2,026 research outputs found

    Two genetic codes: Repetitive syntax for active non-coding RNAs; non-repetitive syntax for the DNA archives

    Get PDF
    Current knowledge of the RNA world indicates 2 different genetic codes being present throughout the living world. In contrast to non-coding RNAs that are built of repetitive nucleotide syntax, the sequences that serve as templates for proteins share—as main characteristics—a non-repetitive syntax. Whereas non-coding RNAs build groups that serve as regulatory tools in nearly all genetic processes, the coding sections represent the evolutionarily successful function of the genetic information storage medium. This indicates that the differences in their syntax structure are coherent with the differences of the functions they represent. Interestingly, these 2 genetic codes resemble the function of all natural languages, i.e., the repetitive non-coding sequences serve as appropriate tool for organization, coordination and regulation of group behavior, and the nonrepetitive coding sequences are for conservation of instrumental constructions, plans, blueprints for complex protein-body architecture. This differentiation may help to better understand RNA group behavioral motifs

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    The Role Artificial Intelligence in Modern Banking: An Exploration of AI-Driven Approaches for Enhanced Fraud Prevention, Risk Management, and Regulatory Compliance

    Get PDF
    Banking fraud prevention and risk management are paramount in the modern financial landscape, and the integration of Artificial Intelligence (AI) offers a promising avenue for advancements in these areas. This research delves into the multifaceted applications of AI in detecting, preventing, and managing fraudulent activities within the banking sector. Traditional fraud detection systems, predominantly rule-based, often fall short in real-time detection capabilities. In contrast, AI can swiftly analyze extensive transactional data, pinpointing anomalies and potentially fraudulent activities as they transpire. One of the standout methodologies includes the use of deep learning, particularly neural networks, which, when trained on historical fraud data, can discern intricate patterns and predict fraudulent transactions with remarkable precision.  Furthermore, the enhancement of Know Your Customer (KYC) processes is achievable through Natural Language Processing (NLP), where AI scrutinizes textual data from various sources, ensuring customer authenticity. Graph analytics offers a unique perspective by visualizing transactional relationships, potentially highlighting suspicious activities such as rapid fund transfers indicative of money laundering. Predictive analytics, transcending traditional credit scoring methods, incorporates a diverse data set, offering a more comprehensive insight into a customer's creditworthiness.  The research also underscores the importance of user-friendly interfaces like AI-powered chatbots for immediate reporting of suspicious activities and the integration of advanced biometric verifications, including facial and voice recognition. Geospatial analysis and behavioral biometrics further bolster security by analyzing transaction locations and user interaction patterns, respectively.  A significant advantage of AI lies in its adaptability. Self-learning systems ensure that as fraudulent tactics evolve, the AI mechanisms remain updated, maintaining their efficacy. This adaptability extends to phishing detection, IoT integration, and cross-channel analysis, providing a comprehensive defense against multifaceted fraudulent attempts. Moreover, AI's capability to simulate economic scenarios aids in proactive risk management, while its ability to ensure regulatory compliance automates and streamlines a traditionally cumbersome process

    Exploring Terms and Taxonomies Relating to the Cyber International Relations Research Field: or are "Cyberspace" and "Cyber Space" the same?

    Get PDF
    This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining" whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace" and "cyber space" were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber" and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace" and "cyber space" as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project
    • …
    corecore