99,533 research outputs found
Using a spatial overlap approach to estimate the risk of collisions between deep diving seabirds and tidal stream turbines : a review of potential methods and approaches
Peer reviewedPublisher PD
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported
to the public. Unpatched known vulnerabilities are a significant security risk.
It is imperative that software vendors quickly provide patches once
vulnerabilities are known and users quickly install those patches as soon as
they are available. However, most vulnerabilities are never actually exploited.
Since writing, testing, and installing software patches can involve
considerable resources, it would be desirable to prioritize the remediation of
vulnerabilities that are likely to be exploited. Several published research
studies have reported moderate success in applying machine learning techniques
to the task of predicting whether a vulnerability will be exploited. These
approaches typically use features derived from vulnerability databases (such as
the summary text describing the vulnerability) or social media posts that
mention the vulnerability by name. However, these prior studies share multiple
methodological shortcomings that inflate predictive power of these approaches.
We replicate key portions of the prior work, compare their approaches, and show
how selection of training and test data critically affect the estimated
performance of predictive models. The results of this study point to important
methodological considerations that should be taken into account so that results
reflect real-world utility
A New Approach in Risk Stratification by Coronary CT Angiography.
For a decade, coronary computed tomographic angiography (CCTA) has been used as a promising noninvasive modality for the assessment of coronary artery disease (CAD) as well as cardiovascular risks. CCTA can provide more information incorporating the presence, extent, and severity of CAD; coronary plaque burden; and characteristics that highly correlate with those on invasive coronary angiography. Moreover, recent techniques of CCTA allow assessing hemodynamic significance of CAD. CCTA may be potentially used as a substitute for other invasive or noninvasive modalities. This review summarizes risk stratification by anatomical and hemodynamic information of CAD, coronary plaque characteristics, and burden observed on CCTA
Comparison of Semantic and Episodic Memory BOLD fMRI Activation in Predicting Cognitive Decline in Older Adults
Previous studies suggest that task-activated functional magnetic resonance imaging (fMRI) can predict future cognitive decline among healthy older adults. The present fMRI study examined the relative sensitivity of semantic memory (SM) versus episodic memory (EM) activation tasks for predicting cognitive decline. Seventy-eight cognitively intact elders underwent neuropsychological testing at entry and after an 18-month interval, with participants classified as cognitively āStableā or āDecliningā based on ā„1.0 SD decline in performance. Baseline fMRI scanning involved SM (famous name discrimination) and EM (name recognition) tasks. SM and EM fMRI activation, along with Apolipoprotein E (APOE) Īµ4 status, served as predictors of cognitive outcome using a logistic regression analysis. Twenty-seven (34.6%) participants were classified as Declining and 51 (65.4%) as Stable. APOE Īµ4 status alone significantly predicted cognitive decline (R2 = .106; C index = .642). Addition of SM activation significantly improved prediction accuracy (R2 = .285; C index = .787), whereas the addition of EM did not (R2 = .212; C index = .711). In combination with APOE status, SM task activation predicts future cognitive decline better than EM activation. These results have implications for use of fMRI in prevention clinical trials involving the identification of persons at-risk for age-associated memory loss and Alzheimer\u27s disease. (JINS, 2012, 18, 1ā11
Active Virtual Network Management Prediction: Complexity as a Framework for Prediction, Optimization, and Assurance
Research into active networking has provided the incentive to re-visit what
has traditionally been classified as distinct properties and characteristics of
information transfer such as protocol versus service; at a more fundamental
level this paper considers the blending of computation and communication by
means of complexity. The specific service examined in this paper is network
self-prediction enabled by Active Virtual Network Management Prediction.
Computation/communication is analyzed via Kolmogorov Complexity. The result is
a mechanism to understand and improve the performance of active networking and
Active Virtual Network Management Prediction in particular. The Active Virtual
Network Management Prediction mechanism allows information, in various states
of algorithmic and static form, to be transported in the service of prediction
for network management. The results are generally applicable to algorithmic
transmission of information. Kolmogorov Complexity is used and experimentally
validated as a theory describing the relationship among algorithmic
compression, complexity, and prediction accuracy within an active network.
Finally, the paper concludes with a complexity-based framework for Information
Assurance that attempts to take a holistic view of vulnerability analysis
- ā¦