Browse Articles

Differential privacy in machine learning for traffic forecasting

Vinay et al. | Dec 21, 2022

Differential privacy in machine learning for traffic forecasting

In this paper, we measured the privacy budgets and utilities of different differentially private mechanisms combined with different machine learning models that forecast traffic congestion at future timestamps. We expected the ANNs combined with the Staircase mechanism to perform the best with every value in the privacy budget range, especially with the medium high values of the privacy budget. In this study, we used the Autoregressive Integrated Moving Average (ARIMA) and neural network models to forecast and then added differentially private Laplacian, Gaussian, and Staircase noise to our datasets. We tested two real traffic congestion datasets, experimented with the different models, and examined their utility for different privacy budgets. We found that a favorable combination for this application was neural networks with the Staircase mechanism. Our findings identify the optimal models when dealing with tricky time series forecasting and can be used in non-traffic applications like disease tracking and population growth.

Read More...

Differentiation of Waste Plastic Pyrolysis Fuels to Conventional Diesel Fuel

Jewison et al. | May 25, 2018

Differentiation of Waste Plastic Pyrolysis Fuels to Conventional Diesel Fuel

Plastic pollution and energy shortages are pressing issues in today’s world. The authors examined whether waste plastic pyrolysis fuels are similar to conventional diesel and, thus, a plausible alternative fuel. Results showed that waste plastic pyrolysis fuels did not match up to diesel overall, though several fuels came close in calorific value.

Read More...

An improved video fingerprinting attack on users of the Tor network

Srikanth et al. | Mar 31, 2022

An improved video fingerprinting attack on users of the Tor network

The Tor network allows individuals to secure their online identities by encrypting their traffic, however it is vulnerable to fingerprinting attacks that threaten users' online privacy. In this paper, the authors develop a new video fingerprinting model to explore how well video streaming can be fingerprinted in Tor. They found that their model could distinguish which one of 50 videos a user was hypothetically watching on the Tor network with 85% accuracy, demonstrating that video fingerprinting is a serious threat to the privacy of Tor users.

Read More...

Conversion of Mesenchymal Stem Cells to Cancer-Associated Fibroblasts in a Tumor Microenvironment: An in vitro Study

Ramesh et al. | Feb 18, 2020

Conversion of Mesenchymal Stem Cells to Cancer-Associated Fibroblasts in a Tumor Microenvironment: An <em>in vitro</em> Study

Mesenchymal stem cells(MSCs) play a role in tumor formation by differentiating into cancer associated fibroblasts (CAFs) which enable metastasis of tumors. The process of conversion of MSCs into CAFs is not clear. In this study, authors tested the hypothesis that cancers cells secrete soluble factors that induce differentiation by culturing bone marrow mesenchymal stem cells in media conditioned by a breast cancer cell line.

Read More...

Analysis of complement system gene expression and outcome across the subtypes of glioma

Mudda et al. | May 17, 2023

Analysis of complement system gene expression and outcome across the subtypes of glioma
Image credit: National Cancer Institute

Here the authors sought to better understand glioma, cancer that occurs in the glial cells of the brain with gene expression profile analysis. They considered the expression of complement system genes across the transcriptional and IDH-mutational subtypes of low-grade glioma and glioblastoma. Based on their results of their differential gene expression analysis, they found that outcomes vary across different glioma subtypes, with evidence suggesting that categorization of the transcriptional subtypes could help inform treatment by providing an expectation for treatment responses.

Read More...

Specific Transcription Factors Distinguish Umbilical Cord Mesenchymal Stem Cells From Fibroblasts

Park et al. | Aug 16, 2019

Specific Transcription Factors Distinguish Umbilical Cord Mesenchymal Stem Cells From Fibroblasts

Stem cells are at the forefront of research in regenerative medicine and cell therapy. Two essential properties of stem cells are self-renewal and potency, having the ability to specialize into different types of cells. Here, Park and Jeong took advantage of previously identified stem cell transcription factors associated with potency to differentiate umbilical cord mesenchymal stem cells (US-MSCs) from morphologically similar fibroblasts. Western blot analysis of the transcription factors Klf4, Nanog, and Sox2 revealed their expression was unique to US-MSCs providing insight for future methods of differentiating between these cell lines.

Read More...

Upregulation of the Ribosomal Pathway as a Potential Blood-Based Genetic Biomarker for Comorbid Major Depressive Disorder (MDD) and PTSD

Ravi et al. | Aug 22, 2018

Upregulation of the Ribosomal Pathway as a Potential  Blood-Based Genetic Biomarker for Comorbid Major Depressive Disorder (MDD) and PTSD

Major Depressive Disorder (MDD), and Post-Traumatic Stress Disorder (PTSD) are two of the fastest growing comorbid diseases in the world. Using publicly available datasets from the National Institute for Biotechnology Information (NCBI), Ravi and Lee conducted a differential gene expression analysis using 184 blood samples from either control individuals or individuals with comorbid MDD and PTSD. As a result, the authors identified 253 highly differentially-expressed genes, with enrichment for proteins in the gene ontology group 'Ribosomal Pathway'. These genes may be used as blood-based biomarkers for susceptibility to MDD or PTSD, and to tailor treatments within a personalized medicine regime.

Read More...

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

Zhang et al. | Jul 19, 2020

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.

Read More...

Search Articles

Search articles by title, author name, or tags

Clear all filters

Popular Tags

Browse by school level