traceability analysis
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 21)

H-INDEX

8
(FIVE YEARS 2)

Foods ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 2372
Author(s):  
Raquel Garcia ◽  
Maria João Cabrita

Olive oil is a traditional product of the Mediterranean diet [...]


Biosensors ◽  
2021 ◽  
Vol 11 (8) ◽  
pp. 272
Author(s):  
Kazumichi Yokota ◽  
Asae Takeo ◽  
Hiroko Abe ◽  
Yuji Kurokawa ◽  
Muneaki Hashimoto ◽  
...  

Traceability analysis, such as identification and discrimination of yeasts used for fermentation, is important for ensuring manufacturing efficiency and product safety during brewing. However, conventional methods based on morphological and physiological properties have disadvantages such as time consumption and low sensitivity. In this study, the resistive pulse method (RPM) was employed to discriminate between Saccharomyces pastorianus and Dekkera anomala and S. pastorianus and D. bruxellensis by measuring the ionic current response of cells flowing through a microsized pore. The height and shape of the pulse signal were used for the simultaneous measurement of the size, shape, and surface charge of individual cells. Accurate discrimination of S. pastorianus from Dekkera spp. was observed with a recall rate of 96.3 ± 0.8%. Furthermore, budding S. pastorianus was quantitatively detected by evaluating the shape of the waveform of the current ionic blockade. We showed a proof-of-concept demonstration of RPM for the detection of contamination of Dekkera spp. in S. pastorianus and for monitoring the fermentation of S. pastorianus through the quantitative detection of budding cells.


Symmetry ◽  
2021 ◽  
Vol 13 (7) ◽  
pp. 1295
Author(s):  
Hsiao-Chung Lin ◽  
Ping Wang ◽  
Wen-Hui Lin ◽  
Kuo-Ming Chao ◽  
Zong-Yu Yang

Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets and adopt controlled zombies for flooding a victim’s network over the Internet. Analysing the multiple sources of DDoS attacks typically involves reconstructing attack paths between the victim and attackers by using Internet protocol traceback (IPTBK) schemes. In general, traditional route-searching algorithms, such as particle swarm optimisation (PSO), have a high convergence speed for IPTBK, but easily fall into the local optima. This paper proposes an IPTBK analysis scheme for multimodal optimisation problems by applying a revised locust swarm optimisation (LSO) algorithm to the reconstructed attack path in order to identify the most probable attack paths. For evaluating the effectiveness of the DDoS control centres, networks with a topology size of 32 and 64 nodes were simulated using the ns-3 tool. The average accuracy of the LS-PSO algorithm reached 97.06 for the effects of dynamic traffic in two experimental networks (number of nodes = 32 and 64). Compared with traditional PSO algorithms, the revised LSO algorithm exhibited a superior searching performance in multimodal optimisation problems and increased the accuracy in traceability analysis for IPTBK problems.


2021 ◽  
Vol 10 (1) ◽  
Author(s):  
Jian Zhou ◽  
Jianyang Xia ◽  
Ning Wei ◽  
Yufu Liu ◽  
Chenyu Bian ◽  
...  

Abstract Background An increasing number of ecological processes have been incorporated into Earth system models. However, model evaluations usually lag behind the fast development of models, leading to a pervasive simulation uncertainty in key ecological processes, especially the terrestrial carbon (C) cycle. Traceability analysis provides a theoretical basis for tracking and quantifying the structural uncertainty of simulated C storage in models. Thus, a new tool of model evaluation based on the traceability analysis is urgently needed to efficiently diagnose the sources of inter-model variations on the terrestrial C cycle in Earth system models. Methods A new cloud-based model evaluation platform, i.e., the online traceability analysis system for model evaluation (TraceME v1.0), was established. The TraceME was applied to analyze the uncertainties of seven models from the Coupled Model Intercomparison Project (CMIP6). Results The TraceME can effectively diagnose the key sources of different land C dynamics among CMIIP6 models. For example, the analyses based on TraceME showed that the estimation of global land C storage varied about 2.4 folds across the seven CMIP6 models. Among all models, IPSL-CM6A-LR simulated the lowest land C storage, which mainly resulted from its shortest baseline C residence time. Over the historical period of 1850–2014, gross primary productivity and baseline C residence time were the major uncertainty contributors to the inter-model variation in ecosystem C storage in most land grid cells. Conclusion TraceME can facilitate model evaluation by identifying sources of model uncertainty and provides a new tool for the next generation of model evaluation.


2021 ◽  
Vol 11 (3) ◽  
pp. 1139
Author(s):  
Hsiao-Chung Lin ◽  
Ping Wang ◽  
Wen-Hui Lin ◽  
Yu-Hsiang Huang

Network intrusion detection systems that employ existing IP traceback (IPTBK) algorithms are generally unable to trace multiple attack sources. In these systems, the sampling mechanism only screens parts of the routing information, which leads to the tracing of the neighbour of the attack source and fails to identify the attack source. Theoretically, the multimodal optimisation problem cannot be solved for all of its multiple solutions using the traditional particle swarm optimisation (PSO) algorithm. The present study focuses on the use of multiple-swarm PSO (MSPSO) for recursively tracing attack paths back to a botnet’s multiple attack sources using the subgroup strategy. Specifically, the fitness of each path was calculated using a quasi-Newton gradient descent method to confirm the crucial path for successfully tracing the attack source. For multimodal optimisation problems, the MSPSO algorithm achieves an effective balance between individual particle exploitation and multiswarm exploration when premature convergence occurs. Thus, this algorithm accurately traces multiple attack sources. To verify the effectiveness of identifying Distributed Denial-Of-Service (DDoS) control centres, networks with various topology sizes (32–64 nodes) were simulated using ns-3 with the Boston University Representative Internet Topology Generator. The proposed A* search algorithm (minimal cost pathfinding algorithm) and MSPSO were used to identify the sources of simulated DDoS attacks. Compared with commonly available systems, the MSPSO algorithm performs better in multimodal optimisation problems, improves the accuracy of traceability analysis and reduces false responses for IPTBK problems.


2021 ◽  
pp. 235-250
Author(s):  
Jose Aguilar ◽  
Camilo Salazar ◽  
Julian Monsalve-Pulido ◽  
Edwin Montoya ◽  
Henry Velasco

Author(s):  
Jide Edu ◽  
Xavi Ferrer Aran ◽  
Jose Such ◽  
Guillermo Suarez-Tangil

Sign in / Sign up

Export Citation Format

Share Document