq database is provided to address the alignment work. encode each “mismatch type.” After the compression
Those uploaded sequences are aligned with the reference completed, we store them together with the data extracted from
sequences and then mapped to the corresponding genomic the XML-report (i.e. GI, template, positions, etc.) into the
positions. alignment database.
3) Sequence Postprocessing
In this stage, a XML-parser is designed to extract the E. Sequence Retrieve
interesting information in XML report, and then transmit these The alignment database stores the alignment data of
data into alignment database. Because the alignment results uploaded sequences. The users can retrieve these data to check
occupy a large amount of storage spaces, these data should be whether they are correct or not. While these data are in
further compressed. Here a compression algorithm is proposed compressed format, they need to be decompressed before
to address this issue. First, let us consider the following displayed. The retrieving procedure is stated in this section.
alignment.
a) fastcmd
C A T C T G - G A G T C G T … fastacmd is a program provided by NCBI to get the
| | | | | | | | | | interesting segments from the huge pool of sequences. At first,
the system gets the information about GI, template and
C A G C T G A G A G T - - T … positions form alignment database. Then it invokes fastacmd to
The upper part is the uploaded sequence and the lower part retrieve the corresponding segment of reference sequence
is the reference sequence. The symbol ‘|’ in the middle according to the provided information.
indicates that the upper nucleotide and lower nucleotide are
b) Sequence Assembly
matched. Therefore, the others indicate that the base pair is
mismatched between the uploaded and reference sequences. While the information about GI, template and positions are
retrieved, the mismatches data also regained. These
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 229
4. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
mismatches are in compressed format and they need to be well protection against the analysis attack of smart cards so as
decompressed for further assembly. After the reference to prevent other users to catch the values.
sequence is acquired by fastacmd, those mismatches are
appended on the reference one by the way reverse to the Step 3: S returns pwi and the smart card to Ui through a
compression process. Finally, the original sequence and its secure channel.
alignment are obtained with the reference sequence. Each
sequence is retrieved by the same method and the users can B. Login Phase
choose the interesting parts for further stored to the genome When user Ui wants to log into the remote server S, he
database. firstly inserts his smart card into a terminal and then keys in his
identification IDi along with his password pwi . The smart card
F. Genome Combination will execute the following steps automatically:
Those examined sequences are picked by the users then Compute a dynamic ID for user Ui at time T. CIDi = h(pwi )
stored to genome database. The difference between alignment h(Ni y T) h(y || IDi), where T is the timestamp of Ui ’s
database and genome database is that the latter stores the computer.
jointed sequences and these sequences can be further modified
by the users, but the alignment database only stores the Send h(y || IDi), CIDi, Ni, k and T to server S through a
uploaded sequences aligned by Mega BLAST. Furthermore, common channel.
those sequences in alignment database may overlap but this
situation will not occur in genome database. C. Verification Phase
When server S receives the login request (h(y || IDi), CIDi,
III. PROPOSED AUTHENTICATION SCHEME Ni, k, T) at time T', server S does the verification as follows:
In this section, we would like to propose a password-based Check the validity of the time interval. If T* - T ΔT holds,
authentication scheme. This scheme is composed of four S accepts the login request of Ui; otherwise, the login request is
phases. They are the registration phase, the login phase, the rejected.
verification phase, and the password change phase. Below is
the detailed description of this proposal. Compute y = c – k / x.
Before describing the details of the proposal, the notation Compute h'(pwi ) = CIDi h(Ni y T) h(y || IDi).
defined and used in this scheme is shown in Table 1. Compute ID'i = Ni h(x || h(y || IDi)) h'(pwi), and then
hash the value with y to form h(y || ID'i).
TABLE I. NOTATION DEFINED AND USED IN THE SCHEME Verify whether h(y || ID'i) is equivalent to h(y || IDi). If it is,
S accepts the login request of Ui; otherwise, the login request is
U the user
rejected. Then S computes a' = h(h'(pwi ) y T').
Pw the password of user U
Send (a', T') to Ui for a mutual authentication processing.
ID the identity of user U
When user Ui receives the reply message (a', T') from
S the remote server server S at time T'', Ui does the verification as follows:
h( ) a public one-way hash function Check whether T* - T' ΔT holds. If it does, user Ui will
a bit-wise XOR operation accept the reply message and go on to the next step; otherwise,
he refuses the reply message.
A. Registration Phase
Compute a = h(h'(pwi) y T').
Suppose user Ui wants to register to a remote server S.
Then he proposes a registration request so as to get his Verify whether a is equivalent to a'. If they are equivalent,
password and his smart card from the server as follows. user Ui confirms that server S is valid.
Step 1: Ui sends his own identification IDi to S. Compute session key sk = h(h(T' y)).
Step 2: S computes Ni = h(pwi ) h(x || h(y || IDi)) IDi, D. Password Change Phase
where || is a bit concatenation operator, x is the
secret of the remote server, pwi is the password of When user Ui wants to change his password, he inserts his
Ui chosen by S, and y is a secret number selected by smart card into a terminal device. He firstly keys in his old
the remote server and stored into each registered password pwi and then follows his new password pwnew. The
user’s smart card. smart card will execute the following steps:
S generates the secret constant value c = xy + k, where k is Compute Ni* = Ni h(pwi) h(pwnew).
a value for Ui and is computed by c - xy. Step 1: Replace the original Ni with this new one, Ni*, and
S personalizes Ui’s smart card which included with the then the password is changed.
parameters [h( ), Ni, y, k]. All parameters should be provided a
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 230
5. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
E. Security Analysis assuring data integrity and security during transmission.
A password-based user authentication scheme for the Safeguarding confidential data from revelation, modification,
integrated WHGDS is effective when it can assure the system’s or deletion during its transmission is the major concern in this
security in terms of password protection, data transmission, stage.
user masquerading and system spoofing. In other words, the A session key is used in our scheme to protect the
scheme can resist various malicious attacks, including stolen- confidential data from being revealed, modified, or deleted
verifier attacks, on-line and off-line password guessing attacks, during its transmission. The session key is generated via
replay attacks, and server spoofing attacks. In this section, we hashing two numbers y and T' after the verification process. All
will analyze each in details and show how the proposed scheme of the confidential data are encrypted by the session key, which
satisfies with the above-mentioned security criteria. means that without the session key, no attacker can eavesdrop,
modify, or delete the transmitting data.
F. Password Protection
Furthermore, the session key in our scheme will be invalid
Here the passwords play a very important role for each user, whenever the communication between the user and the
such as a doctor, a nurse, a patient, or a scholar, for logging integrated system server goes to the end. This means the key
into the remote server. Assuring the security of a password is will have expired its period of usage and cannot be used any
the most crucial key-point in our security analysis. Thus, we more so that it is revoked. When the user enters the system
would like to prove that our password authentication scheme again, a new session key will be generated for him to encrypt
can withstand two kinds of attacks aimed at passwords. They his information during the current communication process.
are the stolen-verifier attack, and the password guessing attack. Therefore, there will be much difficulty for anyone to calculate
The password guessing attack can further be classified into on- any of the probable previous session keys despite using all his
line and off-line attacks. known information.
Stolen-verifier attacks mean that some machinated insiders Therefore, unless the user shares his session key on purpose
of a remote server are able to steal or modify the users’ with the third party, our scheme shows the ability to achieve
legitimate passwords or update the password-verification tables the requirement of data transmission security with the help of
stored in the server’s database. This attack would not succeed the session key.
in our scheme because the password of a user is
instantaneously generated and verified by the server, who uses
H. User Masquerading Detection
its secret values c and x upon the login phase. No passwords or
verification tables have to be kept in the server’s database; While the password authentication is being processed,
therefore, the insiders would not be able to steal or modify the conspiring attackers may impersonate the identities of the
passwords. medical staff, patients, or researchers in order to pass the
authentication phase and gain the right to access the data in the
An on-line password guessing attack means that an attacker WHGDS. To prevent the disclosure of users’ privacy, protocols
continuously guesses a possible password and tries to log into a are necessary to fend off replay attacks. A replay attack is a
remote server until he is successful. In our scheme, such kind of network attack in which a valid data transmission is
attacks can be detectable. If an adversary attempts to identify repeated maliciously. This kind of attack is generally done by
the password of Ui, he is supposed to use every guessed some machinated adversary, who intercepts the data and
password to obtain the corresponding CIDi in the login phase. transmits it repeatedly. In our scheme, we employ the concept
However, the probability of guessing the correct password is of a timestamp to avoid such attacks. When server S or user Ui
only 2-k, where k is the length of the selected password. receives a message, he firstly calculates the difference between
Generally, if a guess is wrong, server S can detect easily that the current time T* and transmitted time T. And then he will
there is an adversary trying to acquire services illegally. check whether the difference is smaller than ΔT . If it is, then
Therefore, on-line password guessing attacks cannot succeed. the message is valid; otherwise, the message may be re-sent.
An off-line password guessing attack means that an attacker Therefore, the replay attack is fruitless.
can employ some intercepted information to guess the Actually, the password in our scheme is protected by the
password of a specific user by brute force attacks. Take a cryptographic hash function, and thus an attacker is unable to
glance on our scheme. The secret parameters such as x and y generate and interpret authentication messages correctly
are protected by the cryptographic hash function and are not without the knowledge of a user’s password. It is obviously
revealed to anyone; thus, this kind of attack will not work. impossible for a person in our scheme to masquerade as a
Now, assume that an adversary has obtained the following legitimate user to log into an integrated system server and
parameters (h(y || IDi), CIDi, Ni, T) in the login phase. However, acquire system services.
without y, he cannot compute h'(pwi ) = CIDi h(Ni y T)
h(y || IDi). Similarly, it is also unable for him to calculate h'(pwi ) I. Server Spoofing Detection
= Ni h(x || h(y || IDi)) ID'i without x and IDi. Therefore,
off-line password guessing attacks can be withstood. Similar to Section C, the attack by someone masquerading
as the server to cheat other users is another security concern.
An attacker may masquerade the identity of the system to carry
G. Data Transmission Security
out illegal, imperceptible authentication behavior, and
After a user logs into the system successfully, another consequently obtain the private information of some user
crucial security issue upon authentication arises, which is
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 231
6. 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), 31 May -3 June 2011, Daejeon, Korea
through the transmitted data. This is known as server spoofing environments. This authentication scheme will be realized and
attacks: someone masquerades as the server to cheat other validated soon.
users.
There is one possible way to let a conspiring attacker ACKNOWLEDGMENT
successfully spoof the other users in such schemes. When the The authors would like to acknowledge the fund from the
attacker obtains the secret values x of a remote system, he can Microsoft Corporation and the helps from their staff.
impersonate the server. In our scheme, however, the secret
values c and x are never transmitted via a common network
REFERENCES
channel and are stored on the server computer’s hard drive
which only the administrator has the right to control and access; [1] “DNA sequencing,” http://genomics.org/index.php/DNA_sequencing
so it is impossible for anyone to acquire them. Therefore, the [2] F. Sanger, G. M. Air, B. G. Barrell, et. al., “Nucleotide sequence of
bacteriophage phi X174 DNA,” Nature, vol. 265, no. 5596, pp. 687-695,
server spoofing attacks will be detected and prevented. 1977.
[3] Human Genome Project Information,”
J. Comparison http://www.ornl.gov/sci/techresources/Human_Genome/home.shtml
To display how our proposed password-based user [4] E. Ball, D.W. Chadwick, and D. Mundy, “Patient Privacy in Electronic
authentication scheme is suitable and efficient to be Prescription Transfer,” IEEE Security & Privacy Magazine, vol. 1, no. 2,
pp. 77-80, 2003.
implemented under the e-medicine environments, following is
the comparison of our scheme with other related schemes as [5] L. Lamport, “Password authentication with insecure communication,”
Communications of the ACM, vol. 24, 1981.
summarized in Table 2. Clearly, Lin-Lai’s scheme [12] and
[6] G. Ateniese, R. Cutmola, B. de Meideiros, and D. Davis, “Medical
Lee-Chiu’s scheme [13] require some exponential operations Information Privacy Assurance: Cryptographic and System Aspects,”
leading to the need for more calculation time resulting into Third Conference on Security in Communication Networks, 2002.
inefficiency. Wang et al.’s scheme [10] and Lu et al.’s scheme [7] M. C. Rash, “Privacy Concerns Hinder Electronic Medical Records,”
[15] suffer from insecure attacks, such as off-line password The Business Journal of the Greater Triad Area, April 4, 2005.
guessing attacks, server spoofing attacks and are not practical [8] G. Yee, L. Korba, and R. Song, “Ensuring Privacy for E-Health
for implementation. Ours on the contrary, has not only very Services,” In Proceedings of the First International Conference on
low computation costs, but requires only few hashing functions Availability, Reliability and Security, 2006.
and multiplication computations. With the analysis of the four [9] J. A.-Moreno, K. Matsuo, L. Barolli, and F. Xhafa, “Secure
communication setup for a P2P based JXTA-overlay platform,” IEEE
security concerns mentioned above, security on using the
Transactions on Industrail Electronics, no. 99, 2010.
mechanism is assured.
[10] Y. Y. Wang, J. Y. Liu, F. X. Xiao, and J. Dan, “A more efficient and
secure dynamic ID-based remote user authentication scheme,” Computer
TABLE II. COMPARISON WITH OTHER RELATED SCHEMES Communications, vol. 32, pp. 583-585, 2009.
[11] H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, “An efficient and practical
Wang solution to remote authentication: smart card,” Computers & Security,
Lin-Lai Lee-Chiu Lu et al. Our
et al. vol. 21, no. 4, pp. 372-375, 2002.
(2004) (2005) (2008) Proposal
(2009)
Computational [12] C. H. Lin and Y. Y. Lai, “A flexible biometrics remote user
operations in authentication scheme,” Computer Standards & Interfaces, vol. 27, no. 1,
1H+1E 2H+1E 1H 2H 2H+1M pp. 19-23, 2004.
registration
phase [13] N. Y. Lee and Y. C. Chiu, “Improved remote authentication scheme
Computational with smart card,” Computer Standards & Interfaces, vol. 27, no. 2, pp.
operations in 2H+2E 2H+1E 1EC 2H 4H 177-180, 2005.
login phase [14] S. W. Lee, H. S. Kim, and K. Y. Yoo, “Improvement of Chien et al.'s
Computational remote user authentication scheme using smart cards,” Computer
operations in Standards & Interfaces, vol. 27, no. 2, pp. 181-183, 2005.
1H+2E 2H 3H+2EC 6H 8H+1M
verification
phase [15] R. Lu, Z. Cao, Z. Chai, and X. Liang, “A simple user authentication
Suffer insecure scheme for grid computing,” International Journal of Network Security,
No No Yes Yes No vol. 7, no. 2, pp. 202-206, 2008.
attacks
H: one way hash function operations; [16] Human Genome Project HomePage, http://hgph.com/index.htm
M: multiplication operations; E: exponential operations [17] D. A. Benson, M. S. Boguski, D. J. Lipman, et. al., “GenBank,” Nucleic
EC: elliptic curve exponential operations Acids Research, vol. 27, no.1, pp. 12-17, 1999.
[18] T. Hubbard, D. Barker, E. Birney, et. al., “The Ensembl genome
IV. CONCLUSIONS database project,” Nucleic Acids Research, vol. 30, no. 1, pp. 38- 41,
In this paper, we aim to propose a password-based user 2002.
authentication scheme appropriate for the WHGDS. Not only [19] Y. Tateno , S. Miyazaki , M. Ota , et. al., “DNA Data Bank of Japan
can this scheme satisfy the requirements: password protection, (DDBJ) in collaboration with mass sequencing teams,” Nucleic Acids
Research, vol. 28, no. 1, pp. 24- 26, 2000.
data transmission security, user masquerading detection, and
[20] K. D. Pruitt, T. Tatusova and D. R. Maglott, “NCBI reference sequences
system spoofing detection, but it can also resist several (RefSeq): a curated non-redundant sequence database of genomes,
malicious attacks, including stolen-verifier attacks, on-line and transcripts and proteins,” Nucleic Acids Research, vol. 35, 2006.
off-line password guessing attacks, replay attacks, and server [21] A. Apostolico and A. S. Fraenkel, ”Robust transmission of unbounded
spoofing attacks. Analyses show that the scheme is secure and strings using Fibonacci representations,” IEEE Transactions on
efficient to be implemented under the medical application Information Theory, vol. 33, no. 2, Mar. 1987.
ISBN: 978-1-4577-0872-5 (c) 2011 IEEE 232