call sequence
Recently Published Documents


TOTAL DOCUMENTS

54
(FIVE YEARS 8)

H-INDEX

7
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Michelle E.H. Fournet ◽  
Leanna P. Matthews ◽  
Annie Bartlett ◽  
Natalie Mastick ◽  
Fred Sharpe ◽  
...  

AbstractHumpback whales (Megaptera novaeangliae) produce calls across age and sex class and throughout their migratory range. Despite growing interest in calling behavior, the function of most calls is unknown. Among identified call types, the ‘whup’ is ubiquitous, and innate, and may serve as a contact call. We conducted an acoustic playback experiment combined with passive acoustic monitoring and visual observations to test the function of the whup on a Southeast Alaskan foraging ground. Using a before-during-after design, we broadcasted either a control sound or a unique whup call sequence. We investigated the change in whup rates (whups/whale/10 minutes) in response to treatment (whup or control) and period (before, during, or after). In 100% of the conspecific trials, whup rates increased during broadcasts, and whup rates were significantly higher than in before or after periods. There was no significant difference in whup rates between before and after periods during conspecific trials. In control trials, there were no significant differences in whup rates between before, during, or after periods. Neither whups nor control playbacks elicited an approach response. Humpback whale vocal responses to whup playbacks suggest that whups function as a contact call, but not necessarily as an aggregation signal.



2021 ◽  
pp. 102449
Author(s):  
Eslam Amer ◽  
Ivan Zelinka ◽  
Shaker El-Sappagh


Author(s):  
Sachchidanand Kumar ◽  
Aryan Agrahri ◽  
Shivam Kumar Jha ◽  
Kapil Gupta


2021 ◽  
Author(s):  
Guillermo Dufort y Alvarez ◽  
Gadiel Seroussi ◽  
Pablo Smircich ◽  
Jose Roberto Sotelo ◽  
Idoia Ochoa ◽  
...  

Nanopore sequencing technologies are rapidly gaining popularity, in part, due to the massive amounts of genomic data they produce in short periods of time (up to 8.5 TB of data in less than 72 hs). In order to reduce the costs of transmission and storage, efficient compression methods for this type of data are needed. Unlike short-read technologies, nanopore sequencing generates long noisy reads of variable length. In this note we introduce RENANO, a reference-based lossless FASTQ data compressor, specifically tailored to compress FASTQ files generated with nanopore sequencing technologies. RENANO builds on the recent compressor ENANO, which is currently state of the art. It focuses on improving the compression of the base call sequence portion of the FASTQ file, leaving the other parts of ENANO intact. Two novel reference-based compression algorithms are introduced, contemplating different scenarios: in the first scenario, a reference genome is available without cost to both the compressor and the decompressor; in the second, the reference genome is available only on the compressor side, and a compacted version of the reference is transmitted to the decompressor as part of the compressed file. To evaluate the proposed algorithms, we compare RENANO against ENANO on several publicly available nanopore datasets. In the first scenario considered, RENANO improves the base call sequences compression of ENANO by 40.8%, on average, over all the datasets. As for total compression (including the other parts of the FASTQ file), the average improvement is 13.1%. In the second scenario considered, the base call compression improvements of RENANO over ENANO range from 15.2% to 49.0%, depending on the coverage of the compressed dataset, while in terms of total size, the improvements range from 5.1% to 16.5%.



Author(s):  
Reo Kawasoe ◽  
Chansu Han ◽  
Ryoichi Isawa ◽  
Takeshi Takahashi ◽  
Jun'ichi Takeuchi


2021 ◽  
Author(s):  
Matthew Schofield ◽  
Gulsum Alicioglu ◽  
Russell Binaco ◽  
Paul Turner ◽  
Cameron Thatcher ◽  
...  

Malicious software is constantly being developed and improved, so detection and classification of malicious applications is an ever-evolving problem. Since traditional malware detection techniques fail to detect new or unknown malware, machine learning algorithms have been used to overcome this disadvantage. We present a Convolutional Neural Network (CNN) for malware type classification based on the Windows system API (Application Program Interface) calls. This research uses a database of 5385 instances of API call streams labeled with eight types of malware of the source malicious application. We use a 1-Dimensional CNN by mapping API call streams as categorical and term frequency-inverse document frequency (TF-IDF) vectors respectively. We achieved accuracy scores of 98.17% using TF-IDF vector and 95.40% via categorical vector. The proposed 1-D CNN outperformed other traditional classification techniques with overall accuracy score of 91.0%.



2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Xi Jiang ◽  
Haijun Mao ◽  
Hao Zhang

This paper proposes to address the problem of the simultaneous optimization of the liner shipping route and ship schedule designs by incorporating port time windows. A mathematical programming model was developed to minimize the carrier’s total operating cost by simultaneously optimizing the port call sequence, ship arrival time per port of call, and sailing speed per shipping leg under port time window constraints. In view of its structure, the nonlinear nonconvex optimization model is further transformed into a mixed-integer linear programming model that can be efficiently solved by extant solvers to provide a global optimal solution. The results of the numerical experiments performed using a real-world case study indicated that the proposed model performs significantly better than the models that handle the design problems separately. The results also showed that different time windows will affect the optimal port call sequence. Moreover, port time windows, bunker price, and port efficiency all affect the total operating cost of the designed shipping route.



2020 ◽  
Vol 10 (21) ◽  
pp. 7673
Author(s):  
Eslam Amer ◽  
Shaker El-Sappagh ◽  
Jong Wan Hu

The proper interpretation of the malware API call sequence plays a crucial role in identifying its malicious intent. Moreover, there is a necessity to characterize smart malware mimicry activities that resemble goodware programs. Those types of malware imply further challenges in recognizing their malicious activities. In this paper, we propose a standard and straightforward contextual behavioral models that characterize Windows malware and goodware. We relied on the word embedding to realize the contextual association that may occur between API functions in malware sequences. Our empirical results proved that there is a considerable distinction between malware and goodware call sequences. Based on that distinction, we propose a new method to detect malware that relies on the Markov chain. We also propose a heuristic method that identifies malware’s mimicry activities by tracking the likelihood behavior of a given API call sequence. Experimental results showed that our proposed model outperforms other peer models that rely on API call sequences. Our model returns an average malware detection accuracy of 0.990, with a false positive rate of 0.010. Regarding malware mimicry, our model shows an average noteworthy accuracy of 0.993 in detecting false positives.



Sign in / Sign up

Export Citation Format

Share Document