Although the 5-year survival rate for colorectal cancer is below 10%, it increases to greater than 90% if it is diagnosed early. We hypothesized from our research that analyzing non-synonymous single nucleotide variants (SNVs) in a patient's exome sequence would be an indicator for high genetic risk of developing colorectal cancer.
Read More...Browse Articles
Gradient boosting with temporal feature extraction for modeling keystroke log data
Although there has been great progress in the field of Natural language processing (NLP) over the last few years, particularly with the development of attention-based models, less research has contributed towards modeling keystroke log data. State of the art methods handle textual data directly and while this has produced excellent results, the time complexity and resource usage are quite high for such methods. Additionally, these methods fail to incorporate the actual writing process when assessing text and instead solely focus on the content. Therefore, we proposed a framework for modeling textual data using keystroke-based features. Such methods pay attention to how a document or response was written, rather than the final text that was produced. These features are vastly different from the kind of features extracted from raw text but reveal information that is otherwise hidden. We hypothesized that pairing efficient machine learning techniques with keystroke log information should produce results comparable to transformer techniques, models which pay more or less attention to the different components of a text sequence in a far quicker time. Transformer-based methods dominate the field of NLP currently due to the strong understanding they display of natural language. We showed that models trained on keystroke log data are capable of effectively evaluating the quality of writing and do it in a significantly shorter amount of time compared to traditional methods. This is significant as it provides a necessary fast and cheap alternative to increasingly larger and slower LLMs.
Read More...LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture
In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.
Read More...The Effect of Varying Training on Neural Network Weights and Visualizations
Neural networks are used throughout modern society to solve many problems commonly thought of as impossible for computers. Fountain and Rasmus designed a convolutional neural network and ran it with varying levels of training to see if consistent, accurate, and precise changes or patterns could be observed. They found that training introduced and strengthened patterns in the weights and visualizations, the patterns observed may not be consistent between all neural networks.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...Optical anisotropy of crystallized vanillin thin film: the science behind the art
Microscopic beauty is hiding in common kitchen ingredients - even vanillin flavoring can be turned into mesmerizing artwork by crystallizing the vanillin and examining it under a polarizing microscope. Wang and Pang explore this hidden beauty by determining the optimal conditions to grow crystalline vanillin films and by creating computer simulations of chemical interactions between vanillin molecules.
Read More...Characterizing Quorum Sensing-Induced Bioluminescence in Variable Volumes With Vibrio fischeri Using Computer Processing Methods
Understanding how bacteria respond to other bacteria could facilitate their ability to initiate and maintain their infectiousness. The phenomenon by which bacteria signal to each other via chemical signals is called quorum sensing, which could be targeted to deter bacterial infection in some cases if better understood. In this article, the authors study how a bacterium called V. fischeri uses quorum sensing to change bioluminescence, an easy readout that facilitates studying quorum sensing in this strain.
Read More...Do elders care about eHealth? A correlational study between eHealth consumption and literacy
As digital tools become more prevalent in medicine, the ability for individuals to understand and take actions based on what they read on the internet is crucial. eHealth literacy is defined as as the ability to seek, find, understand, and evaluate health information from electronic sources and apply the knowledge gained to addressing or solving a health problem. In general, Americans have low eHealth literacy rates. However, limited research has been conducted to understand the eHealth literacy level among older Chinese adult immigrants in the U.S. To determine the eHealth literacy of elderly Chinese immigrants, we sent out an eHealth survey and relevant computer skills survey using a modified version of the eHEALS (eHealth Literacy Scale) health literacy test. We hypothesized that elders who consumed more electronic health content would have a higher eHealth literacy score. The results of this survey showed that there was a positive correlation between the frequency of electronic health information consumption and the participant's eHealth literacy rate. In addition, the results of our computer literacy test show that the frequency of consumption and computer literacy are positively correlated as well. There is a strong positive correlation between the level of computer skills and eHealth literacy of participants. These results reveal possible steps individuals can take to reduce health misinformation and improve their own health by attaining, understanding, and taking action on health material on the internet.
Read More...Temperature and Precipitation Responses to a Stratospheric Aerosol Geoengineering Experiment Using the Community Climate System Model 4
We are changing our environment with steadily increasing carbon dioxide emissions, but we might be able to help. The authors here use a computer program called Community Climate System Model 4 to predict the effects of spraying small particles into the atmosphere to reflect away some of the sun's rays. The software predicts that this could reduce the amount of energy the Earth's atmosphere absorbs and may limit but will not completely counteract our carbon dioxide production.
Read More...The study of technology and the use of individual cognitive effort
A trial study was performed in 2021 to investigate the link between technology and transactive memory. Transactive memory is shared knowledge in which members share the responsibility to encode, store, and retrieve certain tasks or assignments, leading to a successful and collective performance. We hypothesize that a participants’ expected access to an external source affects the recall rate and retrieval of information.
Read More...