Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text)
(Updated article of the week text)
(209 intermediate revisions by the same user not shown)
Line 1: Line 1:
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig3 Teixeira FutureInternet2018 10-8.png|240px]]</div>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Berezin PLoSCompBio23 19-12.png|240px]]</div>
'''"[[Journal:SCADA system testbed for cybersecurity research using machine learning approach|SCADA system testbed for cybersecurity research using machine learning approach]]"'''
'''"[[Journal:Ten simple rules for managing laboratory information|Ten simple rules for managing laboratory information]]"'''
 
[[Information]] is the cornerstone of [[research]], from experimental data/[[metadata]] and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging [[laboratory information management system]]s (LIMS) to transform this large information load into useful scientific findings. The development of [[mathematical model]]s that can predict the properties of biological systems is the holy grail of [[computational biology]]. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... ('''[[Journal:Ten simple rules for managing laboratory information|Full article...]]''')<br />


This paper presents the development of a [[supervisory control and data acquisition]] (SCADA) system testbed used for [[cybersecurity]] research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features were extracted from the traffic to build a dataset for training and testing different machine learning algorithms. Five traditional machine learning algorithms were trained to detect the attacks: Random Forest, Decision Tree, Logistic Regression, Naïve Bayes, and KNN. Then, the trained machine learning models were built and deployed in the network, where new tests were made using online network traffic. The performance obtained during the training and testing of the machine learning models was compared to the performance obtained during the online deployment of these models in the network. The results show the efficiency of the machine learning models in detecting the attacks in real time. The testbed provides a good understanding of the effects and consequences of attacks on real SCADA environments. ('''[[Journal:Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data|Full article...]]''')<br />
<br />
''Recently featured'':
''Recently featured'':
: ▪ [[Journal:Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data|Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data]]
{{flowlist |
: ▪ [[Journal:A view of programming scalable data analysis: From clouds to exascale|A view of programming scalable data analysis: From clouds to exascale]]
* [[Journal:Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology|Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology]]
: ▪ [[Journal:Transferring exome sequencing data from clinical laboratories to healthcare providers: Lessons learned at a pediatric hospital|Transferring exome sequencing data from clinical laboratories to healthcare providers: Lessons learned at a pediatric hospital]]
* [[Journal:Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study|Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study]]
* [[Journal:Judgements of research co-created by generative AI: Experimental evidence|Judgements of research co-created by generative AI: Experimental evidence]]
}}

Revision as of 18:03, 10 June 2024

Fig2 Berezin PLoSCompBio23 19-12.png

"Ten simple rules for managing laboratory information"

Information is the cornerstone of research, from experimental data/metadata and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging laboratory information management systems (LIMS) to transform this large information load into useful scientific findings. The development of mathematical models that can predict the properties of biological systems is the holy grail of computational biology. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... (Full article...)

Recently featured: